CN109145569B - Password generation system and method based on slice graph - Google Patents

Password generation system and method based on slice graph Download PDF

Info

Publication number
CN109145569B
CN109145569B CN201810801311.6A CN201810801311A CN109145569B CN 109145569 B CN109145569 B CN 109145569B CN 201810801311 A CN201810801311 A CN 201810801311A CN 109145569 B CN109145569 B CN 109145569B
Authority
CN
China
Prior art keywords
password
input
slicing
graph
graphic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810801311.6A
Other languages
Chinese (zh)
Other versions
CN109145569A (en
Inventor
曾党泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen University Tan Kah Kee College
Original Assignee
Xiamen University Tan Kah Kee College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen University Tan Kah Kee College filed Critical Xiamen University Tan Kah Kee College
Priority to CN201810801311.6A priority Critical patent/CN109145569B/en
Publication of CN109145569A publication Critical patent/CN109145569A/en
Application granted granted Critical
Publication of CN109145569B publication Critical patent/CN109145569B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention relates to a password generating system and method based on a slice graph, wherein the system comprises: the figure setting module is used for selecting figures used for password input and the number of the figures; the image slicing module is used for setting the slicing mode and the slicing number of each image and slicing each image according to the slicing mode and the slicing number; the system comprises an input password acquisition module, a password input module and a password input module, wherein the input password acquisition module is used for acquiring input password information of a user, and the input password information refers to a graphic block selected by the user and a sequence for selecting the graphic block; the password generation module is used for carrying out coding conversion on the graphic blocks in the input password information based on a HASH algorithm to obtain text character strings corresponding to the graphic blocks, and storing each text character string as a password according to the sequence of selecting the graphic blocks in the input password information; and a password database. Compared with the prior art, the invention has the advantages of simple and convenient operation, large password space, easy memory, small storage space, shoulder peep resistance and the like.

Description

Password generation system and method based on slice graph
Technical Field
The invention relates to the field of information security, in particular to a password generation system and method based on a slice graph.
Background
In recent years, researchers at home and abroad continuously propose a plurality of new graphical password schemes. According to the memory form and input mode of the password, the existing graphic password schemes can be divided into three categories: the image recognition method comprises a graph password (recognition-based) based on an image recognition mode, a graph password (call-based) based on memory and a graph password (cut-call) based on memory of a thread.
(1) Graphic password scheme based on picture identification mode
The earliest occurring picture recognition based graphical password scheme was the Dhamija et al, proposed in 2000 at the USENIX security association, D-j-Vu scheme, using random artistic pictures generated by a hash function instead of strings of meaningless characters. During authentication, the user only needs to select the password picture set in the registration stage from the pictures displayed on the interface. The Passfaces scheme is a graphical password system based on human faces, and the starting point is that the recognition rate and the memory of the human faces of users are stronger than those of common pictures, and the recognition capability has little relation with cultural background, education level and intelligence level, but researchers find that most users tend to choose people from the same race, so that Passfaces passwords are predictable. Davis et al propose a Story scheme in which a user selects several pictures to make up a Story, so that the sequence of password pictures is easily remembered by the user. The scheme well overcomes the defects that a user prefers to select the same race or different pictures when using the Passfaces, and the like, and improves the safety of the system. The CHC scheme (Convex hill Click), which is well-known for shoulder surfing, requires that the user identify the exit password picture from a plurality of pictures and select any icon in the geometric area formed by the password picture. The anti-shoulder-surfing scheme is a key point and a hot point for research in the graphical passwords, and since Sobrado and target propose anti-shoulder-surfing graphical password schemes, a plurality of anti-shoulder-surfing graphical password schemes with different degrees are proposed. These solutions resist shoulder surfing through a more complex challenge-conscientious process, setting confusing colors and various concealment techniques, etc.
(2) Graphic password based on memory
The graph password scheme based on recall requires a user to freely draw a graph as the input of the password in the registration stage, and in the authentication stage, the user needs to recall and redraw the password graph set in the registration stage. The main advantage of this kind of authentication scheme is that the theoretical cipher space is very large, which can effectively prevent brute force attack. However, relevant memory studies show that it can be difficult to recall something without any indication. This type of protocol is the DAS (Draw-A-Secret) protocol proposed by Jermyn et al in 1999 at the eighth safety year of USENIX. The DAS provides the user with an N x N grid canvas on which the user needs to draw his or her password graphic. After DAS, researchers have proposed many graphical cryptographic application schemes based on this principle. Dunphy et al, 2007, proposed two improved versions directed to DAS, the bdas (background DAS) and the qdas (quaternary DAS) solutions. The BDAS adds a background picture on the grid of the DAS to guide a user to draw a more complex password graph, so that the problem that the user sets a simple password is solved, and the BDAS can help the user to remember and reappear the password to a certain extent. The QDAS adopts a new corresponding relation between strokes and password sequences, so that the drawing limitation of a user is relaxed, and the memory burden of the user is reduced. In addition, the QDAS expands the fixed grid to dynamic, which gives it better anti-shoulder-surfing performance. The Pass-Go scheme shifts the rendering focus from inside the grid to grid intersections, greatly improving usability and security while preserving most of the advantages of DAS. The YAGP (Yet Another Graphical password) scheme considers personal writing habits, so that the drawing password can embody personalized characteristics and is more convenient for users to operate. In commercial application, Google corporation introduced a mobile phone unlocking scheme similar to the Pass-Go scheme in 2008, and applied to Android mobile phones, gesture unlocking is adopted to perform simple user identity verification. Microsoft corporation also introduced a graphical password scheme for Windows 8 systems in 2012.
(3) Graphical password based on clue recall
The graphic password scheme based on the hint recall generally provides a background picture for a user, and requires the user to select certain positions on the background picture through a mouse or a handwriting input device to form a click sequence as a password of the user. The background picture at this time is an important presentation information, and the memory load of the user can be reduced.
The Blonder scheme is a representative of such schemes and is also the earliest appearing graphical password scheme, where the user authenticates by sequentially clicking on predefined locations. The V-GO scheme is a commercial security solution proposed by Passlogix, which uses a picture containing several daily items, each having an invisible predefined boundary to prompt the user for selectable regions, increasing the usability of the Blonder scheme. The Pass Points scheme solves the problem of selection limitation of the V-GO scheme on the background picture, any picture can be used as the background picture in the Pass Points scheme, and a user has no limitation on the selection of the area in the picture and does not need to predefine the area. CCP (current Click Points) requires a user to select one area in five background pictures in sequence, so that the mode problem in Pass Points is solved, but the hot spot problem still exists. PCCP (Passive Current Click-Points), like CCP, may prompt a user to select a more random password to mitigate the impact of hot-spot problems.
The above scheme of the graphical password has many disadvantages, such as inconvenient input due to too much graphical input limitation, large number of graphs requiring a large amount of storage space, too complicated graphical features not easy to memorize, poor shoulder surfing resistance, inability to effectively prevent spyware, inability to resist brute force attack, small password space, and so on, and thus is not widely applied in most cases. So that they can now be used only in a relatively small area.
Disclosure of Invention
The invention aims to overcome the problems that the prior text password system is difficult to memorize and has low safety, and the defects that the graphic input in the graphic password is limited too much and is inconvenient to input, the number of the graphics is too large and needs a large amount of storage space, the graphic characteristics are too complex and are difficult to memorize, the anti-shoulder-peeping performance is poor, spyware cannot be effectively prevented, violent attack cannot be resisted, the password space is small and the like, and provides a password generation system and a method based on a slice graphic.
The purpose of the invention can be realized by the following technical scheme:
a slice-graph based password generation system comprising:
the figure setting module is used for selecting figures used for password input and the number of the figures;
the graph slicing module is used for setting the slicing mode and the slicing number of each graph and slicing each graph according to the slicing mode and the slicing number, and the sliced graph is composed of a plurality of graph blocks;
the input password acquisition module is used for acquiring input password information of a user, wherein the input password information refers to a graphic block selected by the user and a sequence of selecting the graphic block;
and the password generation module is used for carrying out coding conversion on the graphic blocks in the input password information based on a HASH algorithm to obtain text character strings corresponding to the graphic blocks, and storing each text character string as a password according to the sequence of selecting the graphic blocks in the input password information.
The password generation system also comprises a password database used for storing the password acquired by the password generation module when the password is set.
The password generation system also comprises a password comparison module used for comparing the password acquired by the password generation module during password verification with the password pre-stored in the password database, if the comparison is consistent, the password verification result is correct, and if the comparison is inconsistent, the password verification result is incorrect.
The graphics are classified into general graphics and custom graphics according to the setting type.
The slicing mode is to slice the graphics into rectangular graphics blocks with M rows and N columns.
A password generation method based on a slice graph comprises the following steps:
s1: selecting graphs and the number of the graphs for password input, wherein the graphs are classified into general graphs and custom graphs according to the setting type;
s2: setting the slicing mode and the slicing number of each graph, and slicing each graph according to the slicing mode and the slicing number, wherein the sliced graph is composed of a plurality of graph blocks;
s3: when setting a password, acquiring input password information of a user, wherein the input password information refers to a graphic block selected by the user and a sequence of selecting the graphic block;
s4: and carrying out encoding conversion on the graphic blocks in the input password information based on a HASH algorithm to obtain text character strings corresponding to the graphic blocks, storing each text character string as a password according to the sequence of selecting the graphic blocks in the input password information, and storing the password in a password database for comparison of the input password information when the password is verified.
The comparison of the input password information when the password is verified means that: the password verification method comprises the steps of collecting input password information of a user when a password is verified and obtaining a corresponding password, comparing the password corresponding to the input password information of the user when the password is verified with a password stored in a password database in advance, if the comparison is consistent, the password verification result is correct, and if the comparison is inconsistent, the password verification result is incorrect.
The graphics are classified into general graphics and custom graphics according to the setting type.
The slicing mode is to slice the graphics into rectangular graphics blocks with M rows and N columns.
Compared with the prior art, the invention designs a mixed type graphic password scheme, is compatible with the prior text password system, and has the following advantages: the password input operation of the scheme is convenient, the storage space is small, the password space is large, and the safety of the whole password is improved. The invention slices the graphs which are easy to remember, each graph can be used as the input of the password, the input of the existing text characters is compatible, the HASH algorithm is adopted to encode the graphs in the process of submitting the password, and a text character string password which is compatible with the existing password system is generated. Meanwhile, the password scheme adopts the personalized graphs defined by the user, and the personalized graphs can effectively resist the threat of shoulder surfing, the violent attack and the like, so the password scheme is very safe.
Drawings
FIG. 1 is a schematic structural diagram of a cipher generation system based on a slice graph according to the present invention;
FIG. 2 is a schematic diagram of a general diagram in the example;
FIG. 3 is a schematic diagram of a custom graphic in an embodiment;
FIG. 4 is a schematic view of the 3X 3 slicing method in the example;
FIG. 5 is a schematic view of the 4X 4 slicing mode in the example;
FIG. 6 is a diagram illustrating a password string inputted by clicking a center region of a graphic in an embodiment;
FIG. 7 is a diagram illustrating a password character string input in the middle right area of the click graph in the embodiment.
Detailed Description
The invention is described in detail below with reference to the figures and specific embodiments. The present embodiment is implemented on the premise of the technical solution of the present invention, and a detailed implementation manner and a specific operation process are given, but the scope of the present invention is not limited to the following embodiments.
As shown in fig. 1, a slice-graph based password generation system includes:
and the figure setting module is used for selecting figures for password input and the number of the figures. The graphics are classified into general graphics and custom graphics according to the setting type.
The general pattern can be set as a pattern with vivid personality, such as a blue sky white cloud picture of WINDOWS; the user-defined graph can be used for setting personal pictures liked by the user, such as pictures designed by the user, self-shot pictures and even pictures liked by the user taken at any time, and the pictures can enhance the memory and recall of the user.
And the graph slicing module is used for setting the slicing mode and the slicing number of each graph and slicing each graph according to the slicing mode and the slicing number, and the sliced graph is composed of a plurality of graph blocks.
All password graphs are placed on the input panel, the graphs can be freely switched back and forth, in fig. 2, six pictures can be switched, and the current picture is displayed as the fifth picture through a switching display window (six dots) at the lower part of fig. 2. The most original password graphs on the input panel are general graphs, and a user can add custom graphs according to needs. The number of password patterns for input can be freely set as required.
The slicing mode is to slice the graphics into rectangular graphics blocks with M rows and N columns. And each graph is divided into M x N graph slices, each slice can be used as an input graph of the password, and the values of M and N can be freely set and switched according to needs.
And the input password acquisition module is used for acquiring input password information of the user, wherein the input password information refers to the graphic blocks selected by the user and the sequence of selecting the graphic blocks. The input of the graphic password is performed by clicking a graphic slice on the input panel, and basic 95 text characters can be input through a keyboard.
And the password generation module is used for carrying out coding conversion on the graphic blocks in the input password information based on a HASH algorithm to obtain text character strings corresponding to the graphic blocks, and storing each text character string as a password according to the sequence of selecting the graphic blocks in the input password information. All incoming graphics slices are not directly stored and validated. The input graphic slice is subjected to encoding conversion by using a HASH algorithm in the submission process, and is converted into a text string (the number of the text strings can be defined according to the requirements of users), and the text strings are used for password storage and verification and can be compatible with the existing password storage system.
And the password database is used for storing the password acquired by the password generation module when the password is set.
And the password comparison module is used for comparing the password acquired by the password generation module during password verification with the password pre-stored in the password database, if the comparison is consistent, the password verification result is correct, and if the comparison is inconsistent, the password verification result is incorrect.
The method for realizing password generation by using the password generation system based on the slice graph comprises the following steps:
s1: selecting graphs and the number of the graphs for password input, wherein the graphs are classified into general graphs and custom graphs according to the set type;
s2: setting the slicing mode and the slicing number of each graph, and slicing each graph according to the slicing mode and the slicing number, wherein the sliced graph is composed of a plurality of graph blocks;
s3: when setting a password, acquiring input password information of a user, wherein the input password information refers to a graphic block selected by the user and a sequence for selecting the graphic block;
s4: and carrying out encoding conversion on the graphic blocks in the input password information based on a HASH algorithm to obtain text character strings corresponding to the graphic blocks, storing each text character string as a password according to the sequence of selecting the graphic blocks in the input password information, and storing the password in a password database for comparison of the input password information when the password is verified.
The comparison of the input password information when the password is verified means that: the password verification method comprises the steps of collecting input password information of a user when a password is verified and obtaining a corresponding password, comparing the password corresponding to the input password information of the user when the password is verified with a password stored in a password database in advance, if the comparison is consistent, the password verification result is correct, and if the comparison is inconsistent, the password verification result is incorrect.
The system design interface of the present invention is shown in fig. 2-7, fig. 2 is a general graph, fig. 3 is a custom graph, and these graphs can be subdivided as required. The general graphs are some common graphs in the world, such as a blue sky and white cloud picture (shown in fig. 2) of WINDOWS and some world famous pictures, and the user-defined graphs are own graphs of the user, such as some shot pictures, and the graphs are exclusive to the user. The user-defined graph can be set with any picture according to the personal preference of the user and is a special picture for the user, so that the attack of shoulder surfing can be effectively resisted.
All password graphs are placed on the input panel, as shown in fig. 2-fig. 3, 6 graphs including 2 custom graphs and 4 general graphs are set in this embodiment, and these 6 graphs can be switched one by sliding left and right in the graph area, or by clicking a switching display window area below the pictures to perform arbitrary switching.
As shown in fig. 4 and 5, each graph is divided into M × N graph slices, and each slice can be used as an input graph of a password. The values of M and N of the same pattern can be freely set and switched as required. The blue sky white cloud pattern can be switched into 3 × 3 or 4 × 4 slices or other slices as required, and each slice can be used as an input pattern of the password. If 4 × 4 slices are selected, there are 4 × 4 slices or 16 slices, i.e., 16 small input patterns, which are used independently as input of the password.
As shown in fig. 6 and 7, when the graphic slices on the input panel are clicked to input the graphic password, all the input graphic slices are not directly stored and verified. The input graphic slice is coded and converted by the HASH algorithm in the submission process, and the graphic slice is converted into a text string. In fig. 6, the middle region slice of the graphic is clicked, and a character string of 17e8e8b2d8baa22e8cc8e21ad0448192 is generated by the code conversion of the MD5 algorithm, and then a character string of 94b390a938a94679c3f29a909f43569f is generated by clicking the middle region slice, and the input of two graphic slices is converted into an input of a 64-byte text character string of 17e8e8b2d8baa22e8cc8e21ad044819294b390a938a94679c3f29a909f43569 f. The other basic 95 text characters can be entered via the keyboard.
In the scheme, pictures with bright individuality are selected as input password graphs, so that the input password graphs are easy to remember and recall, each graph is sliced, and each slice can be used as the input of a password, so that a small number of graphs can form a huge password space; the number of graphs used for password input is small, the password space of a few graphs can be hundreds, if M is N is set to be 5, 4 graphs can reach the password space of 100, if M is N is larger, the password space is larger, and the space for storing the 4 graphs is hundreds of K or even smaller, so the space storage space is small; the scheme allows a user to use a personal graph as a password graph, and because the user-defined graph is only owned by the user, if the graph is used as the password graph, even if an attacker sees the graph as one of the passwords, the attacker cannot acquire the graph, and therefore the password cannot be cracked and input. And because the input graphic password is converted into a text string through a HASH algorithm, the finally used and stored password is in a text form, and the input graphic password is compatible with the existing password storage system.

Claims (8)

1. A system for generating a password based on a sliced graph, comprising:
the figure setting module is used for selecting figures used for password input and the number of the figures; the graphs are classified into general graphs and custom graphs according to the setting type;
the graph slicing module is used for setting the slicing mode and the slicing number of each graph and slicing each graph according to the slicing mode and the slicing number, and the sliced graph is composed of a plurality of graph blocks;
the input password acquisition module is used for acquiring input password information of a user, wherein the input password information refers to a graphic block selected by the user and a sequence of selecting the graphic block;
and the password generation module is used for carrying out coding conversion on the graphic blocks in the input password information based on a HASH algorithm to obtain text character strings corresponding to the graphic blocks, and storing each text character string as a password according to the sequence of selecting the graphic blocks in the input password information.
2. The system of claim 1, further comprising a password database for storing the password obtained by the password generation module when setting the password.
3. The system of claim 2, further comprising a password comparison module for comparing the password obtained by the password generation module during password verification with a password pre-stored in the password database, wherein if the comparison is consistent, the password is verified to be correct, and if the comparison is inconsistent, the password is verified to be incorrect.
4. The system of claim 1, wherein the slicing is performed by slicing the graphics into rectangular graphics blocks with M rows and N columns.
5. A password generation method based on a slice graph is characterized by comprising the following steps:
s1: selecting graphs and the number of the graphs for password input, wherein the graphs are classified into general graphs and custom graphs according to the setting type;
s2: setting the slicing mode and the slicing number of each graph, and slicing each graph according to the slicing mode and the slicing number, wherein the sliced graph is composed of a plurality of graph blocks;
s3: when setting a password, acquiring input password information of a user, wherein the input password information refers to a graphic block selected by the user and a sequence of selecting the graphic block;
s4: and carrying out encoding conversion on the graphic blocks in the input password information based on a HASH algorithm to obtain text character strings corresponding to the graphic blocks, storing each text character string as a password according to the sequence of selecting the graphic blocks in the input password information, and storing the password in a password database for comparison of the input password information when the password is verified.
6. The method for generating a password based on a slice image as claimed in claim 5, wherein the comparison of the input password information in the password verification is: the password verification method comprises the steps of collecting input password information of a user when a password is verified and obtaining a corresponding password, comparing the password corresponding to the input password information of the user when the password is verified with a password stored in a password database in advance, if the comparison is consistent, the password verification result is correct, and if the comparison is inconsistent, the password verification result is incorrect.
7. The method of claim 5, wherein the graphics are classified into general graphics and custom graphics according to a setting type.
8. The method as claimed in claim 5, wherein the slicing manner is to slice the graphics into rectangular graphics blocks with M rows and N columns.
CN201810801311.6A 2018-07-20 2018-07-20 Password generation system and method based on slice graph Active CN109145569B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810801311.6A CN109145569B (en) 2018-07-20 2018-07-20 Password generation system and method based on slice graph

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810801311.6A CN109145569B (en) 2018-07-20 2018-07-20 Password generation system and method based on slice graph

Publications (2)

Publication Number Publication Date
CN109145569A CN109145569A (en) 2019-01-04
CN109145569B true CN109145569B (en) 2022-05-06

Family

ID=64801163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810801311.6A Active CN109145569B (en) 2018-07-20 2018-07-20 Password generation system and method based on slice graph

Country Status (1)

Country Link
CN (1) CN109145569B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111027040B (en) * 2019-11-21 2022-11-08 中国农业银行股份有限公司 Password setting method, password verification method and devices corresponding to methods

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595531A (en) * 2012-08-17 2014-02-19 财团法人工业技术研究院 Graphic password authentication system and method for preventing shoulder surfing attack
CN106997432A (en) * 2017-05-17 2017-08-01 苏州锦佰安信息技术有限公司 Picture password authentication method and picture password authentication device
CN107665298A (en) * 2017-09-29 2018-02-06 厦门大学嘉庚学院 Password generation system and method based on figure

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079697B (en) * 2006-10-08 2010-08-25 腾讯科技(深圳)有限公司 A method and system for improving security of network account

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595531A (en) * 2012-08-17 2014-02-19 财团法人工业技术研究院 Graphic password authentication system and method for preventing shoulder surfing attack
CN106997432A (en) * 2017-05-17 2017-08-01 苏州锦佰安信息技术有限公司 Picture password authentication method and picture password authentication device
CN107665298A (en) * 2017-09-29 2018-02-06 厦门大学嘉庚学院 Password generation system and method based on figure

Also Published As

Publication number Publication date
CN109145569A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
US10176315B2 (en) Graphical authentication
Sreelatha et al. Authentication schemes for session passwords using color and images
US7992202B2 (en) Apparatus and method for inputting graphical password using wheel interface in embedded system
US20110096997A1 (en) Graphical image authentication
Rao et al. Novel shoulder-surfing resistant authentication schemes using text-graphical passwords
RU2656685C1 (en) Password formation method and device for its implementation
Zheng et al. A stroke-based textual password authentication scheme
CN101499907B (en) Shoulder surfing preventing identity authentication system and method based on dynamic image password
JP2019522277A (en) Terminal device password unlocking method, apparatus, and terminal device
CN109145569B (en) Password generation system and method based on slice graph
CN107665298A (en) Password generation system and method based on figure
CN108073802B (en) Password input protection system and method
WO2019137489A1 (en) Password input method, device, and computer-readable storage medium
US20170357793A1 (en) Passnumber and image based method and computer program product to authenticate user identity
KR102014408B1 (en) Method and computer program for user authentication using image touch password
Zaki et al. Secure pattern-key based password authentication scheme
Shankar et al. IPCT: A scheme for mobile authentication
Yakovlev et al. User authentication based on the chess graphical password scheme resistant to shoulder surfing
Rodda et al. Shouldersurfing resistant graphical password system for cloud
Gao et al. Usability and security of the recall-based graphical password schemes
Ahmad et al. Secure graphical password techniques against shoulder surfing and camera based attacks
Gokhale et al. Graphical password authentication techniques: a review
Nazir et al. The Art of Deception: Novel Graphical User Authentication Scheme Using Illusion Images
Khan et al. Enhanced Recognition Based Image Authentication Scheme to Save System Time & Memory
Malempati et al. User authentication using native language passwords

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant