CN101382975A - Method for inputting password - Google Patents
Method for inputting password Download PDFInfo
- Publication number
- CN101382975A CN101382975A CNA2008100043213A CN200810004321A CN101382975A CN 101382975 A CN101382975 A CN 101382975A CN A2008100043213 A CNA2008100043213 A CN A2008100043213A CN 200810004321 A CN200810004321 A CN 200810004321A CN 101382975 A CN101382975 A CN 101382975A
- Authority
- CN
- China
- Prior art keywords
- character
- several
- password
- input
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a code-inputting method which takes use of a background image to assist a user to remember code location so as to prevent the code from being stolen by other people. In the code-inputting method, a plurality of code characters are set on the background image; the user can remember at least one code location according to the background image and input the code characters presented at the code location into a system. Therefore, the code-inputting method can take use of the background image to assist the user to remember the code location so as to prevent the code from being stolen by other people.
Description
Technical field
The present invention relates to a kind of method of inputing password, relate in particular to a kind of method that prevents the input password that password is stolen by other people.
Background technology
In recent years; no matter be the gate control system of the turnover personnel being done the current restriction of physics entity; still the people who obtains information is made the computing machine of virtual current restriction, perhaps information servo-drive system, the confidentiality of maintain cryptographic is that password can effectively be protected the condition precedent of using right far and away.For the confidentiality that improves password; security when many design inventions are devoted to protect password to transmit between network; its main means that adopt are new software or hardware of design, are intercepted by the third party when transmitting to prevent password, or increase the difficulty of its deciphering.Yet, even these designs are transmitted password safely between network, password still may be had a mind to by the onlooker when the user imports or by mistake learn, especially can't avoid under onlooker's the operating environment fully, for example using public computing machine or workstation as public spaces such as library or offices, personnel that perhaps are authorized to or general resident family also often may input password having under onlooker's the situation when entering gated area or household.In addition, to the utmost now during in operation for the ATM (Automatic Teller Machine) popularized, also there is same problem.Above-named situation is very common in modernization and informationalized daily life and some career field.Therefore, the onlooker who how to avoid password to be transfused to process knows, obviously is a urgent problem.Except safety input cryptographic problem, the auto-programming that civilian Serial No. is easier to be made repeated attempts cracks, and conventional cipher also can't more effectively be checked and utilizes the hacker.
Therefore, how inventing out a kind of method of inputing password, so that the user can utilize the background patterns password position that is memonic to be stolen by other people to prevent password, will be that the present invention will actively disclose part.
Summary of the invention
Because the defective of the method for above-mentioned existing input password the invention discloses a kind of method of inputing password, can utilize the background patterns purpose of password position of being memonic to prevent that password from being stolen by other people in the hope of reaching the user.
Fundamental purpose of the present invention is providing a kind of method of inputing password, it is by several password characters are set on background patterns, make the user remember at least one password position, and then reach when the user inputs the password character that this password position presents and to prevent the purpose that password is stolen by other people by background patterns.
For achieving the above object, the invention discloses a kind of method of inputing password, it comprises the following step:
Make a user import default code to a system;
Make a display screen show a password image area, a character highlight and a character input field, this password image area has a background patterns, show several password characters on this background patterns, separate several character blocks on this character highlight, show a prompting character on these several character blocks respectively, and these several prompting character does not repeat each other, and these several password characters and these several prompting character are respectively a literal, a numeral or a symbol;
Make this user this password character that one password position is shown import this character input field;
Make this character block annotation, this prompting character that this character block of annotation shows is identical with this password character of this character input field of input;
Repeat this step (3) to this step (4);
Finish.
A kind of method of inputing password disclosed by the invention efficiently solves the problem that prior art exists, and allows the user can utilize the background patterns password position that is memonic, and is stolen by other people to prevent password.
As mentioned above, the present invention is by several password characters are set on background patterns, cause the user to remember at least one password position, and then reach when the user inputs the password character that this password position presents and to prevent the effectiveness that password is stolen by other people by background patterns; With regard to the utilizability on the industry, the product that utilizes the present invention to derive is when the demand that can fully satisfy existing market.
Description of drawings
Fig. 1 is the process flow diagram one of preferred specific embodiment of the present invention;
Fig. 2 is the enforcement illustration one of preferred specific embodiment of the present invention;
Fig. 3 is the enforcement illustration two of preferred specific embodiment of the present invention;
Fig. 4 is the enforcement illustration three of preferred specific embodiment of the present invention;
Fig. 5 is the flowchart 2 of preferred specific embodiment of the present invention;
Fig. 6 is the flow chart 3 of preferred specific embodiment of the present invention;
Fig. 7 is the process flow diagram four of preferred specific embodiment of the present invention;
Fig. 8 is the process flow diagram five of preferred specific embodiment of the present invention;
Fig. 9 is the process flow diagram six of preferred specific embodiment of the present invention;
Figure 10 is the process flow diagram seven of preferred specific embodiment of the present invention;
Figure 11 is the process flow diagram eight of preferred specific embodiment of the present invention.
The main mark symbol description:
(1) (2) (2-1) (5-1) (5-2) (5-3) (5-4) (6) step of (2-2) (3) (4) (5)
1... password image area 11... background patterns 12... password character
13... password character 14... password character 15... password position
16... password position 17... password position 18... password block
181 password characters, 182 password character 19... password blocks
191 password characters, 192 password character 20... password blocks
201 password character 30... password blocks, 301 password characters
101 password positions, 102 password position 2... character highlights
21... character block 22... prompting character 3... character input field
Embodiment
For fully understanding purpose of the present invention, feature and effect, now by following specific embodiment, and conjunction with figs., the present invention is described in detail, illustrate as the back:
Fig. 1 and Fig. 2 are respectively the process flow diagram one of preferred specific embodiment of the present invention and implement illustration one, and as shown in the figure, the embodiment one of the method for input password of the present invention comprises the following step:
Make a user import default code to a system (figure does not show), this code is that this user is when this system registry, by this user or the decision of this system; Perhaps, this code offers this user for before this user logins this system by this system;
Make a display screen (figure does not show) show a password image area 1, a character highlight 2 and a character input field 3, this password image area 1 has a background patterns 11, show several password characters 12,13,14... etc. on this background patterns 11, separate several character blocks 21 on this character highlight 2, show a prompting character 22 on these several character blocks 21 respectively, and these several prompting character 22 does not repeat each other, and these several password characters 12,13,14... etc. and these several prompting character 22 are respectively a literal, a numeral or a symbol; Default this code of the each input of this user is during to this system, and this background patterns 11 is all identical, and these several password characters 12,13,14... etc. are to be produced by this system dynamics, and several password characters 12,13 of this that presents, 14... etc. are inequality at every turn; This background patterns 11 is that this user is when this system registry, by this user or the decision of this system; Perhaps, this background patterns 11 offers this user for before this user logins this system by this system;
Make this user this password character 12 (13,14) that one password position 15 (16,17) is shown import this character input field 3; This user imports this character input field 3 with this password character 12 (13,14) by keyboard (figure does not show) or other input media (figure does not show); Perhaps, click this character block 21 in this character highlight 2 to import this character input field 3 by mouse (figure do not show); Perhaps, by touching this character block 21 in this character highlight 2 in this display screen to import this character input field 3;
Make this character block 21 annotations, this prompting character 22 that this character block 21 of annotation shows is identical with this password character 12 of this character input field 3 of input; This character block 21 can be by changing the color annotation;
Repeat this step (3) to this step (4); Wherein, these several password positions 15,16,17 are preset order;
Finish.
Step according to embodiment one, this user imports this default code to this system, this display screen shows this password image area 1, this character highlight 2 and this character input field 3, this password image area 1 has this background patterns 11, show several password characters 12 on this background patterns 11,13,14... etc., separate several character blocks 21 on this character highlight 2, show a prompting character 22 on these several character blocks 21 respectively, these several prompting character 22 does not repeat each other, these several password characters 12,13,14... Deng and these several the prompting character 22 be respectively a literal, one numeral or a symbol, this user is with these several password positions 15 of preset order, 16,17 these shown several password characters 12,13,14 these character input fields 3 of input, and make this character block 21 annotations, this prompting character 22 that this character block 21 of annotation shows is identical with this password character 12 of this character input field 3 of input, therefore, the password of inputing this character input field 3 is J (12) A (13) Y (14).
Fig. 3 is the enforcement illustration two of preferred specific embodiment of the present invention, as shown in the figure, method by the embodiment of the invention one can derive embodiment two, the embodiment two of the method for input password of the present invention is in the step (2) of embodiment one, make this background patterns 11 be separated into several password blocks 18,19... etc. with a matrix, default in regular turn two password blocks 18,19 are 2 first indication blocks, and two password character F181 that this 2 first indications block is shown and M191 are preset with a direction indication (as upper and lower a, left side or right) and a designation number respectively; And in the step (3), making this user is starting point with this first indication block, is moving direction with this direction indication, is mobile block counts with this designation number, finds out this password position in this matrix.
Step according to embodiment two, default two password blocks 18,19 are 2 first indication blocks in regular turn, shown two password character F181 and the M191 of this 2 first indication block is preset with a direction indication respectively, reach right down, reach and be preset with a designation number respectively, 3 and 5, be starting point with this 2 first indications block in regular turn then, with this direction indication is moving direction, with this designation number is mobile block counts, find out two password positions 101,102 in this matrix, therefore, the password of inputing this character input field 3 is %L.
Fig. 4 is the enforcement illustration three of preferred specific embodiment of the present invention, as shown in the figure, method by the embodiment of the invention one can derive embodiment three, the embodiment three of the method for input password of the present invention is in the step (2) of embodiment one, make this background patterns 11 be separated into several password blocks 18 with a matrix, 19,20,30... etc., default in regular turn two password blocks 18,19 is 2 first indication blocks, preset and this two passwords block 18 in regular turn, two password blocks 20 of 19 correspondences, 30 is 2 second indication blocks, shown two password character D182 and the %192 of this 2 first indication block is preset with a direction indication respectively (as above, down, a left side or right), shown two password character I201 and the N301 of this 2 second indication block is preset with a designation number respectively; And in this step (3), making this user is starting point with this first indication block or this second indication block, is moving direction with this direction indication, is mobile block counts with this designation number, finds out this password position in this matrix.
Step according to embodiment three, default in regular turn two password blocks 18,19 is 2 first indication blocks, preset and this two passwords block 18 in regular turn, two password blocks 20 of 19 correspondences, 30 is 2 second indication blocks, shown two password character D182 and the %192 of this 2 first indication block is preset with a direction indication respectively, go up and a left side, shown two password character I201 and the N301 of this 2 second indication block is preset with a designation number respectively, 7 and 2, be starting point with this 2 first indications block in regular turn then, with this direction indication is moving direction, with this designation number is mobile block counts, in this matrix, find out two password positions 101,102, therefore, the password of inputing this character input field 3 is 0:.
Fig. 5 to Fig. 7 is respectively the flowchart 2 to four of preferred specific embodiment of the present invention, as shown in the figure, in the method for the embodiment of the invention one to three, can add step (2-1) and make this user import several first interference characters to this character input field between step (2) and step (3), these several first interference character is respectively a literal, a numeral or a symbol; And step (2-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several first disturb character identical.
Perhaps, can add step (5-1) and make this user import several second interference characters to this character input field between step (5) and step (6), these several second interference character is respectively a literal, a numeral or a symbol; And step (5-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several second disturb character identical.
Perhaps, can add step (2-1) and make this user import several first interference characters to this character input field between step (2) and step (3), these several first interference character is respectively a literal, a numeral or a symbol; And step (2-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several first disturb character identical.And add step (5-1) and make this user import several second interference characters to this character input field between step (5) and step (6), these several second interference character is respectively a literal, a numeral or a symbol; And step (5-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several second disturb character identical.
Wherein, these several first interference character can be several first character, several first default character or its combinations at random.These several second interference character can be several second character, several second default character or its combinations at random.When if other people steal the process that the user inputs password, these several disturb character can disturb the judicious password position of other people, these several default character then can prevent the supvr of this system to steal correct password position.
Fig. 8 to Figure 11 is respectively the process flow diagram five to eight of preferred specific embodiment of the present invention, as shown in the figure, in the method for the embodiment of the invention one to three, can add step (5-3) and make this user import at least one character of not importing to this system between step (5) and step (6), this does not import character is a literal, a numeral or a symbol; And step (5-4) makes this character block annotation, and it is identical that this of this input character that this character block of annotation shows and this system of input do not imported character.
Perhaps, can add step (2-1) and make this user import several first interference characters to this character input field between step (2) and step (3), these several first interference character is respectively a literal, a numeral or a symbol; And step (2-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several first disturb character identical.And add step (5-3) and make this user import at least one character of not importing to this system between step (5) and step (6), this does not import character is a literal, a numeral or a symbol; And step (5-4) makes this character block annotation, and it is identical that this of this input character that this character block of annotation shows and this system of input do not imported character.
Perhaps, can add step (5-1) and make this user import several second interference characters to this character input field between step (5) and step (6), these several second interference character is respectively a literal, a numeral or a symbol; And step (5-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several second disturb character identical; Reach step (5-3) and make this user import at least one character of not importing to this system, this does not import character is a literal, a numeral or a symbol; And step (5-4) makes this character block annotation, and it is identical that this of this input character that this character block of annotation shows and this system of input do not imported character.
Perhaps, can add step (2-1) and make this user import several first interference characters to this character input field between step (2) and step (3), these several first interference character is respectively a literal, a numeral or a symbol; And step (2-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several first disturb character identical.And add step (5-1) and make this user import several second interference characters to this character input field between step (5) and step (6), these several second interference character is respectively a literal, a numeral or a symbol; And step (5-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several second disturb character identical; Reach step (5-3) and make this user import at least one character of not importing to this system, this does not import character is a literal, a numeral or a symbol; And step (5-4) makes this character block annotation, and it is identical that this of this input character that this character block of annotation shows and this system of input do not imported character.
Wherein, these several do not import character in this character highlight not by shown this several prompting character of these several character blocks of annotation, promptly be not transfused to the residue character of this system, the user can import at least one character of not importing at last and maybe will remain character and all import this system.If other people steal the process that the user inputs password, these several do not import character and can disturb the judicious password position of other people.In addition, all characters of importing this system all can repeat input, and it can further disturb the judicious password position of other people.
As mentioned above, the present invention is by several password characters are set on background patterns, make the user remember at least one password position, and then reach when the user inputs the password character that this password position presents and to prevent the effectiveness that password is stolen by other people by background patterns.
In sum, though the present invention discloses above content with preferred embodiment, but be not in order to limit scope of the invention process, any those skilled in the art, without departing from the spirit and scope of the present invention, when doing a little change and retouching, promptly all according to equalization variation and modification that the present invention did, should be claim of the present invention and contain.
Claims (17)
1, a kind of method of inputing password is characterized in that it comprises the following step:
Make a user import default code to a system;
Make a display screen show a password image area, a character highlight and a character input field, this password image area has background patterns, show several password characters on this background patterns, separate several character blocks on this character highlight, show a prompting character on these several character blocks respectively, and these several prompting character does not repeat each other, and these several password characters and these several prompting character are respectively literal, numeral or symbol;
Make this user that this shown password character of password position is imported this character input field;
Make this character block annotation, this prompting character that this character block of annotation shows is identical with this password character of this character input field of input;
Repeat this step (3) to this step (4);
Finish.
2, the method for input password according to claim 1 is characterized in that: described password position is a preset order.
3, the method for input password according to claim 1, it is characterized in that: in the described step (2), make this background patterns be separated into several password blocks with matrix, default at least one this password block is at least one first indication block, and this shown password character of this first indication block is preset with a direction indication and designation number; In this step (3), making this user is starting point with this first indication block, is moving direction with this direction indication, is mobile block counts with this designation number, finds out this password position in this matrix; Or, in this step (2), make this background patterns be separated into several password blocks with a matrix, default at least one this password block is at least one first indication block, default at least one this password block is at least one second indication block, corresponding this first indication block of this second indication block, this shown password character of this first indication block is preset with a direction indication, and this shown password character of this second indication block is preset with designation number; In this step (3), making this user is starting point with this first indication block or this second indication block, is moving direction with this direction indication, is mobile block counts with this designation number, finds out this password position in this matrix.
4, according to the method for claim 1,2 or 3 described input passwords, it is characterized in that: this step (2) more comprises step (2-1) makes this user import several first interference characters to this character input field, and these several first interference character is respectively a literal, a numeral or a symbol; And step (2-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several first disturb character identical.
5, according to the method for claim 1,2 or 3 described input passwords, it is characterized in that: this step (5) more comprises step (5-1) makes this user import several second interference characters to this character input field, and these several second interference character is respectively literal, numeral or symbol; And step (5-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several second disturb character identical.
6, the method for input password according to claim 4, it is characterized in that: this step (5) more comprises step (5-1) makes this user import several second interference characters to this character input field, and these several second interference character is respectively literal, numeral or symbol; And step (5-2) makes this several character block annotations, this several prompting character that several character blocks of this of annotation show respectively with this character input field of input these several second disturb character identical.
7, the method for input password according to claim 1 is characterized in that: this code is that this user is when this system registry, by this user or the decision of this system; Perhaps, this code offers this user for before this user logins this system by this system.
8, the method for input password according to claim 1, it is characterized in that: when this user imports this default code to this system at every turn, this background patterns is all identical, and these several password characters are to be produced by this system dynamics, and several password characters of this that presents are inequality at every turn.
9, the method for input password according to claim 8 is characterized in that: this background patterns is that this user is when this system registry, by this user or the decision of this system; Perhaps, this background patterns offers this user for before this user logins this system by this system.
10, the method for input password according to claim 1 is characterized in that: this user imports this character input field with this password character by keyboard or other input media; Perhaps, click this character block in this character highlight to import this character input field by mouse; Perhaps, by touching this character block in this character highlight in this display screen to import this character input field.
11, the method for input password according to claim 1 is characterized in that: this character block is by changing the color annotation.
12, the method for input password according to claim 4 is characterized in that: described first disturbs character to be several first character, several first default character or its combinations at random.
13, the method for input password according to claim 5 is characterized in that: described second disturbs character to be several second character, several second default character or its combinations at random.
14, the method for input password according to claim 6 is characterized in that: described second disturbs character to be several second character, several second default character or its combinations at random.
15, according to the method for claim 1,2 or 3 described input passwords, it is characterized in that: this step (5) more comprises step (5-3) to be made this user import at least one not import character to this system, and this does not import character is literal, numeral or symbol; And step (5-4) makes this character block annotation, and it is identical that this of this input character that this character block of annotation shows and this system of input do not imported character.
16, the method for input password according to claim 4 is characterized in that: this step (5) more comprises step (5-3) to be made this user import at least one not import character to this system, and this does not import character is literal, numeral or symbol; And step (5-4) makes this character block annotation, and it is identical that this of this input character that this character block of annotation shows and this system of input do not imported character.
17, the method for input password according to claim 5 is characterized in that: this step (5) more comprises step (5-3) to be made this user import at least one not import character to this system, and this does not import character is literal, numeral or symbol; And step (5-4) makes this character block annotation, and it is identical that this of this input character that this character block of annotation shows and this system of input do not imported character.
18, the method for input password according to claim 6 is characterized in that: this step (5) more comprises step (5-3) to be made this user import at least one not import character to this system, and this does not import character is literal, numeral or symbol; And step (5-4) makes this character block annotation, and it is identical that this of this input character that this character block of annotation shows and this system of input do not imported character.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008100043213A CN101382975B (en) | 2007-09-07 | 2008-01-21 | Method for inputting password |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710146038.X | 2007-09-07 | ||
CN200710146038 | 2007-09-07 | ||
CN2008100043213A CN101382975B (en) | 2007-09-07 | 2008-01-21 | Method for inputting password |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101382975A true CN101382975A (en) | 2009-03-11 |
CN101382975B CN101382975B (en) | 2010-06-09 |
Family
ID=40462812
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008100043213A Expired - Fee Related CN101382975B (en) | 2007-09-07 | 2008-01-21 | Method for inputting password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101382975B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101996022A (en) * | 2009-08-14 | 2011-03-30 | 黄金富 | Method for displaying prompting information related to password |
CN103500299A (en) * | 2013-10-12 | 2014-01-08 | 陈璞 | Random electronic cipher system and method |
CN103777864A (en) * | 2014-01-17 | 2014-05-07 | 广东金宇恒科技有限公司 | Password login assembly |
CN107423589A (en) * | 2016-05-24 | 2017-12-01 | 阿里巴巴集团控股有限公司 | A kind of cipher-code input method and device |
WO2019165978A1 (en) * | 2018-02-28 | 2019-09-06 | 于君 | Password input method and device using indirect input of random character field mark |
CN111159699A (en) * | 2020-04-02 | 2020-05-15 | 安钥(北京)科技股份有限公司 | Verification method and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6016480A (en) * | 1997-11-07 | 2000-01-18 | Image Data, Llc | Merchandise return fraud prevention system and method |
US20040053654A1 (en) * | 2000-07-25 | 2004-03-18 | Hitoshi Kokumai | Secret information record medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed |
CN100363859C (en) * | 2005-05-17 | 2008-01-23 | 杨文馨 | Method for verifying right of passage |
-
2008
- 2008-01-21 CN CN2008100043213A patent/CN101382975B/en not_active Expired - Fee Related
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101996022A (en) * | 2009-08-14 | 2011-03-30 | 黄金富 | Method for displaying prompting information related to password |
CN103500299A (en) * | 2013-10-12 | 2014-01-08 | 陈璞 | Random electronic cipher system and method |
CN103500299B (en) * | 2013-10-12 | 2016-03-23 | 陈璞 | A kind of random electronic cipher system and method |
CN103777864A (en) * | 2014-01-17 | 2014-05-07 | 广东金宇恒科技有限公司 | Password login assembly |
CN107423589A (en) * | 2016-05-24 | 2017-12-01 | 阿里巴巴集团控股有限公司 | A kind of cipher-code input method and device |
WO2019165978A1 (en) * | 2018-02-28 | 2019-09-06 | 于君 | Password input method and device using indirect input of random character field mark |
CN111159699A (en) * | 2020-04-02 | 2020-05-15 | 安钥(北京)科技股份有限公司 | Verification method and device |
Also Published As
Publication number | Publication date |
---|---|
CN101382975B (en) | 2010-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100552667C (en) | Prevent that input information is exposed to onlooker's method | |
CN101382975B (en) | Method for inputting password | |
TW200910282A (en) | Method of inputting a password | |
CN104537300A (en) | Safe password setting and verifying mode | |
CN103996011A (en) | Method and device for protecting codes to be input safely | |
CN104834840B (en) | Cipher code protection method based on mapping drift technology | |
CN104796534A (en) | Method and device for processing information contents | |
CN101030238A (en) | Method for inputting intelligent key safety information | |
CN105187599A (en) | Contact person information management method and terminal | |
CN103957106A (en) | User-defined two-way dynamic safety certification system | |
CN101593252A (en) | Control method and system that a kind of computing machine conducts interviews to USB device | |
CN101561855B (en) | Method and system for controlling computer to access USB device | |
CN105046123A (en) | System for using picture to realize password security and setting method for using picture to realize password security | |
KR100880862B1 (en) | Security method for user input data to electronic device | |
CN106656471B (en) | A kind of guard method and system of user sensitive information | |
CN103116718A (en) | Password setting and verification method based on spatial position code log-in computer system | |
CN104966017B (en) | A kind of Password Input protects system and method | |
CN105447374A (en) | Computer implemented systems and methods for generating and recovering an authorization code | |
CN101561714B (en) | Group password input method | |
CN104392158A (en) | Mobile terminal unlocking method and mobile terminal | |
Still | Cybersecurity needs you! | |
CN106952659B (en) | CD multistage imprinting encryption method based on XTS encryption mode | |
JP6212627B2 (en) | Information processing apparatus, information processing system, information processing method, and program | |
CN106650416A (en) | Password setting and decrypting methods and terminal | |
CN103294943A (en) | Encrypted signature handwriting device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100609 Termination date: 20120121 |