CN109145569A - A kind of password generation system and method based on slice figure - Google Patents
A kind of password generation system and method based on slice figure Download PDFInfo
- Publication number
- CN109145569A CN109145569A CN201810801311.6A CN201810801311A CN109145569A CN 109145569 A CN109145569 A CN 109145569A CN 201810801311 A CN201810801311 A CN 201810801311A CN 109145569 A CN109145569 A CN 109145569A
- Authority
- CN
- China
- Prior art keywords
- password
- slice
- encrypted message
- input
- graph block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Document Processing Apparatus (AREA)
Abstract
The present invention relates to a kind of passwords based on slice figure to generate system and method, which includes: figure setup module, for selecting figure and its quantity for Password Input;Figure is sliced module, is sliced for the slicing mode and number of sections of every figure to be arranged, and according to slicing mode and number of sections to every figure;Password acquisition module is inputted, for acquiring the input encrypted message of user, the input encrypted message refers to the graph block of user's selection and selects the sequence of graph block;Secret generation module carries out the text-string that code conversion obtains corresponding graph block for will input the graph block in encrypted message based on HASH algorithm, and each text-string is stored as password by the sequence of the selection graph block in input encrypted message;Password database.Compared with prior art, the present invention has many advantages, such as that simple to operate, password space is big, is easy to remember, memory space is small and anti-shoulder is peeped.
Description
Technical field
The present invention relates to information security fields, generate system and side more particularly, to a kind of password based on slice figure
Method.
Background technique
In recent years, researchers at home and abroad constantly propose the scheme of many new graphical passwords.According to the memory of password
Existing graphical passwords scheme can be generally divided into three classes: the figure based on picture recognition mode by form and input mode
Password (recognition-based), the graphical passwords (recall-based) based on memory and the figure based on cued recall
Password (cued-recall).
(1) based on the graphical passwords scheme of picture recognition mode
The graphical passwords scheme based on picture recognition occurred earliest be Dhamija et al. in 2000 in USENIX safe year meeting
The D é j à Vu scheme of upper proposition replaces nonsensical character string using the random art picture that hash function generates.Certification
When, user only needs to select the password picture of registration phase setting on interface from the picture shown.Passfaces scheme
It is the figure password system based on face, starting point is that user compares general picture to the discrimination and Memorability of face
It is eager to excel, and this recognition capability is all little with culture background, education degree and intellectual level relationship, but has researcher's hair
Existing, most users tend to selection and face the people from the same race, this makes Passfaces password be predictable.
Davis et al. proposes Story scheme, and user selects several pictures to form a story in Story scheme, so that password figure
Piece sequence is easy to be remembered by user.The program very good solution user when using Passfaces is partial to select same
The drawbacks such as a race or anisotropic picture, improve the safety of system.The famous CHC scheme (Convex of performance is peeped to prevent shoulder
Hull Click) it needs user that can identify password picture from numerous pictures and the geometry being made of password picture can be chosen
Any one icon in region.The anti-shoulder scheme of peeping is the emphasis and hot spot studied in graphical passwords, from Sobrado and
Since Birget proposes that anti-shoulder peeps graphical passwords scheme, the graphical passwords scheme just peeped there are many different degrees of anti-shoulder has mentioned
Come.These schemes resist shoulder by the more complex conscientious process of challenge, the fascinating color of setting and various concealing technologies etc.
It peeps.
(2) based on the graphical passwords of memory
Graphical passwords scheme based on memory needs user freely to draw input of the width figure as its password in registration phase,
In authentication phase, user needs to recall and draws cipher graphic set by its registration phase again.The master of this kind of certificate scheme
Wanting advantage is, theoretical password space is very big, can effectively prevent brute force attack.But related Research on Memory shows not any
It can be a very difficult thing that certain things are recalled under the premise of prompt.This kind of scheme be Jermyn et al. in 1999
The 8th safe year of USENIX can go up the DAS(Draw-A-Secret of proposition) scheme.DAS is supplied to one N × N's of user
Grid canvas, user need to draw out the cipher graphic of oneself on this grid canvas.After DAS, researcher mentions again
Graphical passwords application scheme much based on this principle is gone out.Dunphy et al. proposed in 2007 two kinds directly against
The modified version of DAS is BDAS(Background DAS respectively) scheme and QDAS(Qualitative DAS) scheme.
BDAS joined background picture on the grid of DAS, to guide user to draw more complicated cipher graphic, to solve
Certainly the problem of user setting simple password, and also user can be helped to recall to a certain extent and reappear its password.QDAS is adopted
Reduce user's to relax the limitation to user's drawing with the corresponding relationship of a kind of new stroke and keying sequence
Memory burden.In addition, QDAS by fixed Mesh expansion be it is dynamic, so that it is had better anti-shoulder and peep performance.Pass-Go
Scheme will draw focus on from grid interior shifting to grid intersection, big while remaining DAS most advantage
Availability and safety are improved greatly.YAGP (Yet Another Graphical Password) scheme considers personal book
Habit is write, so that drawing password can more embody personality, more convenient user's operation.In business application, Google is public
It takes charge of and was proposed a mobile phone unlock scheme similar with Pass-Go scheme in 2008, be applied in Android phone, adopt
The unlock that uses gesture carries out simple subscriber authentication.Microsoft Corporation was also proposed in 2012 applied to Windows
The figure password scheme of 8 systems.
(3) based on the graphical passwords of cued recall
Graphical passwords scheme based on cued recall is generally user and provides a background picture, it is desirable that user by mouse or
Handwriting input device selects certain positions on background picture to form one and clicks password of the sequence as user.Background at this time
Picture can reduce the memory burden of user as important prompt information.
Blonder scheme is the work of the representative of this kind of scheme, and is also the graphical passwords scheme occurred earliest, Yong Hutong
It crosses and clicks predefined position sequentially to carry out authentication.V-GO scheme is the business that Passlogix company proposes
Change security solution, using the picture for containing several articles for daily use, each article has a sightless predefined boundary,
For for user prompt can favored area, improve the availability of Blonder scheme.Pass Points scheme solves the side V-GO
Case is to the selectional restriction problem of background picture, and any picture can be used as background picture in Pass Points scheme, and
And there is no limit no need to reserve adopted regions for selection of the user to region in picture.CCP(Cued Click Points) it requires
User sequentially selects a region respectively in five background pictures, eliminates the mode issue in Pass Points, but hot spot
Problem still remains.PCCP(Persuasive Cued Click-Points) it is similar with CCP, user's selection can be promoted more
Random password is to mitigate the influence of hot issue.
More or less all there are some drawbacks in above-mentioned graphical passwords scheme, for example excessively inconvenience is defeated for figure input limitation
Enter, the quantity of figure it is excessive need a large amount of memory space, graphic feature excessively complexity to be not easy to remember, anti-shoulder peep performance it is bad,
Cannot effectively anti-spyware, cannot to resist brute force attack, password space small etc., therefore do not answered widely mostly
With.So also can only simply be used in lesser field now.
Summary of the invention
The object of the invention is in order to overcome the above-mentioned prior art, there are current text cryptographic systems to be not easy to remember, safety
Property not high problem and graphical passwords in figure input limitation excessively be inconvenient to input, the excessive needs of the quantity of figure largely
Memory space, graphic feature excessively complexity be not easy to remember, anti-shoulder peep performance it is bad, cannot effectively anti-spyware, cannot support
The defects of violence is attacked, password space is small, and a kind of password generation system and method based on slice figure is provided, it is this new
The graphical passwords scheme of type only needs to occupy a small amount of memory space for storing cipher graphic, and using can be as text is close
Code is equally convenient, and password is easier to remember and recall than text password series, has simple to operate, password space
Greatly, it is easy to remember, the advantages that memory space is small and anti-shoulder is peeped.
The purpose of the present invention can be achieved through the following technical solutions:
It is a kind of to include: based on the password generation system for being sliced figure
Figure setup module, for selecting figure and its quantity for Password Input;
Figure is sliced module, for the slicing mode and number of sections of every figure to be arranged, and according to slicing mode and number of slices
Amount is sliced every figure, and the figure after slice is made of multiple graph blocks;
Password acquisition module is inputted, for acquiring the input encrypted message of user, the input encrypted message refers to that user selects
Graph block and select graph block sequence;
Secret generation module is corresponded to for the graph block inputted in encrypted message to be carried out code conversion based on HASH algorithm
The text-string of graph block, and by the sequence of the selection graph block in input encrypted message be stored as each text-string close
Code.
It further includes password database that the password, which generates system, and secret generation module obtains close when for storing setting password
Code.
It further includes password comparison module that the password, which generates system, and secret generation module obtains close when for that will verify password
Code is compared with password pre-stored in password database, if comparing consistent, it is correct for password to verify cryptographic results, if
Compare it is inconsistent, then verify cryptographic results be password bad.
The figure is general graphical and customized figure according to setting classification of type.
The slicing mode is the graph block that figure is sliced to the rectangle for M row N column.
A kind of method for generating cipher code based on slice figure, comprising the following steps:
S1: selection be used for Password Input figure and its quantity, the figure according to setting classification of type be general graphical and from
Define figure;
S2: the slicing mode and number of sections of every figure of setting, and according to slicing mode and number of sections to every figure into
Row is sliced, and the figure after slice is made of multiple graph blocks;
S3: when setting password, the input encrypted message of user is acquired, the input encrypted message refers to the graph block of user's selection
And the sequence of selection graph block;
S4: the text word that code conversion obtains corresponding graph block is carried out for the graph block in encrypted message is inputted based on HASH algorithm
Symbol string, and each text-string is stored as password by the sequence of the selection graph block in input encrypted message, and be stored in password
In database, the comparison of encrypted message is inputted when for verifying password.
The comparison of input encrypted message refers to when verifying password: acquiring the input encrypted message of user when verifying password and obtains
Take corresponding password, by verify password when user the corresponding password of input encrypted message with it is pre-stored in password database
Password is compared, if comparing unanimously, verifying cryptographic results is that password is correct, if comparison is inconsistent, verifies cryptographic results
For password bad.
The figure is general graphical and customized figure according to setting classification of type.
The slicing mode is the graph block that figure is sliced to the rectangle for M row N column.
Compared with prior art, the present invention designs a kind of graphical passwords scheme of mixed type, and compatible existing text is close
Code system, has the advantage that program Password Input is easy to operate, and memory space is small and password space is big, so that entire close
The safety of code is improved.The figure that the present invention is readily able to memory is sliced, and all can serve as password per a piece of figure
Input, while the input of compatible existing text character, compile figure using HASH algorithm during submitting password
Code generates a text-string password with existing password system compatible.Simultaneously as this cryptography scheme uses user certainly
The personalised graphical of definition, these personalized figures can effectively resist the threat and can effectively resist violence that shoulder is peeped
Attack etc., so the cryptography scheme is also very safe.
Detailed description of the invention
Fig. 1 is that the present invention is based on the structural schematic diagrams that the password of slice figure generates system;
Fig. 2 is general graphical schematic diagram in embodiment;
Fig. 3 is customized pictorial diagram in embodiment;
Fig. 4 is 3 × 3 slicing mode schematic diagrames in embodiment;
Fig. 5 is 4 × 4 slicing mode schematic diagrames in embodiment;
Fig. 6 is the password string schematic diagram that the input of centre of figure region is clicked in embodiment;
Fig. 7 is the password string schematic diagram that region input in the figure right side is clicked in embodiment.
Specific embodiment
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.The present embodiment is with technical solution of the present invention
Premised on implemented, the detailed implementation method and specific operation process are given, but protection scope of the present invention is not limited to
Following embodiments.
As shown in Figure 1, a kind of password generation system based on slice figure includes:
Figure setup module, for selecting figure and its quantity for Password Input.Figure is logical according to setting classification of type
With figure and customized figure.
Universal figure can be set to the figure of some common clear-cut individualities in the world, and the blue sky such as WINDOWS is white
Cloud atlas piece etc.;The personal picture that user likes can be set in customized figure, the picture of such as personal design, self-timer picture even with
The picture etc. that the individual that hand photographed likes, these pictures can enhance the memory and memory of user.
Figure is sliced module, for the slicing mode and number of sections of every figure to be arranged, and according to slicing mode and cuts
Piece quantity is sliced every figure, and the figure after slice is made of multiple graph blocks.
All cipher graphics are all placed in input panel, be free to toggle between figure, in Fig. 2, are had
Six pictures know to be currently shown in the 5th by the switching display window (six dots) below Fig. 2 for switching.It is defeated
The cipher graphic for entering most original on panel is some general graphicals, and user can according to need the customized figure of addition.For
The cipher graphic quantity of input can be freely arranged as needed.
Slicing mode is the graph block that figure is sliced to the rectangle for M row N column.Every figure is divided into M*N figures
Shape slice, each be sliced all can serve as the tablet pattern of password, and the value of M and N, which can according to need, to be freely arranged and switch.
Password acquisition module is inputted, for acquiring the input encrypted message of user, input encrypted message refers to that user selects
Graph block and select graph block sequence.The input that the figure slice in input panel carries out graphical passwords is clicked, substantially
95 text characters can be inputted by keyboard.
Secret generation module, for carrying out code conversion acquisition for the graph block in encrypted message is inputted based on HASH algorithm
The text-string of corresponding graph block, and store each text-string by the sequence of the selection graph block in input encrypted message
For password.The figure slice of all inputs is not directly stored and is verified.The figure of input is sliced during submission
Code conversion all is carried out using HASH algorithm, being converted into a text-string by figure slice (can be according to the demand of user
The number of self-defining text-string), these text-strings are used for the storage and verifying of password, can be with existing password
Storage system is compatible.
Password database, the password that secret generation module obtains when for storing setting password.
Password comparison module, when for password will to be verified in the password and password database of secret generation module acquisition in advance
The password of storage is compared, if comparing unanimously, verifying cryptographic results is that password is correct, if comparison is inconsistent, verifies close
Code result is password bad.
Using based on slice figure password generate system realize password generate method the following steps are included:
S1: selection is used for the figure and its quantity of Password Input, and figure is general graphical and customized according to setting classification of type
Figure;
S2: the slicing mode and number of sections of every figure of setting, and according to slicing mode and number of sections to every figure into
Row is sliced, and the figure after slice is made of multiple graph blocks;
S3: when setting password, acquiring the input encrypted message of user, input encrypted message refer to user's selection graph block and
Select the sequence of graph block;
S4: the text word that code conversion obtains corresponding graph block is carried out for the graph block in encrypted message is inputted based on HASH algorithm
Symbol string, and each text-string is stored as password by the sequence of the selection graph block in input encrypted message, and be stored in password
In database, the comparison of encrypted message is inputted when for verifying password.
The comparison of input encrypted message refers to when verifying password: acquiring the input encrypted message of user when verifying password and obtains
Take corresponding password, by verify password when user the corresponding password of input encrypted message with it is pre-stored in password database
Password is compared, if comparing unanimously, verifying cryptographic results is that password is correct, if comparison is inconsistent, verifies cryptographic results
For password bad.
As illustrated in figs. 2-7, Fig. 2 is general graphical to present system design interface, and Fig. 3 is customized figure, these figures
It can also be finely divided as needed.Wherein general graphical is some common figures in the world, such as the blue sky and white cloud figure of WINDOWS
Piece (as shown in Figure 2) and some world's famous paintings etc., customized figure are the figure of user oneself, such as photo of some shootings
Deng these figures are proprietary for user.Arbitrary picture can be arranged according to the hobby of individual subscriber in customized figure, be user
The proprietary picture of people, it is possible to the effective attack resisting shoulder and peeping.
All cipher graphics are all placed in input panel, and as shown in Fig. 2-Fig. 3, the present embodiment is provided with 2 certainly
Totally 6 figures, this 6 figures can be switched one by one by horizontally slipping in graphics field for definition figure and 4 general graphicals,
Or the switching display window region clicked below picture is arbitrarily switched.
As shown in Figure 4 and Figure 5, the figure that every figure is divided into M*N is sliced, each slice all can serve as password
Tablet pattern.The value of the M and N of same figure, which can according to need, to be freely arranged and switches.Blue sky and white cloud figure can root
It is each to be sliced the input figure that all can serve as password according to the slice for needing to switch to 3 × 34 × 4 or other slices
Shape.If what is selected is 4 × 4 slice, this figure then has 4*4=16 slices, that is, has 16 small input figures
Shape, all independent input as password of these figures.
As shown in Figure 6 and Figure 7, the input that the figure slice in input panel carries out graphical passwords is clicked, all inputs
Figure slice is not directly stored and is verified.The figure of input is sliced all to be carried out using HASH algorithm during submission
Code conversion is converted into a text-string by figure slice.In Fig. 6, the intermediate region slice of figure is clicked, is passed through
The code conversion of MD5 algorithm, generates the character string of 17e8e8b2d8baa22e8cc8e21ad0448192, then clicks the area You Zhong
The slice in domain then generates the character string of 94b390a938a94679c3f29a909f43569f, the input of two figures slice again
Then be converted to 17e8e8b2d8baa22e8cc8e21ad044819294b390a938a94679c3f29a90 9f43569f this
The input of the text-string of one 64 byte of sample.Other 95 basic text characters can be inputted by keyboard.
This programme selects the picture with distinct personality to input cipher graphic, so being easy to remember and recall, every figure
Shape is sliced again, and each is sliced and all can serve as the input of password, thus several a small number of figures can be formed it is huge
Password space;Figure for Password Input is few, and the password space of several figures can be up to a hundred, if M*N is set
5 are set to, then 4 figures can achieve 100 password space, password space is just bigger if M*N value is bigger, and is used for
The several hundred K in space for storing this 4 figures are even more small, therefore space memory space is small;This programme allows user to use individual's
Figure is as cipher graphic, since the customized figure of user only has user to be held, if the figure is as close
Code figure is just that see this figure be exactly one of password to attacker, but can not get this figure, therefore also can not
Carry out cracking and inputting for password.And since the graphical passwords of input will carry out turning for text-string by HASH algorithm
It changes, the password of final use and storage is textual form, has been compatible with existing password storage system.
Claims (9)
1. a kind of password based on slice figure generates system characterized by comprising
Figure setup module, for selecting figure and its quantity for Password Input;
Figure is sliced module, for the slicing mode and number of sections of every figure to be arranged, and according to slicing mode and number of slices
Amount is sliced every figure, and the figure after slice is made of multiple graph blocks;
Password acquisition module is inputted, for acquiring the input encrypted message of user, the input encrypted message refers to that user selects
Graph block and select graph block sequence;
Secret generation module is corresponded to for the graph block inputted in encrypted message to be carried out code conversion based on HASH algorithm
The text-string of graph block, and by the sequence of the selection graph block in input encrypted message be stored as each text-string close
Code.
2. a kind of password based on slice figure according to claim 1 generates system, which is characterized in that the password generates
System further includes password database, the password that secret generation module obtains when for storing setting password.
3. a kind of password based on slice figure according to claim 2 generates system, which is characterized in that the password generates
System further includes password comparison module, pre- in the password and password database that secret generation module obtains when for that will verify password
The password first stored is compared, if comparing unanimously, verifying cryptographic results is that password is correct, if comparison is inconsistent, verifies
Cryptographic results are password bad.
4. a kind of password based on slice figure according to claim 1 generates system, which is characterized in that the figure root
It is general graphical and customized figure according to setting classification of type.
5. a kind of password based on slice figure according to claim 1 generates system, which is characterized in that the slice side
Formula is the graph block that figure is sliced to the rectangle for M row N column.
6. a kind of method for generating cipher code based on slice figure, which comprises the following steps:
S1: selection be used for Password Input figure and its quantity, the figure according to setting classification of type be general graphical and from
Define figure;
S2: the slicing mode and number of sections of every figure of setting, and according to slicing mode and number of sections to every figure into
Row is sliced, and the figure after slice is made of multiple graph blocks;
S3: when setting password, the input encrypted message of user is acquired, the input encrypted message refers to the graph block of user's selection
And the sequence of selection graph block;
S4: the text word that code conversion obtains corresponding graph block is carried out for the graph block in encrypted message is inputted based on HASH algorithm
Symbol string, and each text-string is stored as password by the sequence of the selection graph block in input encrypted message, and be stored in password
In database, the comparison of encrypted message is inputted when for verifying password.
7. a kind of method for generating cipher code based on slice figure according to claim 6, which is characterized in that when verifying password
The comparison of input encrypted message refers to: acquiring the input encrypted message of user when verifying password and obtains corresponding password, will test
The corresponding password of input encrypted message of user is compared with password pre-stored in password database when demonstrate,proving password, if than
To consistent, then verifying cryptographic results is that password is correct, if comparison is inconsistent, verifying cryptographic results is password bad.
8. a kind of method for generating cipher code based on slice figure according to claim 6, which is characterized in that the figure root
It is general graphical and customized figure according to setting classification of type.
9. a kind of method for generating cipher code based on slice figure according to claim 6, which is characterized in that the slice side
Formula is the graph block that figure is sliced to the rectangle for M row N column.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810801311.6A CN109145569B (en) | 2018-07-20 | 2018-07-20 | Password generation system and method based on slice graph |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810801311.6A CN109145569B (en) | 2018-07-20 | 2018-07-20 | Password generation system and method based on slice graph |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109145569A true CN109145569A (en) | 2019-01-04 |
CN109145569B CN109145569B (en) | 2022-05-06 |
Family
ID=64801163
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810801311.6A Active CN109145569B (en) | 2018-07-20 | 2018-07-20 | Password generation system and method based on slice graph |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109145569B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111027040A (en) * | 2019-11-21 | 2020-04-17 | 中国农业银行股份有限公司 | Password setting method, password verification method and devices corresponding to methods |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101079697A (en) * | 2006-10-08 | 2007-11-28 | 腾讯科技(深圳)有限公司 | A method and system for improving security of network account |
CN103595531A (en) * | 2012-08-17 | 2014-02-19 | 财团法人工业技术研究院 | Graphic password authentication system and method for preventing shoulder surfing attack |
CN106997432A (en) * | 2017-05-17 | 2017-08-01 | 苏州锦佰安信息技术有限公司 | Picture password authentication method and picture password authentication device |
CN107665298A (en) * | 2017-09-29 | 2018-02-06 | 厦门大学嘉庚学院 | Password generation system and method based on figure |
-
2018
- 2018-07-20 CN CN201810801311.6A patent/CN109145569B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101079697A (en) * | 2006-10-08 | 2007-11-28 | 腾讯科技(深圳)有限公司 | A method and system for improving security of network account |
CN103595531A (en) * | 2012-08-17 | 2014-02-19 | 财团法人工业技术研究院 | Graphic password authentication system and method for preventing shoulder surfing attack |
CN106997432A (en) * | 2017-05-17 | 2017-08-01 | 苏州锦佰安信息技术有限公司 | Picture password authentication method and picture password authentication device |
CN107665298A (en) * | 2017-09-29 | 2018-02-06 | 厦门大学嘉庚学院 | Password generation system and method based on figure |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111027040A (en) * | 2019-11-21 | 2020-04-17 | 中国农业银行股份有限公司 | Password setting method, password verification method and devices corresponding to methods |
Also Published As
Publication number | Publication date |
---|---|
CN109145569B (en) | 2022-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2766019C (en) | Computing device with graphical authentication interface | |
Khan et al. | A graphical password based system for small mobile devices | |
Sreelatha et al. | Authentication schemes for session passwords using color and images | |
TWI510954B (en) | A method and a device for generating a secret value | |
Rao et al. | Novel shoulder-surfing resistant authentication schemes using text-graphical passwords | |
US20120159592A1 (en) | Multi-layered color-sensitive passwords | |
Ray | Ray’s scheme: Graphical password based hybrid authentication system for smart hand held devices | |
Khan et al. | G-RAT| a novel graphical randomized authentication technique for consumer smart devices | |
Yang | PassPositions: A secure and user-friendly graphical password scheme | |
CN105678159A (en) | Unlocking method and device | |
Ritter et al. | Miba: Multitouch image-based authentication on smartphones | |
WO2016183952A1 (en) | Unlocking method and terminal | |
CN107665298A (en) | Password generation system and method based on figure | |
WO2019137489A1 (en) | Password input method, device, and computer-readable storage medium | |
CN108073802B (en) | Password input protection system and method | |
CN109145569A (en) | A kind of password generation system and method based on slice figure | |
US20210026943A1 (en) | System and method incorporating graphical aids for the creation and retreival of alphanumeric passwords | |
US9613201B1 (en) | Access control by a mobile device using an image | |
Shankar et al. | IPCT: A scheme for mobile authentication | |
US20160292402A1 (en) | Password input method and system based on two-stage conversion | |
US10263972B1 (en) | Authenticating by labeling | |
Ahsan et al. | Graphical password authentication using images sequence | |
Khan et al. | A hybrid graphical password based system | |
Gokhale et al. | Graphical password authentication techniques: a review | |
Alam | SUIS: An online graphical signature-based user identification system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |