CN204759430U - Random cipher input device - Google Patents

Random cipher input device Download PDF

Info

Publication number
CN204759430U
CN204759430U CN201520376557.5U CN201520376557U CN204759430U CN 204759430 U CN204759430 U CN 204759430U CN 201520376557 U CN201520376557 U CN 201520376557U CN 204759430 U CN204759430 U CN 204759430U
Authority
CN
China
Prior art keywords
module
password
random number
random
cipher input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201520376557.5U
Other languages
Chinese (zh)
Inventor
董楚
唐侃毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Hangzhou Electronic Science and Technology University
Original Assignee
Hangzhou Electronic Science and Technology University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Electronic Science and Technology University filed Critical Hangzhou Electronic Science and Technology University
Priority to CN201520376557.5U priority Critical patent/CN204759430U/en
Application granted granted Critical
Publication of CN204759430U publication Critical patent/CN204759430U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model discloses a random cipher input device, including random number generation module, set up module, matching module, input module and display module, wherein, random number generation module and display module and set up the module and be connected for produce a random number, it is used for setting up in advance the password transfer algorithm and converts the random number as time effective password message routing for matching module into according to this password transfer algorithm to set up the module, matching module is with set up the module and input module is connected for whether that judges input module input encrypted message and set up that the module produces matches when time effective encrypted message, if match successfully, then the password is inputed successfully. Adopt the technical scheme of the utility model, because the password inputed all changes at random at every turn, the no longer anxious password of seeing oneself of being had a mind to or having no intention by other people to the difference of password causes other people to guess to separate at every turn, thereby user's personal secrets are lived in effectual protection.

Description

A kind of random cipher input media
Technical field
The utility model relates to cryptosecurity control field, particularly relates to a kind of random cipher input media.
Background technology
Along with modern development in science and technology, people are more and more attention to the data security of oneself.Encryption technology is conventional safe and secret means, utilizes the data security of cryptoguard oneself.
Traditional encryption and decryption mode is the password that user first sets oneself before use, afterwards, and the password that each input is arranged before this.But in some public arenas, easily stolen a glance at by people during input password, or stolen by other means by people.Because under conventional cipher input mode, password generally immobilizes, when user inputs password at every turn, the process of its input is identical, easily on equipment, leaves identical vestige, easily allows people find the break of loophole password.Especially in public places, when you are when giving your mobile phone input password, people around often can take aim at your password easily, or is recorded your password by the monitoring video of surrounding, if now mobile phone stolen or lose time, data just can be increased a lot by the probability that people steals; For unlocked by fingerprint, the fingerprint due to a people is also fixing, and mobile phone is easy to the fingerprint collecting user, therefore goes out the fingerprint of user with regard to reproducible, cracks finger-print cipher, just has a lot of video on the net about cracking of mobile fingerprint unblock.
Therefore, for the above-mentioned defect existed in currently available technology, be necessary to study in fact, to provide a kind of scheme, solve the defect existed in prior art.
Utility model content
In order to overcome the defect that prior art exists, necessaryly provide a kind of random cipher input media, during each Password Input, all the random number of generation is converted to when time valid password with the rule that user is arranged, user only need remember set password transformation rule, random number is converted to valid password and carries out Password Input.Because the cipher random inputted changes at every turn, can prevent password inadvertently from being stolen a glance at by others, or equipment is changed trick by people and is stolen when input password, or implanted virus is by password record, the algorithm that each needs set according to oneself according to random number is decrypted, thus effectively can prevent Brute Force, extremely difficult decoding, and when effectively secondary, cannot tackle.
In order to solve the problem of prior art, the technical solution of the utility model is:
A kind of random cipher input media, comprises random number generation module, arranges module, matching module, load module and display module, wherein,
Described random number generation module is connected with the described module that arranges with described display module, for generation of a random number, and this random number is sent to described display module and describedly arranges module;
The random number that described display module produces for showing described random number generation module;
The described module that arranges is for pre-setting password transfer algorithm and being converted to when time valid password information sends to described matching module according to this password transfer algorithm by random number;
Described load module is for inputting encrypted message;
Described matching module is connected with described load module with the described module that arranges, for judge described load module input encrypted message and described arrange that module produces whether mate when time valid password information, if the match is successful, then Password Input success.
Preferably, described random number generation module is made up of multiple random order generator.
Preferably, the described module that arranges is single-chip microcomputer.
Preferably, described display module adopts multistage charactron or is integrated with the LCD screen that resistive touch shields outward.
Preferably, described load module is key-press module or touch screen module.
Preferably, described matching module is multidigit comparer.
Preferably, also comprise timing module, described timing module is for adding up the time that random number produces or user cipher inputs.
Preferably, also comprise counting module, described counting module for add up described random number generation module produce random number or user cipher input number of times.
Preferably, also comprise wireless data transfer module, described wireless data transfer module is for accessing remote server.
Preferably, described wireless data transfer module is any one in 4G module, 3G module or GPRS module.
Compared with prior art; random cipher input media of the present utility model; because the password inputted changes all at random at every turn; no longer worry the password being had a mind to or see unintentionally oneself by other people; and the difference of each password causes other people to guess solution, thus effectively protects the personal secrets of user.Simultaneously due to only password need be calculated by the algorithm of setting according to random number, therefore do not spend the password remembeing that complexity is tediously long, reduce the possibility forgotten Password.
Accompanying drawing explanation
Fig. 1 is the theory diagram of the utility model random cipher input media.
Following specific embodiment will further illustrate the utility model in conjunction with above-mentioned accompanying drawing.
Embodiment
What provide the utility model below with reference to accompanying drawing is described further.
See Fig. 1, be depicted as the theory diagram of the utility model random cipher input media, comprise random number generation module, module is set, matching module, load module and display module, wherein,
Random number generation module and display module with module be set be connected, for generation of a random number, and this random number is sent to display module and module is set;
The random number that display module produces for showing random number generation module;
Module is set for pre-setting password transfer algorithm and being converted to when time valid password information sends to matching module according to this password transfer algorithm by random number;
Load module is for inputting encrypted message;
Matching module with module be set be connected with load module, for whether mating when time valid password information of judging load module input encrypted message and arrange that module produces, if the match is successful, then Password Input success.
Specific works principle is as follows:
Before using, user sets the transfer algorithm of oneself password, is stored in and arranges in module, and this algorithm by user's sets itself, and can be able to change; In this module, the algorithm of user's setting can be a kind, also can be multiple; When many algorithms, such as user, when inputting code error number of times and being too much, can be switched to another kind of algorithm, in case this algorithm is cracked by other people, or be forgotten by user; In addition, user also needs the step giving algorithm or password for change set when forgetting algorithm, in case lack of competence enters when forgetting Password.
Before each input password, this device can generate a string random number, and is presented at above screen, checks for user, and the figure place of this random number can arrange different figure places according to different occasion; This random code also can not be pure digi-tal, can be set to specific mark or corresponding corresponding numeral.
According to show code, user adds that the password transfer algorithm oneself set calculates this real password, meanwhile, the numeral that this random cipher input media can demonstrate according to this is calculated this password in inside by the algorithm of user, and compared by both passwords; The input end of user has the keyboard for user's input, and inner at random cipher input media, and arrange module and directly random number can be converted to current valid password, anyone cannot check.
After user inputs password, the password that user can input by this random cipher input media and current valid password contrast, if both are identical, then and Password Input success.If both are different, then system generates other random number immediately, is presented on screen, and user need re-enter new password, returns aforesaid operations; Meanwhile, when inputing by mistake, system can add up down the number of times that this decrypted user is inputed by mistake, cracks for anti-and forget Password as a reference.
In a preferred embodiment, random number generation module is made up of multiple random order generator, and the number of concrete random order generator can set according to user's actual need.
In a preferred embodiment, arranging module is single-chip microcomputer, the single-chip microcomputer of concrete model to be model be STC89C52.
Load module can be key-press module or touch screen module; When load module is key-press module, display module can adopt multistage charactron; When load module adopts touch screen module, display module adopts the LCD screen being integrated with resistive touch and shielding outward, and such load module and display module can be integrated.Based Intelligent Control can be realized to this device by touch-screen.This screen adopts RA8875 controller to carry out showing and touch control.RA8875 has the functions such as picture straight line, circle, orthogonal rectangle, round rectangle, filling, also has and walks the DMA transmitting function that flash memory directly arrives LCD, can the display of speeding up picture, and 2D accelerates function.
In a preferred embodiment, matching module is multidigit comparer, and the password input user and current valid password contrast by turn, only have each all identical, and just output password is entered as function signal.
In a preferred embodiment, also comprise timing module, timing module is for adding up the time that random number produces or user cipher inputs, when produced random number or user cipher input exceed default timeliness, this time Password Input ceases to be in force automatically, and regenerates random number, carries out next operation.
In a preferred embodiment, also comprise counting module, counting module for add up random number generation module produce random number or user cipher input number of times, when the number of times or Password Input number of times that generate random number exceed preset value, random cipher input media will be made to cease to be in force automatically, thus effectively can prevent Brute Force.
In some practical applications, a lot of password is stored in remote server, and in such as ATM in bank system, client password is preserved in bank's end server.In order to the utility model can be applied to this occasion, in a preferred embodiment, random cipher input media of the present utility model also comprises wireless data transfer module, and wireless data transfer module is for accessing remote server.Such as: user is when inserting oneself bank card, and ATM can be held with bank and be carried out communication, at the algorithmic rule that bank sets before getting user, then carry out above-mentioned flow process and carry out input password.Carry out input password by this approach, the situation that password is not stolen can be stopped completely, and convenient and swift, without the need to carrying any decoding tool (as electronic cipher device, U shield, checking mobile phone etc.).Further, wireless data transfer module is any one in 4G module, 3G module or GPRS module.
Below lower technical solutions of the utility model application example is in practice introduced again in detail.
Example one:
Before user inputs password, equipment is waken up, and LCD is upper can demonstrate a string random number, as: 7,5,2,6 these 4 numerals, if the algorithm set before user is: password each add 1 for random number even bit, odd bits takes advantage of 2 (getting its position more than 10).Because first is 7, is odd number, therefore it is taken advantage of 2, result is 14, gets a position 4 and obtains first password; Its second is 5, is odd number, it is taken advantage of 2, and result is 10, gets a position 0 and obtains second password; Its 3rd is 2, is even number, it is added 1, and result is 3 obtain the 3rd password; Its 4th is 6, is even number, it is added 1, and result is 7 obtain the 4th password; So 4 passwords of this input are 4,0,3,7.
Example two:
Before user inputs password, equipment is waken up, LCD is upper can demonstrate a string random number, as: 7,5,2,6 these 4 numerals, if the algorithm set before user is: each of password is the value (last position is multiplied with first, more than 10, get its position) that this corresponding random number is multiplied with a rear random number.Because first is 7, second is 5, therefore they is multiplied, and result is 35, gets a position 5 and obtains first password; Its second is the 5, three is 2, and therefore they be multiplied, result is 10, gets a position 0 and obtains second password; Its 3rd is the 2, four is 6, and therefore they be multiplied, result is 12, gets a position 2 and obtains the 3rd password; Its 4th is 6, first is 7, and therefore they be multiplied, result is 42, gets a position 2 and obtains the 4th password; So 4 passwords of this input are 5,0,2,2.
Example three:
Before user inputs password, equipment is waken up, LCD is upper can demonstrate a string random number, as 4,9,7,6,0,3 these 6 numerals, if the algorithm set before user is: password is the 3rd and is multiplied by 3, the 4th and is multiplied by the value (more than 10, getting its position) that 4, the 6th are multiplied by 6.Because the 3rd is 7, therefore it is taken advantage of 3, result is 21, gets a position 1 and obtains first password; Its 4th is 6, and therefore it is taken advantage of 4, result is 24, gets a position 4 and obtains second password; Its 6th is 3, and therefore it is taken advantage of 6, result is 18, gets a position 8 and obtains the 3rd password; So 3 passwords of this input are 1,4,8.
Example four:
Before user inputs password, equipment is waken up, LCD is upper can demonstrate a string random number, as: 3, 8, 2, 2, 9, 4, 6, 9, 5, 7 these 10 numerals, if the algorithm set before user is: password each be random number the 1st, 62, 7 ... 5, the value of the digital multiply of 10 gets its position, namely first worth position be multiplied with the 6th figure place is first password, what second was multiplied with the 7th figure place is worth a position to be second password, 3rd the worth position be multiplied with eight digit number is the 3rd password, 4th the worth position be multiplied with the 9th figure place is the 4th password, 5th the worth position be multiplied with tens is the 5th password.Because first is the 3, six is 4, by they mutually multiplied 12, get position 2 and obtain first password; Second is the 8, seven is 6, by they mutually multiplied 48, get position 8 and obtain first password; 3rd is the 2, eight is 9, by they mutually multiplied 18, get position 8 and obtain first password; 4th is the 2, nine is 5, by they mutually multiplied 10, get position 0 and obtain first password; 5th is the 9, ten is 7, by they mutually multiplied 63, get position 3 and obtain first password; So 4 passwords of this input are 2,8,8,0,3.
Example five:
Before user inputs password, equipment is waken up, LCD is upper can demonstrate a string random number, as 7,5,2,8,4,1,6,9 these 8 numerals, if the algorithm set before user is: password each be random number the 1st, 3,5,7 take advantage of 3 add again 1 value (more than 10, getting its position).Because first is 7, therefore take advantage of 3 to add 1 again it, result is 22, gets a position 2 and obtains first password; 3rd is 2, therefore takes advantage of 3 to add 1 again it, and result is 7 obtain second password; 5th is 4, takes advantage of 3 to add 1 again it, and result is 13, gets a position 3 and obtains the 3rd password; 7th is 6, therefore takes advantage of 3 to add 1 again it, and result is 19, gets a position 9 and obtains the 4th password; So 4 passwords of this input are 2,7,3,9.
Example six:
Before user inputs password, equipment is waken up, LCD is upper can demonstrate a string random number, as: 3,7, #, 6,4, *, 8 these 7 numerals or random characters, if the algorithm set before user is: the front two position of password be about " # " both sides numeral square value get its position, after password two to be " * " left and right sides square add 5 value get its position.Because one, the left side of " # " number is 7,7 square be 49, get its position 9 as first password; Because one, the right of " # " number is 6,6 square be 36, get its position 6 as second password; Because one, the left side of " * " number is 4,4 square to add 5 be again 21, get its position 1 as the 3rd password; Because one, the right of " * " number is 8,8 square be 69 for adding 5 again, get its position 9 as the 4th password; So 4 passwords of this input are 9,6,1,9.
The explanation of above embodiment just understands method of the present utility model and core concept thereof for helping.Should be understood that; for those skilled in the art; under the prerequisite not departing from the utility model principle, can also carry out some improvement and modification to the utility model, these improve and modify and also fall in the protection domain of the utility model claim.
To the above-mentioned explanation of the disclosed embodiments, professional and technical personnel in the field are realized or uses the utility model.To be apparent for those skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein when not departing from spirit or scope of the present utility model, can realize in other embodiments.Therefore, the utility model can not be restricted to these embodiments shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.

Claims (10)

1. a random cipher input media, is characterized in that, comprises random number generation module, arranges module, matching module, load module and display module, wherein,
Described random number generation module is connected with the described module that arranges with described display module, for generation of a random number, and this random number is sent to described display module and describedly arranges module;
The random number that described display module produces for showing described random number generation module;
The described module that arranges is for pre-setting password transfer algorithm and being converted to when time valid password information sends to described matching module according to this password transfer algorithm by random number;
Described load module is for inputting encrypted message;
Described matching module is connected with described load module with the described module that arranges, for judge described load module input encrypted message and described arrange that module produces whether mate when time valid password information, if the match is successful, then Password Input success.
2. random cipher input media according to claim 1, is characterized in that, described random number generation module is made up of multiple random order generator.
3. random cipher input media according to claim 1 and 2, is characterized in that, the described module that arranges is single-chip microcomputer.
4. random cipher input media according to claim 1 and 2, is characterized in that, described display module adopts multistage charactron or is integrated with the LCD screen that resistive touch shields outward.
5. random cipher input media according to claim 1 and 2, is characterized in that, described load module is key-press module or touch screen module.
6. random cipher input media according to claim 1 and 2, is characterized in that, described matching module is multidigit comparer.
7. random cipher input media according to claim 1 and 2, is characterized in that, also comprise timing module, and described timing module is for adding up the time that random number produces or user cipher inputs.
8. random cipher input media according to claim 1 and 2, is characterized in that, also comprise counting module, described counting module for add up described random number generation module produce random number or user cipher input number of times.
9. random cipher input media according to claim 1 and 2, is characterized in that, also comprise wireless data transfer module, and described wireless data transfer module is for accessing remote server.
10. random cipher input media according to claim 9, is characterized in that, described wireless data transfer module is any one in 4G module, 3G module or GPRS module.
CN201520376557.5U 2015-06-03 2015-06-03 Random cipher input device Expired - Fee Related CN204759430U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201520376557.5U CN204759430U (en) 2015-06-03 2015-06-03 Random cipher input device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201520376557.5U CN204759430U (en) 2015-06-03 2015-06-03 Random cipher input device

Publications (1)

Publication Number Publication Date
CN204759430U true CN204759430U (en) 2015-11-11

Family

ID=54474113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201520376557.5U Expired - Fee Related CN204759430U (en) 2015-06-03 2015-06-03 Random cipher input device

Country Status (1)

Country Link
CN (1) CN204759430U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105703901A (en) * 2016-03-25 2016-06-22 广东欧珀移动通信有限公司 Encrypted data input method and encrypted data input device
CN105740676A (en) * 2016-02-03 2016-07-06 四川英杰电气股份有限公司 Unlocking method and device based on PLC
CN106548082A (en) * 2016-11-08 2017-03-29 深圳市万普拉斯科技有限公司 Message treatment method and device
CN111354107A (en) * 2020-02-20 2020-06-30 深圳市春晖信档案技术服务有限公司 File management device and file management method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740676A (en) * 2016-02-03 2016-07-06 四川英杰电气股份有限公司 Unlocking method and device based on PLC
CN105703901A (en) * 2016-03-25 2016-06-22 广东欧珀移动通信有限公司 Encrypted data input method and encrypted data input device
CN106548082A (en) * 2016-11-08 2017-03-29 深圳市万普拉斯科技有限公司 Message treatment method and device
CN111354107A (en) * 2020-02-20 2020-06-30 深圳市春晖信档案技术服务有限公司 File management device and file management method

Similar Documents

Publication Publication Date Title
US10708251B2 (en) Portable authentication and encryption device and system
CN204759430U (en) Random cipher input device
CN103092484A (en) Method and device and terminal for unlocking screen
CN104408356B (en) A kind of fingerprint verification method and system, fingerprint template encryption device
CN103377364A (en) Fingerprint verification method for electronic device and system
CN104978512A (en) Password input and confirmation method and system thereof
CN104537300A (en) Safe password setting and verifying mode
CN105095719B (en) A kind of unlocked by fingerprint method and its system and the electronic equipment with the system
CN109214201A (en) A kind of data sharing method, terminal device and computer readable storage medium
CN107871081A (en) A kind of computer information safe system
CN104408363A (en) Safe password system
CN105117658A (en) Password security management method and equipment based on fingerprint authentication
CN103198247A (en) Computer safety protection method and computer safety protection system
CN102957688A (en) Password input and verification method and device
CN103532960A (en) Text encryption interaction method, encryption method and device, decryption method and device
Ren et al. How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack
CN103034442B (en) Electronic equipment and the unblock of screen thereof, unlocking information device and method is set
CN112272090B (en) Key generation method and device
CN102185696B (en) Mobile phone user authentication method without trusted third party on basis of handwriting characteristics
CN105279406B (en) A kind of method and device using Data Access Security
CN103632070B (en) Any handwriting graphical password method used for payment system
CN107895268A (en) A kind of method that safety input PIN is realized on intelligent payment terminal
CN112887085A (en) Method, device and system for generating security key of SSD (solid State disk) main control chip
CN104103107A (en) Time-varying password and time-varying password lock
US20150020165A1 (en) System of executing application and method thereof

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151111

Termination date: 20160603

CF01 Termination of patent right due to non-payment of annual fee