CN109145569A - A kind of password generation system and method based on slice figure - Google Patents

A kind of password generation system and method based on slice figure Download PDF

Info

Publication number
CN109145569A
CN109145569A CN201810801311.6A CN201810801311A CN109145569A CN 109145569 A CN109145569 A CN 109145569A CN 201810801311 A CN201810801311 A CN 201810801311A CN 109145569 A CN109145569 A CN 109145569A
Authority
CN
China
Prior art keywords
password
slice
encrypted message
input
graph block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810801311.6A
Other languages
Chinese (zh)
Other versions
CN109145569B (en
Inventor
曾党泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen University Tan Kah Kee College
Original Assignee
Xiamen University Tan Kah Kee College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen University Tan Kah Kee College filed Critical Xiamen University Tan Kah Kee College
Priority to CN201810801311.6A priority Critical patent/CN109145569B/en
Publication of CN109145569A publication Critical patent/CN109145569A/en
Application granted granted Critical
Publication of CN109145569B publication Critical patent/CN109145569B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The present invention relates to a kind of passwords based on slice figure to generate system and method, which includes: figure setup module, for selecting figure and its quantity for Password Input;Figure is sliced module, is sliced for the slicing mode and number of sections of every figure to be arranged, and according to slicing mode and number of sections to every figure;Password acquisition module is inputted, for acquiring the input encrypted message of user, the input encrypted message refers to the graph block of user's selection and selects the sequence of graph block;Secret generation module carries out the text-string that code conversion obtains corresponding graph block for will input the graph block in encrypted message based on HASH algorithm, and each text-string is stored as password by the sequence of the selection graph block in input encrypted message;Password database.Compared with prior art, the present invention has many advantages, such as that simple to operate, password space is big, is easy to remember, memory space is small and anti-shoulder is peeped.

Description

A kind of password generation system and method based on slice figure
Technical field
The present invention relates to information security fields, generate system and side more particularly, to a kind of password based on slice figure Method.
Background technique
In recent years, researchers at home and abroad constantly propose the scheme of many new graphical passwords.According to the memory of password Existing graphical passwords scheme can be generally divided into three classes: the figure based on picture recognition mode by form and input mode Password (recognition-based), the graphical passwords (recall-based) based on memory and the figure based on cued recall Password (cued-recall).
(1) based on the graphical passwords scheme of picture recognition mode
The graphical passwords scheme based on picture recognition occurred earliest be Dhamija et al. in 2000 in USENIX safe year meeting The D é j à Vu scheme of upper proposition replaces nonsensical character string using the random art picture that hash function generates.Certification When, user only needs to select the password picture of registration phase setting on interface from the picture shown.Passfaces scheme It is the figure password system based on face, starting point is that user compares general picture to the discrimination and Memorability of face It is eager to excel, and this recognition capability is all little with culture background, education degree and intellectual level relationship, but has researcher's hair Existing, most users tend to selection and face the people from the same race, this makes Passfaces password be predictable. Davis et al. proposes Story scheme, and user selects several pictures to form a story in Story scheme, so that password figure Piece sequence is easy to be remembered by user.The program very good solution user when using Passfaces is partial to select same The drawbacks such as a race or anisotropic picture, improve the safety of system.The famous CHC scheme (Convex of performance is peeped to prevent shoulder Hull Click) it needs user that can identify password picture from numerous pictures and the geometry being made of password picture can be chosen Any one icon in region.The anti-shoulder scheme of peeping is the emphasis and hot spot studied in graphical passwords, from Sobrado and Since Birget proposes that anti-shoulder peeps graphical passwords scheme, the graphical passwords scheme just peeped there are many different degrees of anti-shoulder has mentioned Come.These schemes resist shoulder by the more complex conscientious process of challenge, the fascinating color of setting and various concealing technologies etc. It peeps.
(2) based on the graphical passwords of memory
Graphical passwords scheme based on memory needs user freely to draw input of the width figure as its password in registration phase, In authentication phase, user needs to recall and draws cipher graphic set by its registration phase again.The master of this kind of certificate scheme Wanting advantage is, theoretical password space is very big, can effectively prevent brute force attack.But related Research on Memory shows not any It can be a very difficult thing that certain things are recalled under the premise of prompt.This kind of scheme be Jermyn et al. in 1999 The 8th safe year of USENIX can go up the DAS(Draw-A-Secret of proposition) scheme.DAS is supplied to one N × N's of user Grid canvas, user need to draw out the cipher graphic of oneself on this grid canvas.After DAS, researcher mentions again Graphical passwords application scheme much based on this principle is gone out.Dunphy et al. proposed in 2007 two kinds directly against The modified version of DAS is BDAS(Background DAS respectively) scheme and QDAS(Qualitative DAS) scheme. BDAS joined background picture on the grid of DAS, to guide user to draw more complicated cipher graphic, to solve Certainly the problem of user setting simple password, and also user can be helped to recall to a certain extent and reappear its password.QDAS is adopted Reduce user's to relax the limitation to user's drawing with the corresponding relationship of a kind of new stroke and keying sequence Memory burden.In addition, QDAS by fixed Mesh expansion be it is dynamic, so that it is had better anti-shoulder and peep performance.Pass-Go Scheme will draw focus on from grid interior shifting to grid intersection, big while remaining DAS most advantage Availability and safety are improved greatly.YAGP (Yet Another Graphical Password) scheme considers personal book Habit is write, so that drawing password can more embody personality, more convenient user's operation.In business application, Google is public It takes charge of and was proposed a mobile phone unlock scheme similar with Pass-Go scheme in 2008, be applied in Android phone, adopt The unlock that uses gesture carries out simple subscriber authentication.Microsoft Corporation was also proposed in 2012 applied to Windows The figure password scheme of 8 systems.
(3) based on the graphical passwords of cued recall
Graphical passwords scheme based on cued recall is generally user and provides a background picture, it is desirable that user by mouse or Handwriting input device selects certain positions on background picture to form one and clicks password of the sequence as user.Background at this time Picture can reduce the memory burden of user as important prompt information.
Blonder scheme is the work of the representative of this kind of scheme, and is also the graphical passwords scheme occurred earliest, Yong Hutong It crosses and clicks predefined position sequentially to carry out authentication.V-GO scheme is the business that Passlogix company proposes Change security solution, using the picture for containing several articles for daily use, each article has a sightless predefined boundary, For for user prompt can favored area, improve the availability of Blonder scheme.Pass Points scheme solves the side V-GO Case is to the selectional restriction problem of background picture, and any picture can be used as background picture in Pass Points scheme, and And there is no limit no need to reserve adopted regions for selection of the user to region in picture.CCP(Cued Click Points) it requires User sequentially selects a region respectively in five background pictures, eliminates the mode issue in Pass Points, but hot spot Problem still remains.PCCP(Persuasive Cued Click-Points) it is similar with CCP, user's selection can be promoted more Random password is to mitigate the influence of hot issue.
More or less all there are some drawbacks in above-mentioned graphical passwords scheme, for example excessively inconvenience is defeated for figure input limitation Enter, the quantity of figure it is excessive need a large amount of memory space, graphic feature excessively complexity to be not easy to remember, anti-shoulder peep performance it is bad, Cannot effectively anti-spyware, cannot to resist brute force attack, password space small etc., therefore do not answered widely mostly With.So also can only simply be used in lesser field now.
Summary of the invention
The object of the invention is in order to overcome the above-mentioned prior art, there are current text cryptographic systems to be not easy to remember, safety Property not high problem and graphical passwords in figure input limitation excessively be inconvenient to input, the excessive needs of the quantity of figure largely Memory space, graphic feature excessively complexity be not easy to remember, anti-shoulder peep performance it is bad, cannot effectively anti-spyware, cannot support The defects of violence is attacked, password space is small, and a kind of password generation system and method based on slice figure is provided, it is this new The graphical passwords scheme of type only needs to occupy a small amount of memory space for storing cipher graphic, and using can be as text is close Code is equally convenient, and password is easier to remember and recall than text password series, has simple to operate, password space Greatly, it is easy to remember, the advantages that memory space is small and anti-shoulder is peeped.
The purpose of the present invention can be achieved through the following technical solutions:
It is a kind of to include: based on the password generation system for being sliced figure
Figure setup module, for selecting figure and its quantity for Password Input;
Figure is sliced module, for the slicing mode and number of sections of every figure to be arranged, and according to slicing mode and number of slices Amount is sliced every figure, and the figure after slice is made of multiple graph blocks;
Password acquisition module is inputted, for acquiring the input encrypted message of user, the input encrypted message refers to that user selects Graph block and select graph block sequence;
Secret generation module is corresponded to for the graph block inputted in encrypted message to be carried out code conversion based on HASH algorithm The text-string of graph block, and by the sequence of the selection graph block in input encrypted message be stored as each text-string close Code.
It further includes password database that the password, which generates system, and secret generation module obtains close when for storing setting password Code.
It further includes password comparison module that the password, which generates system, and secret generation module obtains close when for that will verify password Code is compared with password pre-stored in password database, if comparing consistent, it is correct for password to verify cryptographic results, if Compare it is inconsistent, then verify cryptographic results be password bad.
The figure is general graphical and customized figure according to setting classification of type.
The slicing mode is the graph block that figure is sliced to the rectangle for M row N column.
A kind of method for generating cipher code based on slice figure, comprising the following steps:
S1: selection be used for Password Input figure and its quantity, the figure according to setting classification of type be general graphical and from Define figure;
S2: the slicing mode and number of sections of every figure of setting, and according to slicing mode and number of sections to every figure into Row is sliced, and the figure after slice is made of multiple graph blocks;
S3: when setting password, the input encrypted message of user is acquired, the input encrypted message refers to the graph block of user's selection And the sequence of selection graph block;
S4: the text word that code conversion obtains corresponding graph block is carried out for the graph block in encrypted message is inputted based on HASH algorithm Symbol string, and each text-string is stored as password by the sequence of the selection graph block in input encrypted message, and be stored in password In database, the comparison of encrypted message is inputted when for verifying password.
The comparison of input encrypted message refers to when verifying password: acquiring the input encrypted message of user when verifying password and obtains Take corresponding password, by verify password when user the corresponding password of input encrypted message with it is pre-stored in password database Password is compared, if comparing unanimously, verifying cryptographic results is that password is correct, if comparison is inconsistent, verifies cryptographic results For password bad.
The figure is general graphical and customized figure according to setting classification of type.
The slicing mode is the graph block that figure is sliced to the rectangle for M row N column.
Compared with prior art, the present invention designs a kind of graphical passwords scheme of mixed type, and compatible existing text is close Code system, has the advantage that program Password Input is easy to operate, and memory space is small and password space is big, so that entire close The safety of code is improved.The figure that the present invention is readily able to memory is sliced, and all can serve as password per a piece of figure Input, while the input of compatible existing text character, compile figure using HASH algorithm during submitting password Code generates a text-string password with existing password system compatible.Simultaneously as this cryptography scheme uses user certainly The personalised graphical of definition, these personalized figures can effectively resist the threat and can effectively resist violence that shoulder is peeped Attack etc., so the cryptography scheme is also very safe.
Detailed description of the invention
Fig. 1 is that the present invention is based on the structural schematic diagrams that the password of slice figure generates system;
Fig. 2 is general graphical schematic diagram in embodiment;
Fig. 3 is customized pictorial diagram in embodiment;
Fig. 4 is 3 × 3 slicing mode schematic diagrames in embodiment;
Fig. 5 is 4 × 4 slicing mode schematic diagrames in embodiment;
Fig. 6 is the password string schematic diagram that the input of centre of figure region is clicked in embodiment;
Fig. 7 is the password string schematic diagram that region input in the figure right side is clicked in embodiment.
Specific embodiment
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.The present embodiment is with technical solution of the present invention Premised on implemented, the detailed implementation method and specific operation process are given, but protection scope of the present invention is not limited to Following embodiments.
As shown in Figure 1, a kind of password generation system based on slice figure includes:
Figure setup module, for selecting figure and its quantity for Password Input.Figure is logical according to setting classification of type With figure and customized figure.
Universal figure can be set to the figure of some common clear-cut individualities in the world, and the blue sky such as WINDOWS is white Cloud atlas piece etc.;The personal picture that user likes can be set in customized figure, the picture of such as personal design, self-timer picture even with The picture etc. that the individual that hand photographed likes, these pictures can enhance the memory and memory of user.
Figure is sliced module, for the slicing mode and number of sections of every figure to be arranged, and according to slicing mode and cuts Piece quantity is sliced every figure, and the figure after slice is made of multiple graph blocks.
All cipher graphics are all placed in input panel, be free to toggle between figure, in Fig. 2, are had Six pictures know to be currently shown in the 5th by the switching display window (six dots) below Fig. 2 for switching.It is defeated The cipher graphic for entering most original on panel is some general graphicals, and user can according to need the customized figure of addition.For The cipher graphic quantity of input can be freely arranged as needed.
Slicing mode is the graph block that figure is sliced to the rectangle for M row N column.Every figure is divided into M*N figures Shape slice, each be sliced all can serve as the tablet pattern of password, and the value of M and N, which can according to need, to be freely arranged and switch.
Password acquisition module is inputted, for acquiring the input encrypted message of user, input encrypted message refers to that user selects Graph block and select graph block sequence.The input that the figure slice in input panel carries out graphical passwords is clicked, substantially 95 text characters can be inputted by keyboard.
Secret generation module, for carrying out code conversion acquisition for the graph block in encrypted message is inputted based on HASH algorithm The text-string of corresponding graph block, and store each text-string by the sequence of the selection graph block in input encrypted message For password.The figure slice of all inputs is not directly stored and is verified.The figure of input is sliced during submission Code conversion all is carried out using HASH algorithm, being converted into a text-string by figure slice (can be according to the demand of user The number of self-defining text-string), these text-strings are used for the storage and verifying of password, can be with existing password Storage system is compatible.
Password database, the password that secret generation module obtains when for storing setting password.
Password comparison module, when for password will to be verified in the password and password database of secret generation module acquisition in advance The password of storage is compared, if comparing unanimously, verifying cryptographic results is that password is correct, if comparison is inconsistent, verifies close Code result is password bad.
Using based on slice figure password generate system realize password generate method the following steps are included:
S1: selection is used for the figure and its quantity of Password Input, and figure is general graphical and customized according to setting classification of type Figure;
S2: the slicing mode and number of sections of every figure of setting, and according to slicing mode and number of sections to every figure into Row is sliced, and the figure after slice is made of multiple graph blocks;
S3: when setting password, acquiring the input encrypted message of user, input encrypted message refer to user's selection graph block and Select the sequence of graph block;
S4: the text word that code conversion obtains corresponding graph block is carried out for the graph block in encrypted message is inputted based on HASH algorithm Symbol string, and each text-string is stored as password by the sequence of the selection graph block in input encrypted message, and be stored in password In database, the comparison of encrypted message is inputted when for verifying password.
The comparison of input encrypted message refers to when verifying password: acquiring the input encrypted message of user when verifying password and obtains Take corresponding password, by verify password when user the corresponding password of input encrypted message with it is pre-stored in password database Password is compared, if comparing unanimously, verifying cryptographic results is that password is correct, if comparison is inconsistent, verifies cryptographic results For password bad.
As illustrated in figs. 2-7, Fig. 2 is general graphical to present system design interface, and Fig. 3 is customized figure, these figures It can also be finely divided as needed.Wherein general graphical is some common figures in the world, such as the blue sky and white cloud figure of WINDOWS Piece (as shown in Figure 2) and some world's famous paintings etc., customized figure are the figure of user oneself, such as photo of some shootings Deng these figures are proprietary for user.Arbitrary picture can be arranged according to the hobby of individual subscriber in customized figure, be user The proprietary picture of people, it is possible to the effective attack resisting shoulder and peeping.
All cipher graphics are all placed in input panel, and as shown in Fig. 2-Fig. 3, the present embodiment is provided with 2 certainly Totally 6 figures, this 6 figures can be switched one by one by horizontally slipping in graphics field for definition figure and 4 general graphicals, Or the switching display window region clicked below picture is arbitrarily switched.
As shown in Figure 4 and Figure 5, the figure that every figure is divided into M*N is sliced, each slice all can serve as password Tablet pattern.The value of the M and N of same figure, which can according to need, to be freely arranged and switches.Blue sky and white cloud figure can root It is each to be sliced the input figure that all can serve as password according to the slice for needing to switch to 3 × 34 × 4 or other slices Shape.If what is selected is 4 × 4 slice, this figure then has 4*4=16 slices, that is, has 16 small input figures Shape, all independent input as password of these figures.
As shown in Figure 6 and Figure 7, the input that the figure slice in input panel carries out graphical passwords is clicked, all inputs Figure slice is not directly stored and is verified.The figure of input is sliced all to be carried out using HASH algorithm during submission Code conversion is converted into a text-string by figure slice.In Fig. 6, the intermediate region slice of figure is clicked, is passed through The code conversion of MD5 algorithm, generates the character string of 17e8e8b2d8baa22e8cc8e21ad0448192, then clicks the area You Zhong The slice in domain then generates the character string of 94b390a938a94679c3f29a909f43569f, the input of two figures slice again Then be converted to 17e8e8b2d8baa22e8cc8e21ad044819294b390a938a94679c3f29a90 9f43569f this The input of the text-string of one 64 byte of sample.Other 95 basic text characters can be inputted by keyboard.
This programme selects the picture with distinct personality to input cipher graphic, so being easy to remember and recall, every figure Shape is sliced again, and each is sliced and all can serve as the input of password, thus several a small number of figures can be formed it is huge Password space;Figure for Password Input is few, and the password space of several figures can be up to a hundred, if M*N is set 5 are set to, then 4 figures can achieve 100 password space, password space is just bigger if M*N value is bigger, and is used for The several hundred K in space for storing this 4 figures are even more small, therefore space memory space is small;This programme allows user to use individual's Figure is as cipher graphic, since the customized figure of user only has user to be held, if the figure is as close Code figure is just that see this figure be exactly one of password to attacker, but can not get this figure, therefore also can not Carry out cracking and inputting for password.And since the graphical passwords of input will carry out turning for text-string by HASH algorithm It changes, the password of final use and storage is textual form, has been compatible with existing password storage system.

Claims (9)

1. a kind of password based on slice figure generates system characterized by comprising
Figure setup module, for selecting figure and its quantity for Password Input;
Figure is sliced module, for the slicing mode and number of sections of every figure to be arranged, and according to slicing mode and number of slices Amount is sliced every figure, and the figure after slice is made of multiple graph blocks;
Password acquisition module is inputted, for acquiring the input encrypted message of user, the input encrypted message refers to that user selects Graph block and select graph block sequence;
Secret generation module is corresponded to for the graph block inputted in encrypted message to be carried out code conversion based on HASH algorithm The text-string of graph block, and by the sequence of the selection graph block in input encrypted message be stored as each text-string close Code.
2. a kind of password based on slice figure according to claim 1 generates system, which is characterized in that the password generates System further includes password database, the password that secret generation module obtains when for storing setting password.
3. a kind of password based on slice figure according to claim 2 generates system, which is characterized in that the password generates System further includes password comparison module, pre- in the password and password database that secret generation module obtains when for that will verify password The password first stored is compared, if comparing unanimously, verifying cryptographic results is that password is correct, if comparison is inconsistent, verifies Cryptographic results are password bad.
4. a kind of password based on slice figure according to claim 1 generates system, which is characterized in that the figure root It is general graphical and customized figure according to setting classification of type.
5. a kind of password based on slice figure according to claim 1 generates system, which is characterized in that the slice side Formula is the graph block that figure is sliced to the rectangle for M row N column.
6. a kind of method for generating cipher code based on slice figure, which comprises the following steps:
S1: selection be used for Password Input figure and its quantity, the figure according to setting classification of type be general graphical and from Define figure;
S2: the slicing mode and number of sections of every figure of setting, and according to slicing mode and number of sections to every figure into Row is sliced, and the figure after slice is made of multiple graph blocks;
S3: when setting password, the input encrypted message of user is acquired, the input encrypted message refers to the graph block of user's selection And the sequence of selection graph block;
S4: the text word that code conversion obtains corresponding graph block is carried out for the graph block in encrypted message is inputted based on HASH algorithm Symbol string, and each text-string is stored as password by the sequence of the selection graph block in input encrypted message, and be stored in password In database, the comparison of encrypted message is inputted when for verifying password.
7. a kind of method for generating cipher code based on slice figure according to claim 6, which is characterized in that when verifying password The comparison of input encrypted message refers to: acquiring the input encrypted message of user when verifying password and obtains corresponding password, will test The corresponding password of input encrypted message of user is compared with password pre-stored in password database when demonstrate,proving password, if than To consistent, then verifying cryptographic results is that password is correct, if comparison is inconsistent, verifying cryptographic results is password bad.
8. a kind of method for generating cipher code based on slice figure according to claim 6, which is characterized in that the figure root It is general graphical and customized figure according to setting classification of type.
9. a kind of method for generating cipher code based on slice figure according to claim 6, which is characterized in that the slice side Formula is the graph block that figure is sliced to the rectangle for M row N column.
CN201810801311.6A 2018-07-20 2018-07-20 Password generation system and method based on slice graph Active CN109145569B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810801311.6A CN109145569B (en) 2018-07-20 2018-07-20 Password generation system and method based on slice graph

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810801311.6A CN109145569B (en) 2018-07-20 2018-07-20 Password generation system and method based on slice graph

Publications (2)

Publication Number Publication Date
CN109145569A true CN109145569A (en) 2019-01-04
CN109145569B CN109145569B (en) 2022-05-06

Family

ID=64801163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810801311.6A Active CN109145569B (en) 2018-07-20 2018-07-20 Password generation system and method based on slice graph

Country Status (1)

Country Link
CN (1) CN109145569B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111027040A (en) * 2019-11-21 2020-04-17 中国农业银行股份有限公司 Password setting method, password verification method and devices corresponding to methods

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079697A (en) * 2006-10-08 2007-11-28 腾讯科技(深圳)有限公司 A method and system for improving security of network account
CN103595531A (en) * 2012-08-17 2014-02-19 财团法人工业技术研究院 Graphic password authentication system and method for preventing shoulder surfing attack
CN106997432A (en) * 2017-05-17 2017-08-01 苏州锦佰安信息技术有限公司 Picture password authentication method and picture password authentication device
CN107665298A (en) * 2017-09-29 2018-02-06 厦门大学嘉庚学院 Password generation system and method based on figure

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079697A (en) * 2006-10-08 2007-11-28 腾讯科技(深圳)有限公司 A method and system for improving security of network account
CN103595531A (en) * 2012-08-17 2014-02-19 财团法人工业技术研究院 Graphic password authentication system and method for preventing shoulder surfing attack
CN106997432A (en) * 2017-05-17 2017-08-01 苏州锦佰安信息技术有限公司 Picture password authentication method and picture password authentication device
CN107665298A (en) * 2017-09-29 2018-02-06 厦门大学嘉庚学院 Password generation system and method based on figure

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111027040A (en) * 2019-11-21 2020-04-17 中国农业银行股份有限公司 Password setting method, password verification method and devices corresponding to methods

Also Published As

Publication number Publication date
CN109145569B (en) 2022-05-06

Similar Documents

Publication Publication Date Title
CA2766019C (en) Computing device with graphical authentication interface
Khan et al. A graphical password based system for small mobile devices
Sreelatha et al. Authentication schemes for session passwords using color and images
TWI510954B (en) A method and a device for generating a secret value
Rao et al. Novel shoulder-surfing resistant authentication schemes using text-graphical passwords
US20120159592A1 (en) Multi-layered color-sensitive passwords
Ray Ray’s scheme: Graphical password based hybrid authentication system for smart hand held devices
Khan et al. G-RAT| a novel graphical randomized authentication technique for consumer smart devices
Yang PassPositions: A secure and user-friendly graphical password scheme
CN105678159A (en) Unlocking method and device
Ritter et al. Miba: Multitouch image-based authentication on smartphones
WO2016183952A1 (en) Unlocking method and terminal
CN107665298A (en) Password generation system and method based on figure
WO2019137489A1 (en) Password input method, device, and computer-readable storage medium
CN108073802B (en) Password input protection system and method
CN109145569A (en) A kind of password generation system and method based on slice figure
US20210026943A1 (en) System and method incorporating graphical aids for the creation and retreival of alphanumeric passwords
US9613201B1 (en) Access control by a mobile device using an image
Shankar et al. IPCT: A scheme for mobile authentication
US20160292402A1 (en) Password input method and system based on two-stage conversion
US10263972B1 (en) Authenticating by labeling
Ahsan et al. Graphical password authentication using images sequence
Khan et al. A hybrid graphical password based system
Gokhale et al. Graphical password authentication techniques: a review
Alam SUIS: An online graphical signature-based user identification system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant