CN104156652B - It is blurred the method and cryptographic check equipment of verification password - Google Patents

It is blurred the method and cryptographic check equipment of verification password Download PDF

Info

Publication number
CN104156652B
CN104156652B CN201410231428.7A CN201410231428A CN104156652B CN 104156652 B CN104156652 B CN 104156652B CN 201410231428 A CN201410231428 A CN 201410231428A CN 104156652 B CN104156652 B CN 104156652B
Authority
CN
China
Prior art keywords
information unit
candidate information
password
candidate
target constituency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410231428.7A
Other languages
Chinese (zh)
Other versions
CN104156652A (en
Inventor
郑犁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SMART ELECTRONIC INDUSTRIAL (DONGGUAN) Co Ltd
Original Assignee
SMART ELECTRONIC INDUSTRIAL (DONGGUAN) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SMART ELECTRONIC INDUSTRIAL (DONGGUAN) Co Ltd filed Critical SMART ELECTRONIC INDUSTRIAL (DONGGUAN) Co Ltd
Priority to CN201410231428.7A priority Critical patent/CN104156652B/en
Priority to PCT/CN2014/081684 priority patent/WO2015180237A1/en
Publication of CN104156652A publication Critical patent/CN104156652A/en
Application granted granted Critical
Publication of CN104156652B publication Critical patent/CN104156652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Abstract

The invention mainly relates to a kind of method for being blurred verification password, comprise the following steps:(1) hash shows multiple candidate information units, and the information unit of the password is as candidate information unit therein, and the distance of any time graphic user interface residing for per two neighboring candidate information unit is no more than the maximum given tacit consent to;(2) setting to target constituency and the relative position relation of candidate information unit is received, to realize that the candidate information element number that the target constituency is covered reaches two or more, multiple candidate information units that target constituency is covered are defined as selected information unit collection;(3) by the information unit of the password compared with selected information unit collection, when selected information unit collection includes the information unit of preset password, determine that user have selected the correct information unit in preset password.The cryptographic check realized by the method for the present invention designs, and has taken into account the ambiguity of expression in plain text and the ease for use of user's operation, has had the characteristics of safe and reliable.

Description

It is blurred the method and cryptographic check equipment of verification password
Technical field
The present invention relates to a kind of electronic safety protection technology, more particularly to a kind of method and one kind for being blurred verification password For performing the cryptographic check equipment of this method.
Background technology
With the continuous improvement of human living standard and awareness of safety, cryptographic check device and its corresponding verification method are wide The mobile terminals such as the general every field for being applied to life, typical situation, mobile phone that current human hand is at least one, tablet personal computer In, i.e., the application of verification method largely be present, be actually also the specific implementation for verifying device.In the terminal, generally One is provided to draw based on the display screen for touching feedback, for example known slip unblock of mode the most easy, face unblock, nine grids Line unblock etc..But inadequate natural endowment all be present in all these modes, wherein, unblock is slided completely without disguised, face unblock Can be cracked easily by static images, nine grids setting-out unblock be substantially nine grids numeric keypad mutation, be also easy to by Other people observe its setting-out effect and cracked.It can be seen that these verification methods existing on mobile terminal are without peace enough Full disguise and reliability, is easily spied on and is cracked by person who is ambitious or tenacious of purpose.
Authentication techniques before earlier, mechanically carry out more, for example, the coded lock used in various bags, case, It is one kind of cryptographic check device.The such authentication device realized using mechanical system, equally there are its known deficiency, therefore electricity The authentication device of sonization is unrivalled to be replaced.Thus, cryptographic check device is not only applicable to various electronics mobile terminals, With more application prospect, other a variety of occasions for needing to carry out cryptographic check, such as the electricity of various traveling bags, case are also applied to In the certifying organization of sub- lockset, and for example home electronics such as intelligent television, can man-machine interaction router or various centralized Into in the proving program of control device, for another example gate control system, vending machine, safety box, car door electronic lock etc. password Verification, even apply in any required new product for carrying out cryptographic check in the future.It can be seen that cryptographic check device is such weight Will, it is enough the every aspect for influenceing human lives, thus, a kind of cryptographic check device in accordance with science and corresponding authentication Method is people's pursuit endless to safety.
However, as it was previously stated, although cryptographic check device is so important, but at present existing checking implementation all the time without Method is fully up to expectations.In industrial design, product not only needs to consider its performance and foregoing security, will also combine cost, Ease for use accounts for, thus, how to be balanced in these industrial considerations, turn into authentication techniques and be able to constantly improve Driving source.
CN103632075A patent announcements disclosed in 12 days March in 2014 disclose an authentication device and method for authenticating, are The technical scheme of certain parallel relation be present with the present invention, solve the problems, such as in some sense above-mentioned, but there is also as follows Be left to be desired part:
Firstly, since this method is used one group of candidate characters collection dynamically distributes as multiple candidate subsets, then by these Candidate subset, which is fixed, is displayed for selected method, and its interaction is poor, and operating experience is on the weak side;
Secondly, in terms of security, the candidate characters of screen display remain to be spied on or transcribed easily, in theory, steal secret information Person can remember that user is directed to the multi-pass operation of same password by way of hypermnesia, then be applicable exclusive method conjecture password, thus Security is relatively low.
Therefore, considering from application, cryptographic check should have a good man-machine interaction effect, and from safe aspect Consider, then both should be noted the ambiguity in plain text in expression and should be noted operational easy degree, although ambiguity table Up to being conflict with operational simplification, but both combinations still have the space that can be broken through.
The content of the invention
The primary and foremost purpose of the present invention is to adapt to the deficiencies in the prior art, there is provided one kind can ambiguityization expression password to be verified Candidate in plain text and the method that can ensure that the easy-to-use blurring verification password of safety.
Another object of the present invention is to provide a kind of cryptographic check equipment corresponding with object defined above.
In order to achieve the above object, the present invention adopts the following technical scheme that:
A kind of method of blurring verification password of the present invention, whether have selected for verifying user and be made up of information unit Preset password in correct information unit, it comprises the following steps:
(1) hash shows multiple candidate information units, and the information unit of the preset password is as candidate information therein Unit supplies candidate;
(2) setting to target constituency and the relative position relation of the candidate information unit is received, to realize the target The candidate information element number that constituency is covered reaches two or more, multiple candidates that target constituency is covered Information unit is defined as selected information unit collection;
(3) by the information unit of the password compared with the selected information unit collection, when selected information unit collection During information unit comprising the preset password, determine that user have selected the correct information unit in preset password.
A kind of embodiment disclosed according to the present invention, the target constituency give an initial bit in graphical user interfaces Put, under the driving of user instruction, the target constituency changes to final position and realizes the target constituency to candidate information list The covering of member.A kind of more easy-operating man-machine interaction mode is thereby provided.
According to disclosed another embodiment, the target constituency is by the first user instruction in graphic user interface Middle generation, and acted on by second user instruction and form the covering to the candidate information unit in graphical user interfaces.By This realizes more hidden Password Input operation.
The another embodiment disclosed according to the present invention, position of the target constituency in graphical interfaces immobilize, Under the driving of user instruction, the candidate information unit present position is varied within the profile in the target constituency with reality Existing covering of the target constituency to those candidate information units.Thereby it is supplied to the more targeted password input function of user.
According to the another embodiment that discloses of the present invention, both the target constituency and the figure candidate information unit or it One random motion in graphical user interfaces in a manner of position is variable, when the target constituency, covering is two or more During candidate information unit, it is allowed to which user instruction drives the target constituency to realize and the candidate information unit is selected.Thereby Strengthen its ambiguity so as to avoid being spied on hypermnesia easily.
Preferably, the distance of any time graphic user interface residing for per two neighboring candidate information unit is no more than acquiescence Maximum described in the maximum given tacit consent to by the target constituency maximum lengthwise dimension and be intended to selected candidate information unit The ratio between number.The maximum of the acquiescence is for the maximum display size for the screen for showing the graphic user interface, or is A certain pre-set dimension.Imitated by limiting this size relationship come effective covering between optimization aim constituency and candidate information unit Fruit.
Specifically, described candidate information unit includes at least one information word, described information member is character, font, word Number, color, pattern or image, be combined carry out Visualization in graphical user interfaces between multiple information words.It is described pre- If the information unit in password includes two or more information words, when the information unit that the selected information unit is concentrated During all information words comprising the information unit in the preset password, it is considered as have selected correct information unit just now.Thereby enter One step strengthens the confidentiality of Password Input.
Specifically, corresponding to the selected instruction input source in the target constituency, by microphone, gyroscope, physical button, Any one or more in touch-screen, camera, infrared ray sensor, shock sensor provides.
Preferably, covering of the target constituency to candidate information unit, it is flat in visualization to refer to the candidate information unit Fallen on face in the border in target constituency and/or with the boundary-intersected.
Preferably, in the step (1), before showing every group of candidate information unit every time, to all candidates in the group Information unit carries out random hash arrangement, and by the layout output display after arrangement.
To strengthen confidentiality, preferably, in the example for adapting to be driven and terminated respectively by two user instructions, the mesh Mark constituency is not shown in graphical user interfaces.
A kind of cryptographic check equipment for being used to perform foregoing blurring cryptographic check method of the present invention, it includes being used for The memory cell of the program of this method and the control unit for performing the program are realized in storage, and for showing this method The display screen of graphic user interface.
Compared with prior art, the present invention has the advantages that:
1st, the present invention wraps first by allowing target constituency to determine that this feature enhances the design of man-machine interaction on demand Containing a variety of interactive modes, candidate information unit can have both been made to enter target constituency construction selected information unit collection, and using target Constituency determines that multiple candidate information units are selected information unit collection, and selected information list can be also determined in the above two motion processes Metaset, various interaction modes and with broad design space, so as to provide it is a kind of be easily achieved and use completely not It is same as the cryptographic check mode of prior art.
2nd, by making each selected information unit collection cover two or more multiple candidate information units, by user During determining selected candidate information unit number on demand, the dynamic that correct information unit selectes process is necessarily embodied Change, and multiple selected candidate information units enhance the ambiguity of cryptographic check.Further, due to candidate information list Information unit in member, preset password may be expressed by much information member in itself, therefore the fog-level of cryptographic check is able to Enhancing, the whole password Input Process of user are just not easy to be spied on or transcribed to peep to look into, it is ensured that the security of Input Process.
3rd, similarly, because same selected information unit is concentrated, the information unit number selected is two or more, And each information unit may include two or more information word, thus, even if being obtained by way of data intercept stream Obtain user and be directed to the multiple Password Input data that same password string is carried out, because there is same information unit much information member to cause Complexity and identification difficulty increase, cracker attempts to show that the trial of correct information unit will also be dropped significantly by data analysis Its low efficiency, so as to put forward the security that a step improves cryptographic check process.
4th, candidate information unit is selected in the present invention, can correspond to a variety of known input modes to obtain user's Selected instruction, for example, can be by infrared ray sensor, shock sensor, camera, touch-screen, physical button, microphone etc. The one or a series of action of user is converted to selected instruction by equipment, by that analogy, can also do a variety of extensions, therefore, this Invention accommodation is very extensive, is the invention compared with based on, has very far-reaching influence to the security and guard technology of electronic equipment.
Brief description of the drawings
Fig. 1 is the electrical principle signal for implementing the cryptographic check equipment of the method for the blurring verification password of the present invention Figure;
Fig. 2 is the schematic flow sheet of the method for the blurring verification password of the present invention;
The graphic user interface that Fig. 3 is presented for the embodiment of the method for the blurring verification password of the present invention, its In the target constituency and a viewing area of an alterable position are only shown;
The graphic user interface that Fig. 4 is presented for the embodiment of the method for the blurring verification password of the present invention, its In target constituency and a viewing area that position is fixed only are shown;
The graphic user interface that Fig. 5 is presented for the embodiment of the method for the blurring verification password of the present invention, its In show that the two of target constituency keyboard layouts can be determined by referring to draw.
Embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
It will be understood by those skilled in the art that unless expressly stated, singulative " one " used in the present invention, " one It is individual ", " described " and "the" may also comprise plural form.It is to be further understood that what is used in the specification of the present invention arranges Diction " comprising " refer to the feature, integer, step, operation, element and/or component be present, but it is not excluded that in the presence of or addition One or more other features, integer, step, operation, element, component and/or combinations thereofs.Wording used in the present invention "and/or" includes whole or any cell and all combinations of one or more associated list items.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms that the present invention uses (including technology Term and scientific terminology), there is the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also It should be appreciated that those terms defined in such as general dictionary, it should be understood that have with the context of prior art The consistent meaning of meaning, and unless similar the same by specific definitions herein, otherwise will not use idealization or overly formal Implication is explained.
Those skilled in the art of the present technique are appreciated that " equipment " used in the present invention, " terminal ", " terminal device " had both wrapped The equipment for including wireless signal receiver, it only possesses the equipment of the wireless signal receiver of non-emissive ability, again include receive and The equipment of transmission signal, it has the reception that on bidirectional communication link, can carry out two-way communication and the equipment for launching hardware. This equipment can include:Honeycomb or other communication equipments, it has single line display or multi-line display or without more The honeycomb of multi-line display or other communication equipments;PCS (Personal Communications Service, personal communication system System), it can be with combine voice, data processing, fax and/or its communication ability;PDA(Personal Digital Assistant, personal digital assistant), it can be clear including radio frequency receiver, pager, the Internet/intranet access, network Look at device, notepad, calendar and/or GPS (Global Positioning System, global positioning system) receiver;Conventional knee Mo(u)ld top half and/or palmtop computer or other equipment, it has and/or conventional laptop and/or the palm including radio frequency receiver Laptop computer or other equipment." terminal " used herein above, " terminal device " can be portable, can transport, be arranged on In the vehicles (aviation, sea-freight and/or land), or it is suitable for and/or is configured in local runtime, and/or with distribution Form, operate in any other position operation in the earth and/or space." equipment " used herein above, " terminal ", " terminal is set It is standby " communication terminal, access terminals, music/video playback terminal are can also be, such as can be PDA, MID (Mobile Internet Device, mobile internet device) and/or the equipment such as mobile phone or intelligent television, set top box.
Those skilled in the art should also be appreciated that " calibration equipment " alleged by the present invention, including all need progress safety close The electronic equipment of code check, both can be that software and hardware combining is utilized on the basis of foregoing " equipment ", " terminal ", " terminal device " Realization forms, there may also be in other application scene, such as:Automatic depositing-withdrawing equipment (ATM), various band display screens simultaneously load Have automobile door control safety-protection system, gate inhibition's phone, lockset of intelligence system etc., can also be for complete independently cryptographic check and The device of a respective table reference number is exported after cryptographic check success.Those skilled in the art will be it is to be understood that although the present invention will be big Amount is applied in various modernization terminal devices, but the various application scenarios enumerated above should not form the limit to the present invention System, for the purpose of the present invention, in every known device with display screen realized by intelligent operating system, it can be achieved in theory Method alleged by the present invention, form the equipment alleged by the present invention.
The terms such as " memory ", " memory cell " or " storage device " alleged by the present invention, despite the presence of this literal table State, but be general term concept in itself, it is mainly used in storing password, and source place, but the space where it are provided for password Position is not limited to terminal the machine, should also include the situation from far-end server, such as pass through LAN or internet Access conducts interviews.Correspondingly, " verification " process alleged by the present invention, it both can perform Inspection in terminal the machine and obtain Relevant information, can also be sent to remote server and perform Inspection and then obtain check results by check results, then to terminal Feed back the check results.It should be understood by those skilled in the art that accommodation described herein.
" ambiguity " alleged by the present invention refer to from visual angle to treat a things when can not obtain it is unique really Qualitatively result.In the present invention, by several candidate information units of simultaneous selection, to avoid uniquely determining property during selection, So as to realize the fuzzy expression of selection content.Therefore, " the ambiguity cryptographic check " alleged by the present invention refers in cryptographic check Cheng Zhong, it is this to realize the surface blur effect of user in selecting content by allowing the multiple candidate information units of user's simultaneous selection Blur effect had not only been included from visualization angle but also the effect including being obtained from the angle of data analysis.It is however, right For the intelligence system program of the present invention is performed, this selection for causing ambiguity has no effect on its actual judgement, by the journey The execution of sequence still can draw the result of uniquely determining property.
" information unit " alleged by the present invention, or " indexing unit ", continue to use this area and " information " or " mark " are total to With understanding, refer to the unit that may be made up of one or more information words, preferable information word can be character, color, Any one or any a variety of combination of font, font size, pattern, image even in sound wave, for example, information unit can be with It is made up of to carry out Visualization, can also be combined by character and color a character, or even with the Color Expression word Symbol to carry out Visualization, or, can be also combined by a kind of pattern with a kind of color ... by this announcement, can be with Know, information unit is elementary organization's unit of information word understood by one of ordinary skill in the art, not specifically for character, color It is any unique a kind of among coloured silk, font, font size, pattern, image.Described and character, the general art of computer realm can be continued to use The lexical or textual analysis of language, certainly including but not limited to Chinese character, English character, Arabic numerals, Roman number etc..It is known, letter The expression way of breath is varied, and any information is both needed to be expressed in some way, from the original existence form of information Whether human eye itself can recognize that to discuss, and can be divided into Visualization information and non-Visualization information, information list of the invention Member and based on the preferred Visualization information of candidate information unit thereon, but is not precluded from non-Visualization information in this hair Utilization in bright, more it is not excluded for being converted to non-Visualization information into the utilization after Visualization information in the present invention.
" password " or " preset password " alleged by the present invention, except non-specifically clarifying, refers to the password by user preset, typically Organize to form in a certain order by multiple information units, such as be made up of a string of characters, or by a string of band colored marks The character of note is formed, and general not stored in clear.Thus, " verification " alleged by the present invention not necessarily refers to corresponding to close Compared with being carried out directly using the content that particular form is expressed and is stored and user's chosen content of code, also certainly including should The password of specific formation carries out expression and changes afterwards the situation compared with user's chosen content again, in other words, although this Invent and direct at " the correct information unit " of password for the simplicity of statement, but the correct information unit can have and a variety of shape be present Formula, such as form existing for its plaintext, form and other middle existence forms existing for ciphertext, applicant believes that, this area When technical staff contacts above related notion in the present invention, it can be fully understood.
The specific implementation of the present invention is disclosed in detail below with reference by several embodiments and accompanying drawing of the present invention:
Referring to Fig. 1, a kind of cryptographic check equipment of the present invention, including control unit 1, memory cell 5 and touch are aobvious Display screen 3.Described control unit 1 plays complete machine control action, is mainly used in performing and is realized according to the cryptographic check method of the present invention Program, so as to perform cryptographic check operation.Described memory cell 5, it is related to real to the cryptographic check method according to the present invention The permanently or temporarily storage of caused various intermediate data in the implementation procedure of existing program, for example, the preset password of user, Subsequently by caused candidate information unit, selected information unit collection etc. part or all, it may also be used in storage program The image, voice, state that are related to etc preset mark etc. is needed, those skilled in the art are it is to be understood that the side of the present invention The preset password of method and equipment need to permanently store (except it is non-resetting when change), whether entered as other data using the memory cell Row storage, for the method for the present invention, can flexibly be set by program, thus, for memory cell in the present invention Application, should not be construed as to the present invention relates to the restriction of memory technology.The cryptographic check method of the present invention, it is single in the control Under the scheduling of member 1, make full use of touch display screen 3 to realize man-machine interaction, or can also make in other embodiments common aobvious Display screen or touch display screen combination physical button, microphone, camera, infrared sensor, shock sensor, gyroscope etc. are realized Man-machine interaction, thereby, the cryptographic check operation of the present invention can be completed.
The facility subsequently illustrated for the present invention, if being preset with password in certain authenticating device, the password is believed by several Interest statement member, which sequentially concatenates, to be formed, and each information unit includes only a kind of information word, i.e. character information, for example, character string “1788”。
The method of the blurring verification password of the present invention, can be programmed realization by above equipment.Refer to below Flow chart shown in Fig. 2, and the please specific graphic user interface 80 presented by display screen 3 with reference to shown in Fig. 3.
In Fig. 3 of the present embodiment, the figure that is formed of first step as the method for the blurring verification password of the present invention Shape user interface 80, a particular display area 81 is shown, one group of candidate information unit is had in the viewing area 81, certainly These candidate information units can be arranged to multigroup, its group of number is only related to the facility journey of programming in the present embodiment Degree, the Spirit Essence that can flexibly set without influenceing the present embodiment.For the simplicity of description, by these occurred on display screen 3 Candidate information unit is considered as independent candidate information unit group.Described viewing area 81, can be on screen 3 in theory Region is arbitrarily designated, can be the border of screen in itself, any geometrical boundary can be not provided with, naturally it is also possible to as shown in Figure 5 For it, square boundary, or the border of other arbitrary shapes are set.
The corresponding candidate information unit group in the viewing area 81, all candidate information units in the group by by planning or Person randomly exports to be shown in the viewing area 81 with hashing.Candidate information unit group can include multiple information words, such as Character information member and color information member, are temporarily illustrated so that each candidate information unit group only includes character information member as an example.Often The information word of individual candidate information unit can totally 10 characters be formed by " 0 "-" 9 ", although in preset password only comprising " 1 ", The three kinds of information units in " 7 ", " 8 ", all candidate information units can then provide the other information unit of " 0 ", " 2 " ... etc, So as to strengthen the effect of its fuzzy expression.
Really, the information word particular content for the candidate information unit that candidate information unit group is included, also can flexibly change, Limited without character information in by the present embodiment.For example, the numerical character information word of candidate information unit can also be symbol, The information words such as English alphabet, icon.The type of information element of candidate information unit can also be not limited to character, can also be color The type of information element such as coloured silk, font, font size, pattern, image.For the needs of verification password, regardless of the candidate in candidate unit group How the information word content of information unit is set, and the information unit of the preset password should be incorporated into all candidate information units In at least one candidate information unit of group, the part or complete of the candidate information unit or the candidate information unit is formed Portion.For example, in order to verify the first password, its correct information unit should be character information member " 1 ", therefore, it is necessary to character " 1 " be wrapped Containing into wherein at least one candidate information unit, shown in the present embodiment Fig. 3,4 words are shown in graphic user interface 80 Accord with " 1 ", it is corresponding to be shown in viewing area 81, but position is mutually staggered.When preset password first place is first " 1 " only comprising character information When, then any one candidate information unit for including character " 1 " is the correct information unit of the first password, even if those are waited Information unit is selected also to include color information member so that four " 1 " are shown as red, green, blue, Huang Si kind colors on screen, this In the case of, " 1 " of any one color is selected, because candidate information unit corresponding to it contains character " 1 ", therefore should also regard the time Select the correct information unit that information unit is the first password.When preset password first place not only comprising character information first " 1 " but also When comprising color information member being " red ", then obviously, and if only if when have selected character " 1 " characterized with red, its institute Corresponding candidate information unit can just be considered as the correct information unit of the first preset password.
According to known password setting principle, in the candidate information unit, can both include each in the preset password The information unit of position sequence, is directly used these information units as candidate information unit, or the letter by these information units A part of the breath member as corresponding candidate information unit, can also or should include has with those preset password information units The other information unit of different information words.In the candidate information unit shown on screen, it is possibility to have multigroup that there is identical letter Cease the candidate information unit of member, on the one hand to strengthen the difficulty of decoding, on the one hand but can more convenient validated user password inspection Test.
In order to improve the difficulty for being spied on hypermnesia, before showing each candidate information unit every time, this can be treated The candidate information unit of display carries out random alignment, makes its disordering, and hash is finally exported in the viewing area 81 at interface 80 One group of candidate information unit.Thus, no matter user is the password for repeatedly inputting same position sequence, or in same password Multiple sequences character string multiple input, Peeping Tom is more difficult to remember entirety by the Rankine-Hugoniot relations of candidate information unit Layout, also just substantially increase Peeping Tom cracks difficulty.
In graphic user interface 80 shown in Fig. 3, several or all candidate information units on screen, in display screen On, such as arrange viewing area 81, then refered in particular in the range of its viewing area 81, carry out the motion of position real-time change.Each Candidate unit can both be moved in accordance with a certain formula for expressive movement track, in a manner of can also being changed at random by position Moved, can also be shown with the changeless static mode in position, it is ensured that the display position of all candidate information units Put and do not change.The scope of the viewing area 81 can be according to the display size and time of the information word of candidate information unit The number of information unit is selected to carry out appropriate constraint, it is same to ensure that these candidate information units do not focus on excessively as far as possible In concentrated area, only spend discrete.It is real with appropriate speed by the way that candidate information unit is designed as in viewing area 81 Now random drift, Peeping Tom are more difficult to remember simultaneously the content of multiple candidate information units of a certain concentrated area, therefore favorably In raising password cracking difficulty.Howsoever, the intersection of each candidate information unit is strengthened using known animation way of realization With reference to after reading this disclosure, should be those skilled in the art and work as understanding.
Continuing with combine Fig. 2 and Fig. 3, as the present invention blurring verification password method second step, it is necessary to realize User selectes to the ambiguity of target information unit coverage, namely realizes the ambiguityization expression of user's chosen content.Realize This ambiguity is selected, and in theory, can be showed by driving the target constituency 88 or the candidate information unit to realize On graphic user interface 80, it can desirably change target constituency 88 by user and the relative position of candidate information unit is closed System, to realize the setting of the relative position relation to target constituency 88 and candidate information unit, to determine that target constituency 88 is covered The number of the candidate information unit of lid reaches two or more.Set above-mentioned relative position relation, it is meant that Yong Huke With the appearance position by specifying target constituency 88 in real time, can also by changing the present position of known target constituency 88, or Change candidate information unit present position etc. mode to realize this setting, those skilled in the art should not be by its narrow definition Only to change known target constituency 88 or only changing candidate information unit present position to realize setting for this relative position relation It is fixed.
In the present embodiment, user can select the coverage in a target constituency 88 in several ways, but target is selected The relative position relation of area 88 and candidate information unit is arranged to be set on demand by user, and specific manifestation is finally true by user Set the goal the number of the candidate information unit that constituency 88 covered.These capped candidate information units, refer in particular to all Such as in the visualization plane of the graphic user interface 80 etc, fall into the target constituency 88 border and/or with the boundary-intersected Candidate information unit, regardless of whether those candidate information units belong to same candidate information unit group or different candidate informations Unit group.The border in target constituency 88 referred to herein, both include the outline of target constituency 88 showed by graphic plotting The visualization embodied sets border in fact, also includes not expressing and the void of its default physical extent in program with visual means If border;Both it had been included in the clear boundary that specific coordinate is specified in graphical interface of user 80, had also included in clear boundary On the basis of allow the ultimate bound that certain range of tolerable variance is extended or shunk.It should be noted that in order to realize the present invention Ambiguity expression effect, when selecting candidate information unit in the present invention, the letter of chosen (covering) can be specified by program The determination number of interest statement member, can not also specify determination number and be specified on demand by user, still, and if only if the target constituency 88 When covering two or more candidate information units, the necessary condition for selecting the target constituency 88 could be formed, from And realize to the selected of the target constituency 88.Be exemplified below it is several suitable for the present embodiment by sets target constituency 88 and candidate The relative position relation of information unit and realize selected method:
First, target constituency 88 and the method for selecting under candidate information unit simultaneously motion conditions.In this method for selecting, bag Include following steps:
(1) draw visual target constituency 88 and shown on graphic user interface 80, for example, Fig. 5 graphical user The target constituency 88 provided in interface 80 is a circle, and it, which has, is enough to cover the candidate information list shown at least three screen The radial dimension of member.The shape in target constituency 88 both can with rounded, certainly also can oval, square, polygon etc. it is various Rule or irregular shape, the outline coordinate in the target constituency 88 just constitute the border in the target constituency 88.Also, in pin When the verification carried out to some information unit in preset password starts, the target constituency 88 is i.e. with certain or variable speed Change its position and/or direction at random on graphic user interface 80 to realize the drift movement effects on interface 80.Need It is noted that the present invention is alleged to draw target constituency 88, wire expression as shown in Figure 3 is not limited to, can also be used all Such as color lump shade, figure layer shade, candidate information unit discoloration mode are realized, those skilled in the art should know this change It is logical.
(2) while keeping the target constituency 88 to do drift campaign, the candidate information list in the viewing area 81 Member also keep with the former similar or identical drift movement effects at random, its drift velocity can be flexibly true by those skilled in the art It is fixed, in order to which the candidate information unit that operator sees candidate information unit clearly and seen clearly into the target constituency 88 is defined, Implement finally selected user instruction so that user assigns in time.Understood with reference to step (1), (2), in target constituency 88 and candidate During information unit drift, target constituency 88 is natural to cover one or more candidate information units, because the present invention will It is that could form selected condition to seek the candidate information unit into target constituency 88 to have two or more, therefore, can With by the multiple candidate information unit of programming, always there is two or more candidate information units to carry out The adjacent focusing in position, this focusing refer to that these candidate information units are pre- less than or equal to some determination in physical distance If value.For example, a diameter of R in the circular target constituency 88 is set, if limiting any two neighboring candidate information unit Ultimate range be no more than R/3, then when target constituency 88 enter 81 middle part of particular display area when, just can easily simultaneously covering 3 Individual candidate information unit.All such examples, it can be realized easily by the spirit that those skilled in the art disclose according to the present invention.Thus may be used Can be that the graphic user interface 80 of the present invention sets the maximum of an acquiescence, the maximum of the acquiescence is described to understand The maximum lengthwise dimension in target constituency is with being intended to the ratio between selected candidate information unit number.In theory, the maximum of the acquiescence The maximum display size of graphic user interface is can even is that, such as the Diagonal Dimension of screen, and in practice then can be by ability Field technique personnel flexibly determine on demand, in practice generally in reference to upper example determine target constituency full-size and neighboring candidate information The relation of the distance of unit.Described default maximum, variable that both can be actual participate in specific calculating process, also can be by this Art personnel are silent in programming to be kept disclosed rule and realizes whether should not provide the acquiescence in plain text with program Value and to ignoring the presence of the default value.Stopped such as 0.5 second in other examples, if some position is arrived in target constituency manually Or after longer (short) time, candidate information unit can automatically move or transition to the target constituency in, it is clear that it is also replaceable The setting of the default maximum, those skilled in the art should know that this is flexible.
It should be noted that above-mentioned steps (1), (2) are not to refer in particular in time in two steps of precedence relationship, the above Two steps can parallel practice in time.
(3) user instruction for waiting user realizes final select.Specifically, user can be in the target constituency 88 When covering the candidate information unit of user's needs, a user instruction is triggered, realizes limit of the user to the position in target constituency 88 It is fixed, namely final setting is realized to the relative position relation of target constituency 88 and each candidate information unit, so as to also be achieved that The particular content of candidate information unit and the restriction of quantity that user is covered to target constituency 88.In the present invention, user instruction Triggering, for touch-screen 3, one can be considered as to the point selection operation of touch-screen arbitrary region or specific region with user User instruction, the user instruction is triggered when user touches screen, can also otherwise be realized, such as:Pass through camera Catch certain of some certain gestures of user or the visual horizontality for acting, user terminal being detected by gyroscope of some agreement Individual specific some special sound for manipulating, user being recognized by microphone instructs, recognizes user couple by shaking driver Rock, user is detected by infrared sensor certain gestures of terminal, by identifying one or more physical buttons It is in the conduction state etc., these touch-screens, camera, gyroscope, microphone, shock sensor, infrared sensor, physical button Etc. the input source (not shown) for constituting user instruction, user instruction is provided by these input sources to realize to the target constituency 88 it is selected.Once user defines the position in the target constituency 88, candidate's letter that the target constituency 88 can be utilized to be covered Interest statement member constructs a selected information unit collection.It should be noted that the selected information unit collection alleged by the present invention, refer to by The data set that multiple chosen candidate information units slap together, it is of course possible to data are carried out in the form of mathematical set concept Tissue, but be not construed as being only capable of being subject to data tissue with the set on mathematical concept.No matter by computer data structure Aggregate form is realized or realized with multiple simple variables in computer data structure, is regarded as not unconventional The Spirit Essence of invention.
2nd, candidate information unit is motionless and method for selecting under the motion conditions of target constituency 88.In this method for selecting, bag Include following steps:
(1) in a manner of with the first method for selecting identical, described target constituency 88 is drawn, and similarly make the mesh Mark constituency 88 carries out drift campaign on screen.
(2) it is different from the first method for selecting, in this method, all candidate information units are in its corresponding viewing area The scheme of the foregoing changeless static state display state in holding position referred to is used in domain 81.When the drift of target constituency 88 During motion, because candidate information unit remains stationary is motionless, a clearer graphic user interface 80 is may provide the user with, Be advantageous to the accurate operation of validated user.Certainly, in this case, ambiguity expression effect can be caused to decrease.With candidate The scheme identical that information unit carries out drift campaign is, it should be noted that with reference to foregoing mode, processing sets the target constituency Relation between 88 size and the distance of the candidate information unit of arbitrary neighborhood, it is ensured that target constituency 88 enters candidate information list First metapedes of viewing area 81 is to cover two or more candidate information units of static display simultaneously.
(3) realized using the method similar with the first method for selecting to the selected of target constituency 88, i.e., when target constituency During the candidate information unit that 88 drifts are wanted to covering user, target constituency 88 can be limited by a foregoing user instruction Position, relative position relation between target constituency 88 and at least part candidate information unit is determined, and determine the selected information Unit collection.
3rd, target constituency 88 is motionless and method for selecting in the case of candidate information unit motion.
Referring to Fig. 4, the graphic user interface 80 shown in Fig. 4 discloses the He of target constituency 88 that this method for selecting is applicable The layout that candidate information unit is formed.In this method, with reference to the first method for selecting, equally include three steps, however, its In (1) step, the position of the target constituency 88 drawn in graphical interface of user 80 is changeless, and Fig. 4 is by target The position in constituency 88 is fixed on screen center, and in (2) step, candidate information unit is then consistent with the first method for selecting, The scheme moved using candidate information unit, thus, in (3) step, when there is several candidate information units Drift is in target constituency 88, and when reaching the desired state of user, i.e., there are several candidate information lists in the target constituency 88 First and one of candidate information unit includes the information word that user wants, in this case, as long as user assigns described use Family instructs, you can determines the selected information unit collection under current state.
4th, the method for selecting under the passive situation of target constituency 88.In this method, comprise the following steps:
(1) target constituency 88 is drawn in manner previously described, it is ensured that the area in the target constituency 88 is enough to cover two Or more than two candidate information units.The initial position of 88 1 determinations in the target constituency is assigned, such as shown in Fig. 3, is stopped In the bottom of graphic user interface 80.
(2) it is used as input source (not shown), such as camera, touch-screen, gyroscope etc. by one of various input equipments Corresponding detecting user gesture, the touch control operation of user, user carry out horizontal control to authenticating device, and input is started with user When source performs above-mentioned artificial action, input source triggers first time user instruction, drives the target constituency 88 independently to be transported It is dynamic or continued by user action (corresponding such as continuously visually, continuously referring to and draw, continuously tilt authenticating device) And drive, change until user chooses the desired position of target constituency 88 (for instance in the target constituency position shown in Fig. 4) It is artificially acted.
(3) when user changes its artificial action, such as corresponding above-mentioned each input source can show as user to blink, remove From finger, stop tilting authenticating device etc., now input source triggers second of user instruction, the position residing for current goal constituency 88 Put and be just designated, at this moment, all candidate information units that target constituency 88 is covered can form described selected information unit Collection.
In this method for selecting, it is that the motion state variable in position is in position that can not consider candidate information unit Put changeless inactive state.
5th, the method for selecting under candidate information unit passive situation.In this method, comprise the following steps:
As the application of equivalent substitution, provided in advance in the above listed target constituency 88 of the present embodiment, non-dynamic generation Method for selecting in, no matter whether position is fixed or position dynamic change for candidate information unit, no matter target constituency 88 Whether it is kept in motion, can be in step (3) using the driving target constituency 88 as described in the 4th kind of method for selecting Mode receive the first user instruction, can drag and drop multiple candidate information lists successively under the driving of first user instruction Member, candidate information unit is additionally related to multi-functional passive entry described target constituency 88, thus, can similarly realize target constituency 88 to multiple times Select the covering of information unit.In this case, for the 4th kind of method for selecting, user not only can be by controlling candidate to believe The position of interest statement member, and can be by the position in control targe constituency 88, to realize candidate information unit and target constituency 88 The setting of relative position relation.
6th, the method for selecting in the case of the dynamic generation of target constituency 88.
As shown in figure 5, this method be easier to it is manually operated.Specifically, it is referred to shown in the first method for selecting, makes Candidate information unit holding in viewing area 81 either statically or dynamically shows that user selectes to the target area, by using One refers to a stroke operation generation caused by family.No matter whether the viewing area 81 and its interior candidate information unit move, as long as with See clearly desired candidate information unit in family, you can multiple candidate information units are streaked by finger, and ensure that this refers to stroke work The selection area scope formed passes through the candidate information unit that user wants, and program limits and makees to be formed when this refers to stroke Selection area by two or two with candidate information unit when, be just considered as user and be made that once effective to draw choosing dynamic Make, construct target constituency 88 based on this.When user's finger starts stroke, it is considered as user and triggers the first user instruction; When user's finger, which continues stroke, finally to frame out, equivalent to discharging or complete the user instruction, or it is considered as user's triggering Second event, that is, form second user instruction.How first instruction and second instruction are distinguished, can be flexibly real by programmer It is existing, do not influence the fact that user is autonomously formed target constituency 88 because of this division.From the first user instruction to second user Instruction, the selection area just formed, it is well known that formed selection area is drawn by the finger of user, it is not definitely accurate , but certain range of tolerable variance is contained, thus, user produces the target constituency 88 by referring to draw and dynamic, and with Candidate information unit in the range of the target constituency 88 covers determines the selected information unit collection, in itself with it is foregoing Various method for selecting belong to same inventive principle, without unconventional Spirit Essence of the invention.Mesh is determined it should be noted that referring to and drawing Constituency 88 is marked, due to multiple user instructions can be construed to, therefore there must be a final instruction (second user instruction), it is final by this Instruction produces specifies to the last of the present position of target constituency 88, is also achieved that target constituency 88 and the phase of candidate information unit Setting to position relationship.The scope that user draws choosing is broader, may more cover multiple candidate information units in theory, and this When, if program defines most candidate information unit numbers, it is contemplated that before intercepting the initiation region of target constituency 88 Several candidate information units are effective selected information unit collection, remaining unnecessary candidate information unit just constitute interference because Element, the ambiguity expression effect of the present invention can be strengthened.
Graphic user interface 80 shown in Fig. 5 discloses the utilization effect of this method for selecting, is given on interface 80 up and down Two consistent keyboard layouts.The keyboard layout of top, it is assumed that it is used for the first school for realizing foregoing preset password " 1788 " Test, then user can construct corresponding selected information unit collection by the selected character " 6 " of finger stroke, " 7 ", " 1 ".The keyboard cloth of lower section Office, it is assumed that it is used for the deputy verification for realizing foregoing preset password " 1788 ", then user by refer to draw a selected character " 7 ", " 3 ", " 1 " can construct corresponding selected information unit collection.Certainly, multiple keyboard layouts are provided on same graphic user interface Simply to illustrate that the convenience of multidigit cryptographic check, should not be construed as limiting the invention, those skilled in the art should When knowing, a graphic user interface 80 can be realized only with a keyboard layout.
Execution refer to draw operation when, the target constituency can be both shown in a manner of visual on screen, can not also be shown The target constituency, the candidate information unit that the former selectes user is more directly perceived, so as to strengthen interactivity;The latter then makes it more To be hidden, enhancing confidentiality.
Certainly, work is rowed to realize this dynamic generation mesh although preferably performing to refer on the touch screen 3 in this method for selecting The scheme in constituency 88 is marked, is set if those skilled in the art still should be appreciated that by a hanging gesture operation, can also be same Sample is construed to one by camera or infrared sensor and draws similar user instruction collection with referring to, so as to realize similar selection area Effect.Similarly, replacement means that are visual, tilting screen etc can also be entered by those skilled in the art according to this method for selecting Row is realized.
Above a variety of typical target constituency 88 method for selecting are listed for the present embodiment.Those skilled in the art should know Dawn, the spirit instructed by the example of the present invention, and a variety of input sources (not shown) disclosed, with reference to people in the art Cognition of the member to conventional techniques, can become and dissolve the diversified restriction method of target constituency 88.No matter target constituency 88 It is to be drawn by program previously given, or is specified in real time by user in checking procedure, be the Spirit Essence institute of the present invention The zone of reasonableness that should be included.
It is to realize verification as the step of key the 3rd of the method for present invention blurring verification password please continue to refer to Fig. 2 It is crucial.In the present embodiment, selected information unit collection is obtained via the first two steps, therefore this step is mainly to selected information The further utilization of unit collection.After this step obtains selected information unit collection, by the information of the position sequence to be verified in preset password Unit is compared with the selected information unit collection, when selected information unit collection includes described information unit, you can it is determined that with Family have selected the correct information unit in preset password, namely user correctly have selected it is identical with the information unit in preset password Content, verify successfully.
Need to be illustrated, if preset password is stored in this terminal (equipment), should transfer in memory Preset password is used for above-mentioned verification, if preset password is stored in distal end, can be sent to selected information unit collection accordingly Distal end perform this verification, finally return to whether verify successful feedback result by far-end server.
In addition, the candidate information unit shown in the present embodiment and the information unit in preset password, for the easy of statement It is reduced to only include single information word, therefore, can when information unit in preset password is compared with selected information unit collection So that the element of the information unit in preset password and selected information unit collection is carried out into congruent comparison.However, once being addressed as preceding, wait Information unit is selected to include multiple information words, for example, setting corresponding to first preset password " 1 ", the viewing area shown in Fig. 4 In 81, four characters " 1 " are expressed with red, green, blue, Huang respectively, namely four character " 1 " institutes corresponding in viewing area 81 The candidate information unit of category, two information words substantially are included, one is character information, secondly be color information, character information Expression is carried out with color information and is formed secure bond.Certainly, two information words can also one be pattern or image, another is word Symbol, pattern (image) can be the shapes of square frame or circle etc, can be by character when two information words carry out Visualization (image) is set in pattern or circle and shown.Two information words can also be the card formula of such as red heart, plum blossom, spade etc Pattern and some subject images, can be by a pattern and an image close to display when carrying out Visualization.It is foregoing to be In the preset password for simplifying description and setting, only with unique information word of the single character information as its information unit, this In the case of kind, the information word of the information unit in preset password is the whole of the information unit, the information list in preset password When member is compared with selected information unit collection, it is impossible to by the information unit (or its information word) in preset password and selected letter The element of interest statement metaset carries out directly congruence and compared, and should be by the information unit (or its information word) in preset password and choosing The each information word for determining the element of information unit collection is compared, that is, by information unit (or its information in preset password Member) enter row set in itself with the element of selected information unit collection compared with.In this case, as long as verifying to the letter in preset password In some information word, namely preset password of some element that interest statement member (or its information word) is congruent to selected information unit collection Information unit (or its information word) be contained in some element of selected information unit collection, that is, should determine that user have selected Correct information unit in preset password.The congruence (in) of information word alleged by the present invention, refers to the information unit in preset password Certain information word and selected information unit collection some information unit in some information word between, both have identical Content;The congruence (in) of information unit alleged by the present invention, refer to information unit and selected information unit collection in preset password In both some information units there is identical information word.
Thus the information unit suitable for preset password further extended includes two and more than two information words Embodiment in.Concrete example set as:If the preset password of certain authenticating device is sequentially concatenated by several information units and formed, each Information unit includes two kinds of information words, is character information respectively, and for expressing the color information of character color, for example, Green character " 1 ", red glyphs " 7 ", yellow character " 8 ", green character " 8 ".In principle, user is carried out close using authenticating device During code check, it is impossible to by simply inputting the character string " 1788 " without color characteristics to decrypt, but need sequentially to choose each The character of correct color, forms the correct characters that each position is respectively provided with correct color characteristics, could form whole correct information lists Member, it can just be considered as whole string cryptographic check success.In the third step for showing the present invention, in each of relatively preset password , it is necessary to each element that all information words of the information unit in preset password and selected information unit are concentrated during information unit All information words compared one by one, each information word of the information unit in and if only if preset password is belonged to or is equal to During the corresponding information member for the information unit that selected information unit is concentrated, just determine that user have selected preset password corresponding positions sequence just True information unit.
In order to further enhance blur effect, in above candidate information unit has the variation instance of multiple information words, Two or more candidate information units can be chosen, or believe in different candidates in same candidate information unit group In interest statement tuple, one or more candidate information units are respectively selected, make multiple such candidate information units at least have same Identical information word, for example, corresponding to the preset password " 1788 " for only including single information word previously with regard to information unit In character " 1 " exemplified by, four characters " 1 " shown in Fig. 3 can be made respectively with red, green, blue, yellow or in corresponding color lump In shown, or make the discrete character in several positions shown in Fig. 3 be shown using same color, thus, Peeping Tom It not only should be noted that the difference of character information, it is also noted that to the difference of color information, necessarily it is made to a certain extent Into obscuring.Obviously, when this variation instance is combined with the preset password that information unit has two kinds and two or more information words When, it can more highlight its ambiguity expression effect.Specifically, if if information element content is red character in preset password " 1 ", and set and the different character " 1 " of four display colors is included in the viewing area 81 shown in Fig. 3, in this case, by Character content " 1 " and the color characteristics selected by user must be remembered simultaneously in Peeping Tom, even if Peeping Tom repeatedly observes, by institute The content increase that need to be remembered, can also substantially reduce its hypermnesia effect.
As can be seen that by being arranged to described candidate information unit to include two or more information words, can To further enhance the expression of the ambiguityization of candidate information unit, namely the ambiguity of enhancing user's chosen content, user are difficult to lead to Cross and spy on hypermnesia or transcription is peeped and the mode such as looks into follow-up decryption, even if by way of data intercept stream, due to same choosing Determine information unit concentration and multiple chosen candidate information units be present, and also exist in same chosen candidate information unit Multiple information words, Data acquisition person to crack difficulty still higher, therefore, comprising multiple information words in candidate information unit Mode, the occasion of remote password verification is more suitable for, can be used for WiFi cryptographic checks, webpage cryptographic check etc..
Above in a kind of exemplary embodiment of the method for blurring verification password, both considered residing for candidate information unit The situation that position is fixed, it is also considered that the situation of candidate information unit Dynamic Announce in particular display area 81.It should be noted , this case of motion is mainly to be confined to be shown in the range of particular display area 81 by candidate information unit, therefore its Range of movement limited degree is higher.The viewing area 81 can actually expand to the whole size of user interface 80, should not be with display The illusory or real of region 81 sets border to limit the present invention.Random walk shows this permission candidate information unit in a wider context The scheme shown, the Dynamic Announce effect of the present invention is further liberated, would be even more beneficial to design more dynamic man-machine Interactive interface.
It is emphasized that the viewing area 81 of the candidate information unit can be designed as arbitrary shape, the target The forms of motion in constituency 88 can also be done appropriate adjustment by those skilled in the art, because shape and motion mode are difficult to exhaustion, be Length is saved, is not repeated for this reason.
A kind of typical embodiment of the method for present invention blurring verification password is disclosed in detail above, while is also given Some the general technology details gone out in the present invention.The method of inspection above is mainly for the independent position sequence in preset password Information unit is described, and corresponds to that foregoing several multidigit cryptographic check methods are further to be quoted below:
In the first multidigit cryptographic check method, can sequentially it be applicable according to multiple information units in preset password The method of the blurring verification password of the present invention verifies to each information unit of preset password, when it is determined that user have selected During all correct information units, feed back as a result, output characterizes whole preset password and verifies successful information, there is provided to follow-up Program uses, such as the program available for execution unlocking, program available for execution subsequent operation etc..This mode is comparatively Tradition, widely use, most typical application is in the unlocking screen for mobile terminal, it can also be used to the cryptographic check of ATM With webpage cryptographic check etc., it is it will be understood by those skilled in the art that so need not repeat.
Second of multidigit cryptographic check method, for previous embodiment, is referred to shown in Fig. 5, the top keyboard that Fig. 5 is provided In layout, suitably it is carried out using the 6th kind of method for selecting of target constituency 88 in previous embodiment.Specifically, performing During the second step of the method for present invention blurring verification password, it is allowed to which user is selected using the 6th kind of foregoing target constituency 88 Mode corresponds to multiple information units in preset password and disposable successively selected multiple target constituencies 88, and is performing the present invention , then can be according to the sequence of positions of preset password information contained unit, one by one when being blurred the third step of the method for verification password Accordingly, the selected information unit collection each target constituency 88 constructed and the information list of the relevant position in the preset password Member is verified, when sequence certain corresponding target constituency 88 in position has the information unit that corresponding positions sequence is included in the preset password When, as user have selected the correct information unit in the preset password, that is to say, that when all information lists in preset password Member is respectively corresponded when include by the selected information unit collection corresponding to each target constituency 88, the whole school for going here and there preset password The work(that accomplishes is tested, can be exported and be characterized the whole string successful signal of cryptographic check and be easy to perform subsequent action.
The third multidigit cryptographic check method is the improvement made on the basis of second of multidigit cryptographic check method, two The difference of person is only in that, in second of multidigit cryptographic check method, is emphasized suitable according to the arrangement of information unit in preset password Sequence, verified correspondingly compared with the selected information unit collection corresponding to the target constituency 88 selected with priority, and the 3rd In kind multidigit cryptographic check method, then this order need not be particular about, but when selected corresponding to any one target constituency 88 When information unit concentration includes any one information unit in preset password, you can be considered as the selected information unit collection and contain The correct information unit of this sequence of preset password.Obviously, this method reduces the complexity of code breaking, its security phase To reducing, but hardware requirement is necessarily reduced, therefore be suitable for application in some using only in the verification occasion of chip microcontroller.
The top of graphic user interface 80 disclosed in Fig. 3, Fig. 4 and Fig. 5, some circles are presented and punctuate 84, it is pre- for indicating If the verification state of the multi-bit information unit of password, belongs to conventional design well-known to those skilled in the art, does not repeat for this reason.
In any of the above multidigit cryptographic check method, in order to increase complexity, it may be considered that further arrange every information Unit verified before the quantity of candidate information unit that is covered of target constituency 88, and ensure that this quantity is equal.This Kind in the case of, for preset password every information unit and, have the selected information unit collection of fixed element number right therewith Should, improve computation complexity naturally, be less susceptible to by by spy on hypermnesia or transcription peep look into etc. in a manner of decoded.
In summary, although the present invention illustrates in form according to two embodiments, actually contains numerous and diverse A variety of variants, it is seen then that according to the method for the blurring verification password of the present invention, can be constructed by those skilled in the art a variety of Various programming process, being consequently formed diversified graphic user interface has man-machine interaction schemes.By the mould of the present invention Be gelatinized verification password method realize cryptographic check design, taken into account in plain text expression ambiguity and user operation it is easy-to-use Property, there is the characteristics of safe and reliable.
It is emphasized that programming can be presented various because of factors such as program language difference, personal style differences Change, thus, above-mentioned two checking procedure examples, it is intended to cast a brick to attract jade, should not be construed as limiting the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (15)

  1. A kind of 1. method for being blurred verification password, for verifying whether user have selected the preset password being made up of information unit In correct information unit, it is characterised in that it comprises the following steps:
    (1) hash shows multiple candidate information units, each information unit of the preset password comprising multiple password positions Candidate is supplied as candidate information unit therein;
    (2) setting of the change to target constituency and/or the position of the candidate information unit is received, to realize the target constituency The candidate information element number covered every time reaches two or more, target constituency is covered every time multiple described Candidate information unit is defined as the selected information unit collection of current password position;
    (3) by the information unit of the password of each password position with entering to the selected information unit collection that should determine that Row compares, and when selected information unit collection includes the information unit of the preset password, determines that user have selected in preset password Correct information unit.
  2. 2. the method for blurring verification password according to claim 1, it is characterised in that used in figure in the target constituency An initial position is given in the interface of family, under the driving of user instruction, the target constituency changes to final position and realized described Covering of the target constituency to candidate information unit.
  3. 3. the method for blurring verification password according to claim 1, it is characterised in that used by first in the target constituency Family instruction generates in graphical user interfaces, and is acted on by second user instruction and formed in graphical user interfaces to the time Select the covering of information unit.
  4. 4. the method for blurring verification password according to claim 1, it is characterised in that the target constituency is in figure circle Position in face immobilizes, and under the driving of user instruction, the candidate information unit present position is varied the target To realize covering of the target constituency to those candidate information units within the profile in constituency.
  5. 5. the method for blurring verification password according to claim 1, it is characterised in that the target constituency and the time Select both information units or one of the random motion in graphical user interfaces in a manner of position is variable, when the target constituency is covered When covering two or more candidate information units, it is allowed to which user instruction drives the target constituency to realize to candidate letter Interest statement member is selected.
  6. 6. the method for blurring verification password as claimed in any of claims 1 to 5, it is characterised in that when any Carve maximum of the distance no more than acquiescence of graphic user interface residing for per two neighboring candidate information unit.
  7. 7. the method for the blurring verification password according to any one in claim 6, it is characterised in that the acquiescence Maximum by the target constituency maximum lengthwise dimension and be intended to the ratio between selected candidate information unit number.
  8. 8. the method for the blurring verification password according to any one in claim 6, it is characterised in that the acquiescence Maximum is for the maximum display size for the screen for showing the graphic user interface, or is a certain pre-set dimension.
  9. 9. the method for blurring verification password as claimed in any of claims 1 to 5, it is characterised in that described Candidate information unit includes at least one information word, and described information member is character, font, font size, color, pattern or image, more Carry out Visualization is combined between individual information word in graphical user interfaces.
  10. 10. the method for blurring verification password according to claim 9, it is characterised in that the letter in the preset password Interest statement member includes two or more information words, when the information unit that the selected information unit is concentrated includes described preset During all information words of the information unit in password, it is considered as have selected correct information unit just now.
  11. 11. the method for blurring verification password as claimed in any of claims 1 to 5, it is characterised in that correspond to The selected instruction input source in the target constituency, by microphone, gyroscope, physical button, touch-screen, camera, infrared ray Any one or more in sensor, shock sensor provides.
  12. 12. the method for blurring verification password as claimed in any of claims 1 to 5, it is characterised in that the mesh Covering of the constituency to candidate information unit is marked, refers to the border that the candidate information unit falls into target constituency in visualization plane It is interior and/or with the boundary-intersected.
  13. 13. the method for blurring verification password as claimed in any of claims 1 to 5, it is characterised in that the step Suddenly in (1), before showing every group of candidate information unit every time, random hash row is carried out to all candidate information units in the group Cloth, and by the layout output display after arrangement.
  14. 14. the method for blurring verification password according to claim 3, it is characterised in that do not scheming in the target constituency Shown in shape user interface.
  15. 15. the cryptographic check equipment of a kind of method of blurring verification password for described in perform claim requirement 1, it includes using The memory cell of the program of this method and the control unit for performing the program are realized in storage, and for showing this method Graphic user interface display screen.
CN201410231428.7A 2014-05-28 2014-05-28 It is blurred the method and cryptographic check equipment of verification password Active CN104156652B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410231428.7A CN104156652B (en) 2014-05-28 2014-05-28 It is blurred the method and cryptographic check equipment of verification password
PCT/CN2014/081684 WO2015180237A1 (en) 2014-05-28 2014-07-04 Method for checking password in fuzzy mode and password checking device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410231428.7A CN104156652B (en) 2014-05-28 2014-05-28 It is blurred the method and cryptographic check equipment of verification password

Publications (2)

Publication Number Publication Date
CN104156652A CN104156652A (en) 2014-11-19
CN104156652B true CN104156652B (en) 2018-01-05

Family

ID=51882150

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410231428.7A Active CN104156652B (en) 2014-05-28 2014-05-28 It is blurred the method and cryptographic check equipment of verification password

Country Status (2)

Country Link
CN (1) CN104156652B (en)
WO (1) WO2015180237A1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069330B (en) * 2015-08-05 2018-01-19 东莞盛世科技电子实业有限公司 Password Indistinct Input method and device
CN105644500B (en) * 2016-02-05 2018-02-23 重庆广播电视大学 Car door opening control method based on wireless security system
CN105763763B (en) * 2016-02-05 2018-08-31 重庆工商职业学院 A kind of image encryption method
CN105760727B (en) * 2016-02-05 2018-08-31 重庆广播电视大学 A kind of ATM safety certifying methods based on image encryption
CN105787339B (en) * 2016-02-25 2019-04-02 东莞盛世科技电子实业有限公司 The method and device of Password Input based on target identification technology
CN105787335B (en) * 2016-02-25 2019-06-18 东莞盛世科技电子实业有限公司 Interface for password input method for handover control and device
CN107423589A (en) * 2016-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of cipher-code input method and device
CN107454452B (en) * 2017-09-12 2018-03-02 张玉红 Box program recommendation system and method on DVB
CN108427869A (en) * 2018-02-06 2018-08-21 广东欧珀移动通信有限公司 unlocking method, device, mobile terminal and storage medium
CN111612157B (en) * 2020-05-22 2023-06-30 四川无声信息技术有限公司 Training method, character recognition device, storage medium and electronic equipment
CN115080987A (en) * 2021-03-11 2022-09-20 中国移动通信集团山东有限公司 Password management method, device, system, storage medium and computer equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632075A (en) * 2013-10-17 2014-03-12 东莞盛世科技电子实业有限公司 Authentication device and authentication method

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200513087A (en) * 2003-09-19 2005-04-01 Hui Lin Mail server login security authentication system and method, and IC card authentication hardware
CN101464741B (en) * 2007-12-19 2011-12-07 联想(北京)有限公司 Touch panel and its use method and notebook computer with the same
CN101930511B (en) * 2009-06-25 2014-04-30 鸿富锦精密工业(深圳)有限公司 Password protection method
CN102148686B (en) * 2010-02-08 2014-05-28 中山大学 Character deformation-based graphical password authentication method
TWM410407U (en) * 2010-08-05 2011-08-21 Feng-Yuan Yang Dragging type authentication device
KR101841039B1 (en) * 2011-11-28 2018-03-28 삼성전자주식회사 Method for authenticating password and Portable Device thereof
CN103034798B (en) * 2012-12-14 2016-08-03 广东欧珀移动通信有限公司 A kind of generation method and device of random cipher
CN103634492B (en) * 2013-05-06 2018-04-27 王鹤儒 The guardian system and coordinate cryptographic system of mobile phone
CN104156655B (en) * 2014-05-28 2017-03-08 东莞盛世科技电子实业有限公司 Ambiguity cryptographic check method and cryptographic check equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632075A (en) * 2013-10-17 2014-03-12 东莞盛世科技电子实业有限公司 Authentication device and authentication method

Also Published As

Publication number Publication date
WO2015180237A1 (en) 2015-12-03
CN104156652A (en) 2014-11-19

Similar Documents

Publication Publication Date Title
CN104156652B (en) It is blurred the method and cryptographic check equipment of verification password
CN104156655B (en) Ambiguity cryptographic check method and cryptographic check equipment
CN105723379B (en) Promote the method and apparatus of secure screen input
Jansen Authenticating mobile device users through image selection
KR101142796B1 (en) Password Input Method Based on touch screen
US8638939B1 (en) User authentication on an electronic device
EP2763070B1 (en) Graphical user interface (GUI) that receives directional input to change face for receiving passcode
CN104156656B (en) The method and cryptographic check equipment of dynamic check password
US20120110663A1 (en) Apparatus and method for inputting user password
KR102393892B1 (en) Terminal device and method for performing user authentication using biometric information
WO2017215225A1 (en) Password unlocking method and device for terminal device, and terminal device
KR100958440B1 (en) A graphical password input system using wheel interface and the method thereof
JP2007086873A (en) Authentication device and authentication method
KR20080033600A (en) Security method for user input data to electronic device
KR20100095346A (en) Method of user authentication using the virtual keyboard and computer readable storage medium storing program for executing method thereof
WO2011049292A2 (en) Method for inputting a password using a touch screen
JP2014052837A (en) Information processor and information processing method, and program
CN105095740B (en) A kind of password is set and password decryption method
CN105930714A (en) Password input method and system as well as intelligent terminal
KR102246446B1 (en) Method and Device for Password and Unlocking Input using the Combination of Character and Pattern Image
KR20140030406A (en) Privacy protection method for number and letter entry
CN104680049B (en) A kind of unlocking method
JP5659284B1 (en) Program, server and communication terminal
JP2013127662A (en) Input information authentication device, server, input information authentication system, and program for the device
KR101659809B1 (en) Apparatus for input password for user authentication and method for thereof and system for thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant