CN105488365B - Verification method and device - Google Patents

Verification method and device Download PDF

Info

Publication number
CN105488365B
CN105488365B CN201410472813.0A CN201410472813A CN105488365B CN 105488365 B CN105488365 B CN 105488365B CN 201410472813 A CN201410472813 A CN 201410472813A CN 105488365 B CN105488365 B CN 105488365B
Authority
CN
China
Prior art keywords
password
handwriting
verification
user
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410472813.0A
Other languages
Chinese (zh)
Other versions
CN105488365A (en
Inventor
曾岳伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410472813.0A priority Critical patent/CN105488365B/en
Priority to CN202010022126.4A priority patent/CN111241500A/en
Publication of CN105488365A publication Critical patent/CN105488365A/en
Application granted granted Critical
Publication of CN105488365B publication Critical patent/CN105488365B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a checking method and a checking device. The method comprises the following steps: acquiring a confusion password input by a user; judging whether the obfuscated password comprises a check password set by a user; and if the obfuscated password comprises the verification password, confirming that the verification is passed. The technical scheme of the application can enhance the safety of the verification password.

Description

Verification method and device
Technical Field
The present application relates to the field of information security technologies, and in particular, to a verification method and apparatus.
Background
With the wide development of internet technology, the information security problem is particularly prominent. When people use various APPs (application software) loaded on a terminal to entertain and shop, a password is generally required to be input for identity verification.
Taking the payment password as an example, when the user inputs the payment password on the terminal to pay, if the user is in a crowd, the payment password input by the user is likely to be seen by other people, so that the risk that the payment password is stolen is increased, and great hidden danger is brought to the account security of the user.
Disclosure of Invention
In view of the above, the present application provides a verification method and apparatus.
Specifically, the method is realized through the following technical scheme:
a method of verification, the method comprising:
acquiring a confusion password input by a user;
judging whether the obfuscated password comprises a check password set by a user;
and if the obfuscated password comprises the verification password, confirming that the verification is passed.
Further, the determining whether the obfuscated password includes a verification password set by the user includes:
dividing the confusion password into N sections according to the input sequence of a user, wherein N is a natural number which is more than or equal to 1;
and judging whether one or more sections of obfuscated passwords are matched with the verification password according to a preset combination rule, and if one or more sections of obfuscated passwords are matched with the verification password, confirming that the obfuscated passwords comprise the verification password. Further, the determining whether the obfuscated password includes a verification password set by the user includes:
segmenting the confusion password and the verification password respectively according to the input sequence of a user;
and judging whether the obfuscated password comprises each section of verification password, and if the obfuscated password comprises each section of verification password, confirming that the obfuscated password comprises the verification password.
Further, the determining whether the obfuscated password includes a verification password set by the user includes:
and judging whether each character of the verification password is included in the obfuscated password.
Further, the determining whether each character of the password for confusion includes the check password comprises:
and judging whether each character of the verification password is included in the obfuscated password according to the input sequence of the user.
Further, before obtaining the obfuscated password input by the user, the method further includes:
acquiring a first check password and a second check password input by a user;
and when the first check password is matched with the second check password, setting the first check password or the second check password as the check password.
Further, the obfuscated password includes: one or more of letters, numbers, Chinese characters, and figures.
A verification device, the device comprising:
a first acquisition unit that acquires an obfuscated password input by a user;
the password judgment unit is used for judging whether the obfuscated password comprises a check password set by a user;
and the password verification unit is used for confirming that the verification is passed when the obfuscated password comprises the verification password.
Further, the password judgment unit divides the obfuscated password into N segments according to the input sequence of the user, wherein N is a natural number greater than or equal to 1;
and judging whether one or more sections of obfuscated passwords are matched with the verification password according to a preset combination rule, and if one or more sections of obfuscated passwords are matched with the verification password, confirming that the obfuscated passwords comprise the verification password.
Further, the password judgment unit specifically segments the obfuscated password and the verification password according to an input sequence of a user;
and judging whether the obfuscated password comprises each section of verification password, and if the obfuscated password comprises each section of verification password, confirming that the obfuscated password comprises the verification password.
Further, the password determination unit specifically determines whether each character of the verified password is included in the obfuscated password.
Further, the password determination unit specifically determines whether each character of the verification password is included in the obfuscated password according to an input sequence of a user.
Further, the apparatus further comprises:
the second acquisition unit is used for acquiring the first check password and the second check password input by the user;
and a password setting unit that sets the first verification password or the second verification password as the verification password when the first verification password and the second verification password match.
Further, the obfuscated password includes: one or more of letters, numbers, Chinese characters, and figures.
It can be seen from the above description that, in the password verification process, when the obfuscated password input by the user includes the verification password set by the user, the verification can be confirmed to pass, so that when the user is in the crowd, the user can realize the verification by inputting the obfuscated password including the verification password, even if the obfuscated password is peeped by other people, the user cannot know the real verification password, and the security of the verification password is enhanced.
Drawings
Fig. 1 is a schematic flowchart of a verification method in an embodiment of the present application.
Fig. 2 is a schematic flow chart of a verification method in another embodiment of the present application.
Fig. 3 is a schematic diagram of a verification password according to an embodiment of the present application.
FIG. 4 is a diagram of an obfuscated password according to an embodiment of the present application.
FIG. 5 is a diagram of another obfuscated password in an embodiment of the present application.
Fig. 6 is a schematic structural diagram of a verification apparatus in an embodiment of the present application.
Fig. 7 is a schematic structural diagram of a verification device in another embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In order to solve the problems, the application provides a verification scheme which can effectively enhance the safety of password verification.
Referring to fig. 1, the present application provides a verification method, which includes the following steps:
step 101, obtaining the confusion password input by the user.
And 102, judging whether the obfuscated password comprises a verification password set by a user.
And 103, if the obfuscated password comprises the verification password, confirming that the verification is passed.
It can be seen from the above description that, in the password verification process, when the obfuscated password input by the user includes the verification password set by the user, the verification can be confirmed to pass, so that when the user is in the crowd, the user can realize the verification by inputting the obfuscated password including the verification password, even if the obfuscated password is peeped by other people, the user cannot know the real verification password, and the security of the verification password is enhanced.
Specific implementations of the present application are described in detail below with reference to examples.
Referring to fig. 2, a flow chart of a verification method in an embodiment of the present application is shown, where the verification method is used to verify a password input by a user. The application scenario of password verification can be login, payment and the like. The verification method may include the steps of:
step 201, a first verification password and a second verification password input by a user are obtained.
In this embodiment, in an application scenario where a handwriting password needs to be verified, a user needs to set a verification password in advance. Specifically, the client may provide a setting interface for a user to check a password, and generally speaking, the user is required to input two check passwords in the setting interface, which may be referred to as a first check password and a second check password respectively. The password includes: one or more of letters, numbers, chinese characters, and figures may be freely combined by a user, which is not limited in this application.
Step 202, determining whether the first check password and the second check password match, and if the first check password and the second check password match, executing step 203.
Based on the foregoing step 201, after the first check password and the second check password are obtained, it is determined whether the first check password and the second check password are matched. If the first and second verification passwords match, step 203 is performed. If the first check password and the second check password are not matched, a non-matching prompt can be output to remind the user to input the first check password and the second check password again.
Specifically, in this step, the first verification password and the second verification password may be matched according to a preset matching rule. The preset matching rules comprise: pattern matching, character matching, etc., as this is not a limitation of the present application. Taking the pattern matching as an example, when the pattern matching degree of the first check password and the second check password reaches a preset ratio, for example: and 90%, confirming that the first check password and the second check password are matched. In this embodiment, a pattern matching algorithm known in the related art may be selected to match the first check code and the second check code, for example: a least squares matching algorithm, a feature matching algorithm, etc., which are not limited in this application.
It should be noted that the present step may be executed by the client or the server. If the verification is executed by the server, the client is required to send the acquired first verification password and the acquired second verification password input by the user to the server for the server to judge. Preferably, this step is performed by the client to relieve stress on the server.
Step 203, setting the first check password or the second check password as a check password.
In this step, the first check password or the second check password is set as a check password, and the check password is saved for the user to determine when checking the password.
It should be noted that, if step 202 is executed by the client, in this step, the client needs to send the check password to the server for the server to store.
Step 204, obtaining the confusion password input by the user.
When the user needs to perform identity verification, the client provides a user interface for the user to input a password. Generally speaking, a user needs to input a preset verification password in the user interface for identity verification. In the application, the user can input the confusion password comprising the verification password to realize the identity verification.
Step 205, determining whether the obfuscated password includes the check password, and if the obfuscated password includes the check password, executing step 206.
In this step, the obfuscated password and the verification password may be determined according to a preset matching rule, and if the obfuscated password includes the verification password, step 206 is performed. And if the obfuscated password does not comprise the verification password, outputting a prompt to remind the user to re-input the obfuscated password.
Taking the matching rule as the example of pattern matching, segmenting the obfuscated passwords according to the input sequence of a user, and then judging whether one or more segments of obfuscated passwords are matched with the verification passwords. For a confusing password input by a user, the confusing password may be segmented according to the number of times the user inputs. Specifically, it is an input by the user from the time the user's finger touches the touch screen until the user leaves the touch screen. The obfuscated password may come from one input by the user or from multiple inputs by the user. For example, the obfuscated password C is usually from one input of the user, and the obfuscated password K may be from one input of the user, or may be from two or three inputs of the user, depending on the input habits of the user.
In this embodiment, the obfuscated password is divided into N sections according to the input sequence of the user, where N is a natural number greater than or equal to 1, and then one or more sections of obfuscated passwords are combined together according to a preset combination rule to determine whether the obfuscated passwords match the verification password. Referring to fig. 3 and 4, it is assumed that fig. 3 is a verification password ABC set by a user in an embodiment of the present application, and fig. 4 is a obfuscated password KABCD input by the user, and for convenience of description, it is assumed that the obfuscated password may be divided into 5 segments, which are respectively: K. a, B, C and D, i.e., the user completes entry of the obfuscated password by 5 entries, one character at a time. The preset combination rule can be set by a developer, such as: and matching each section of obfuscated password with the verification password, if the matching is not successful, matching any two sections of combinations of 5 sections of obfuscated passwords with the verification password, and if the matching is not successful, matching any three sections of the 5 sections of obfuscated passwords with the verification password after being combined, and so on, and the application is not limited in this respect.
Preferably, the matching is performed starting from the first obfuscated password entered by the user and the verification password. Such as: firstly, judging whether the first section of confusion password K is matched with the check password ABC or not. And if not, judging whether the combination KA of the first section of the confusion password K and the second section of the confusion password A is matched with the check password ABC or not. And if not, judging whether a combination KAB matched with the first three sections of obfuscated passwords is matched with the verification password ABC or not, and repeating the steps. And when the combination of the first section of the obfuscated password K and other sections of the obfuscated passwords is not matched with the verification password ABC, judging from the second section of the obfuscated password A. If the combination ABC of the second, third and fourth obfuscated passwords a, B and C is found to match the check password ABC, the step 206 is executed if the obfuscated password KABCD includes the check password ABC.
It should be noted that, for the graph matching, in the verification of the present application, the verification password may be considered as the whole graph, and the verification password is not segmented. Referring further to fig. 5, if the obfuscated password input by the user is KBCAD, it can be confirmed that the obfuscated password KBCAD does not include the verification password ABC, and the matching fails according to the above method. In a preferred embodiment of the present application, the verification password input by the user may also be segmented according to the input sequence, and then it is determined whether each segment of the verification password is included in the obfuscated password. Still referring to fig. 5, if the obfuscated password input by the user is KBCAD, assuming that the obfuscated password is segmented into K, B, C, A and D and the check password ABC set by the user is segmented into A, B and C, if it is judged that B, C, A in the obfuscated password and each segment in the check password are: B. c, A, step 206 is performed.
Taking the matching rule as an example of character matching, in this step, it is determined whether each character of the verification password is included in the obfuscated password. Such as: and judging whether the obfuscated password comprises a verification password set by the user according to the password input sequence of the user. For example, the user sets the verification password to be 1234, and the user inputs the obfuscated password to be 781234, and the obfuscated password includes the verification password. For character matching, it is necessary to perform character distinguishing on the obfuscated password input by the user at the time of judgment, that is, to split the obfuscated password into characters "7", "8", "1", "2", "3", "4", and then judge whether the characters "1", "2", "3", "4" of the verification password 1234 are included therein.
In the actual implementation process, for character matching, it is also not necessary to distinguish whether the order of the verification passwords included in the confusion password is consistent with the order set by the user during verification. Taking the user-set verification password of 1234 as an example, if the obfuscated password entered by the user is 782341, each character of the verification password is included in the obfuscated password, and the verification is confirmed to pass. The specific verification method may be set by a developer, and the present application is not limited thereto.
Of course, the pattern matching and the character matching may also be used in combination, for example, first performing the character matching, and then performing the pattern matching after the character matching is successful, or selectively selecting the corresponding matching mode according to a certain condition, for example: according to the risk level of the user, when the risk level of the user is high, graph matching is selected, and when the risk level of the user is low, character matching is selected. Meanwhile, the above pattern matching or character matching can be used alone, or can be used in combination with other security verification methods, such as: a digital certificate.
Step 206, the verification is confirmed to pass.
It should be noted that, in the present application, the process of verifying the obfuscated password input by the user in steps 204 to 206 may be executed by the client, or may be executed by the server. If the client executes the password, the client needs to store the verification password set by the user, and when the user inputs the obfuscated password, the obfuscated password is verified according to the verification password. If the verification password is executed by the server, the client does not store the verification password set by the user, and after receiving the confusion password input by the user through the touch screen, the client sends the confusion password to the server, and the server judges the confusion password and returns a judgment result.
It can be seen from the above description that, in the password verification process, when the obfuscated password input by the user includes the verification password set by the user, the verification can be confirmed to pass, so that when the user is in the crowd, the user can realize the verification by inputting the obfuscated password including the verification password, even if the obfuscated password is peeped by other people, the user cannot know the real verification password, and the security of the verification password is enhanced.
Corresponding to the embodiment of the checking method, the application also provides a checking device. The apparatus described in this application may be implemented by software, or by hardware, or by a combination of hardware and software. Taking software implementation as an example, the verification device of the present application is a device in a logical sense, and is formed by reading corresponding computer program instructions in a non-volatile memory into a memory through a processor of a device in which the verification device is located to run.
Referring to fig. 6 and 7, the present application provides a verification apparatus 600, where the verification apparatus 600 includes: a first acquisition unit 601, a password judgment unit 602, a password verification unit 603, a second acquisition unit 604, and a password setting unit 605.
The first acquisition unit 601 acquires an obfuscated password input by a user.
The password determination unit 602 determines whether the obfuscated password includes a verification password set by the user.
The password verification unit 603, when the obfuscated password includes the verification password, confirms that the verification is passed.
Further, the password determination unit 602 divides the obfuscated password into N segments according to an input sequence of the user, where N is a natural number greater than or equal to 1;
and judging whether one or more sections of obfuscated passwords are matched with the verification password according to a preset combination rule, and if one or more sections of obfuscated passwords are matched with the verification password, confirming that the obfuscated passwords comprise the verification password.
Further, the password determination unit 602 specifically segments the obfuscated password and the verification password according to an input sequence of a user;
and judging whether the obfuscated password comprises each section of verification password, and if the obfuscated password comprises each section of verification password, confirming that the obfuscated password comprises the verification password.
Further, the password determination unit 602 specifically determines whether each character of the verified password is included in the obfuscated password.
Further, the password determination unit 602 specifically determines whether each character of the verification password is included in the obfuscated password according to an input sequence of the user.
Further, the apparatus further comprises:
the second obtaining unit 604 obtains the first verification password and the second verification password input by the user.
The password setting unit 605 sets the first verification password or the second verification password as the verification password when the first verification password and the second verification password match.
Further, the obfuscated password includes: one or more of letters, numbers, Chinese characters, and figures.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (12)

1. A method of verification, the method comprising:
according to the risk level of the user, selecting handwriting matching when the risk level of the user is high, and selecting character matching when the risk level of the user is low;
when the selected matching mode is handwriting matching, acquiring a handwriting confusion password input by a user; wherein, the order of the handwriting confusion passwords is different from the order of the handwriting verification passwords set by the user; judging whether each handwriting character in the handwriting verification password set by the user is included in the handwriting confusion password;
and if the obfuscated password comprises each handwriting character in the handwriting verification password, confirming that the verification is passed.
2. The method of claim 1,
the judging whether each handwriting character in the handwriting confusion password set by the user comprises:
dividing the handwriting confusion password into N sections according to the input sequence of a user, wherein N is a natural number which is more than or equal to 1;
judging whether one or more sections of handwriting confusion passwords are matched with the handwriting verification passwords according to a preset combination rule, and if one or more sections of handwriting confusion passwords are matched with the handwriting verification passwords, confirming that each handwriting character in the handwriting confusion passwords comprises each handwriting character in the verification passwords.
3. The method of claim 1,
the judging whether each handwriting character in the handwriting confusion password set by the user comprises:
segmenting the handwriting confusion password and the handwriting verification password respectively according to the input sequence of a user;
and judging whether the handwriting confusion password comprises each section of handwriting check password, and if the handwriting confusion password comprises each section of handwriting check password, confirming that each handwriting character in the handwriting check password is contained in the handwriting confusion password.
4. The method of claim 1,
when the selected matching mode is character matching, acquiring a character confusion password input by a user;
judging whether each character in the character confusion password set by the user is included in the character verification password;
and if the character confusion password comprises each character in the character verification password, confirming that the verification is passed.
5. The method of claim 4,
the judging whether each character in the character confusion password set by the user is included comprises the following steps:
and judging whether each character of the character confusion password set by the user is included in the character confusion password according to the input sequence of the user.
6. The method of claim 1, prior to obtaining a handwriting obfuscation password entered by a user, the method further comprising:
acquiring a first handwriting check password and a second handwriting check password input by a user;
and when the first handwriting verification password is matched with the second handwriting verification password, setting the first handwriting verification password or the second handwriting verification password as the handwriting verification password.
7. A verification apparatus, the apparatus comprising:
the selecting unit selects handwriting matching when the user risk level is high and selects character matching when the user risk level is low according to the user risk level;
the first acquisition unit is used for acquiring a handwriting confusion password input by a user when the selected matching mode is handwriting matching; wherein, the order of the handwriting confusion passwords is different from the order of the handwriting verification passwords set by the user;
the password judgment unit is used for judging whether each handwriting character in the handwriting check password set by the user is included in the handwriting confusion password;
and the password verification unit is used for confirming that the verification is passed when the handwriting confusion password comprises each handwriting character in the handwriting verification password.
8. The apparatus of claim 7,
the password judgment unit divides the handwriting confusion password into N sections according to the input sequence of the user, wherein N is a natural number which is more than or equal to 1;
judging whether one or more sections of handwriting confusion passwords are matched with the handwriting verification passwords according to a preset combination rule, and if one or more sections of handwriting confusion passwords are matched with the handwriting verification passwords, confirming that each handwriting character in the handwriting confusion passwords comprises each handwriting character in the verification passwords.
9. The apparatus of claim 7,
the password judgment unit is used for segmenting the handwriting confusion password and the handwriting verification password respectively according to the input sequence of a user;
and judging whether the handwriting confusion password comprises each section of handwriting check password, and if the handwriting confusion password comprises each section of handwriting check password, confirming that each handwriting character in the handwriting check password is contained in the handwriting confusion password.
10. The apparatus of claim 7,
the first obtaining unit is used for obtaining a character confusion password input by a user when the selected matching mode is character matching;
the password judgment unit is used for specifically judging whether each character in the character confusion password set by the user is included;
the password verification unit is specifically configured to confirm that verification is passed when the character obfuscated password includes each character in the character verification password.
11. The apparatus of claim 10,
the password judgment unit specifically judges whether each character in the character confusion password set by the user is included in the character verification password according to the input sequence of the user.
12. The apparatus of claim 7, further comprising:
the second acquisition unit is used for acquiring a first handwriting check password and a second handwriting check password input by a user;
and the password setting unit is used for setting the first handwriting verification password or the second handwriting verification password as the handwriting verification password when the first handwriting verification password is matched with the second handwriting verification password.
CN201410472813.0A 2014-09-16 2014-09-16 Verification method and device Active CN105488365B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410472813.0A CN105488365B (en) 2014-09-16 2014-09-16 Verification method and device
CN202010022126.4A CN111241500A (en) 2014-09-16 2014-09-16 Verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410472813.0A CN105488365B (en) 2014-09-16 2014-09-16 Verification method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202010022126.4A Division CN111241500A (en) 2014-09-16 2014-09-16 Verification method and device

Publications (2)

Publication Number Publication Date
CN105488365A CN105488365A (en) 2016-04-13
CN105488365B true CN105488365B (en) 2020-01-24

Family

ID=55675340

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010022126.4A Pending CN111241500A (en) 2014-09-16 2014-09-16 Verification method and device
CN201410472813.0A Active CN105488365B (en) 2014-09-16 2014-09-16 Verification method and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202010022126.4A Pending CN111241500A (en) 2014-09-16 2014-09-16 Verification method and device

Country Status (1)

Country Link
CN (2) CN111241500A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6551352B2 (en) * 2016-09-28 2019-07-31 京セラドキュメントソリューションズ株式会社 Password authentication device
US11036839B2 (en) 2018-12-14 2021-06-15 Beijing Didi Infinity Technology And Development Co., Ltd. Password authentication with input pattern analysis

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
CN103971048A (en) * 2014-04-30 2014-08-06 宇龙计算机通信科技(深圳)有限公司 Method and system for entering password
CN104063169A (en) * 2014-04-09 2014-09-24 苏州天鸣信息科技有限公司 Unlocking method based on touch screen

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7735124B2 (en) * 2005-03-24 2010-06-08 Chyi-Yeu Lin Password input and verification method
CN101079697B (en) * 2006-10-08 2010-08-25 腾讯科技(深圳)有限公司 A method and system for improving security of network account
CN101290647A (en) * 2007-04-19 2008-10-22 鸿富锦精密工业(深圳)有限公司 Password protection apparatus and method and cipher keyboard
CN101316166A (en) * 2008-07-07 2008-12-03 张寄望 Dynamic password identity authentication method based on accidental character set
CN101604366B (en) * 2009-07-13 2013-03-06 中山爱科数字科技股份有限公司 Password separate dynamic verification method and system
CN102279923A (en) * 2010-06-12 2011-12-14 安凯(广州)微电子技术有限公司 Multi-fingerprint encryption method for raising encryption level
CN102098315A (en) * 2011-03-02 2011-06-15 中国工商银行股份有限公司 Secure login method, device and system for client
CN102957682A (en) * 2011-08-30 2013-03-06 北京百度网讯科技有限公司 Method and equipment for providing picture verification code based on verification security level
CN103678976A (en) * 2012-09-18 2014-03-26 阿里巴巴集团控股有限公司 Method for authenticating identity through handwriting input device and handwriting input device
CN103824033A (en) * 2014-01-02 2014-05-28 南京永泰电子有限公司 Touch display device for safely inputting password information and password input method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
CN104063169A (en) * 2014-04-09 2014-09-24 苏州天鸣信息科技有限公司 Unlocking method based on touch screen
CN103971048A (en) * 2014-04-30 2014-08-06 宇龙计算机通信科技(深圳)有限公司 Method and system for entering password

Also Published As

Publication number Publication date
CN105488365A (en) 2016-04-13
CN111241500A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
US11637824B2 (en) Multi-factor authentication devices
CN108900559B (en) Login certificate management method and device, computer equipment and storage medium
CN106453205B (en) identity verification method and device
CN111241517B (en) Method and device for constructing biological feature verification question-answer library
US20160014120A1 (en) Method, server, client and system for verifying verification codes
Sen et al. Putting ‘pressure’on mobile authentication
CN105184567B (en) Processing method, processing unit and the mobile terminal of information
Nguyen et al. Smartwatches Locking Methods: A Comparative Study.
CN104065666B (en) A kind of method and device for generating picture validation code
KR20150050666A (en) Pattern Inputting Apparatus and Method, and Recording Medium Using the Same
KR20170065000A (en) Concealed data matching device, concealed data matching program, and concealed data matching method
CN105337739B (en) Safe login method, device, server and terminal
US11347831B2 (en) System and method for user recognition based on cognitive interactions
CN111327570B (en) Authentication method, apparatus and computer-readable storage medium
CN105488365B (en) Verification method and device
US20150254453A1 (en) Password management system
Moraskar et al. Cued click point technique for graphical password authentication
EP3440805A1 (en) Method and system for secure password storage
CN107516218B (en) User identity authentication method and device based on multiple features
CN106779717B (en) Payment authentication method and device
CN106131001B (en) A kind of verification method and verifying device
CN109241728B (en) Method and device for acquiring password information, computer equipment and storage medium
KR20180112302A (en) User authentication method based on face recognition
KR101420160B1 (en) Variable password generation method and internet authentication system using the same
CN107392039B (en) Computer hard disk data encryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200918

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200918

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right