CN102592088A - Password setting and verifying method - Google Patents
Password setting and verifying method Download PDFInfo
- Publication number
- CN102592088A CN102592088A CN2011104497236A CN201110449723A CN102592088A CN 102592088 A CN102592088 A CN 102592088A CN 2011104497236 A CN2011104497236 A CN 2011104497236A CN 201110449723 A CN201110449723 A CN 201110449723A CN 102592088 A CN102592088 A CN 102592088A
- Authority
- CN
- China
- Prior art keywords
- input
- note
- time interval
- password
- character
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Input From Keyboards Or The Like (AREA)
Abstract
The invention relates to a password setting and verifying method, wherein the setting method comprises the steps of: recording and storing a vector Ti input by a user and composed of time interval of each character/musical note; and the verifying method comprises the steps of: judging whether the input characters/musical notes are consistent with the stored characters/musical notes and verifying whether a time interval ti and the stored time interval Ti match the condition, the verification is passed if the conditions are simultaneously matched, if not, the verification is failed, and furthermore, the condition indicates whether the included angle theta of the vectors (ti and Ti) formed by the two groups of time intervals is within a threshold range. The password setting and verifying method combines password digit and music to improve the password security and the input interest.
Description
Technical field
The present invention relates to computer cryptography, be specifically related to a kind of password setting and verification method, especially be applied on the handheld terminal.
Background technology
At present widely used password all is the numerical character password on the portable terminal, and input and verification mode be dullness very all, and the user is difficult to remember a lot of password, and the password that causes being provided with is often very simple, easy crack.In addition, the password input frame for common when the user imports, is easy to by snooping password.Generally speaking, this numerical character password had both lacked mutual entertaining, lacked security again.
Summary of the invention
The technical issues that need to address of the present invention are, how a kind of password setting and verification method are provided, and can improve security, further help the user to learn off.
First technical matters of the present invention solves like this: make up a kind of cipher set-up method, it is characterized in that, may further comprise the steps:
Input: through keyboard or n symbol of touch-screen input, n is the natural number greater than 1;
Record: record corresponding characters string; Time interval Ti before and after the record between the incoming symbol, wherein: i is 1 to n-1 natural number, and Ti is the time interval between i incoming symbol and the i+1 incoming symbol;
Preserve: the combination of preserving said symbol string and time interval Ti.
Said symbol can be the set of character/note/other computer digit codings.
First technical matters of the present invention further solves like this: make up a kind of cipher set-up method, it is characterized in that, may further comprise the steps:
Input: through keyboard or n character/note of touch-screen input, n is the natural number greater than 2;
Record: the key string that the record character/note is corresponding; Time interval T between record input character/note
iBe verification vectors α, wherein: i is 1 to n-1 natural number, T
iBe the time interval between i input character/note and the i+1 input character/note, α={ T
1, T
2..., T
N-1;
Preserve: the combination of preserving said key string and verification vectors α.
According to cipher set-up method provided by the invention, said key string is the corresponding digitally coded set of character/note.
According to cipher set-up method provided by the invention, said screen displaying piano button.
According to cipher set-up method provided by the invention, comprise also and play the corresponding music of key string that this being applicable to done the password use with the tune of music.
According to cipher set-up method provided by the invention, said input step comprises twice, and this cipher set-up method also comprises twice input of checking each self-corresponding said key string and time interval T
i, only when verifying through carrying out said preservation step.Wherein: said checking includes, but are not limited to adopt following verification mode.
Another technical matters of the present invention solves like this: make up a kind of method of password authentication, it is characterized in that, may further comprise the steps:
Input: import n symbol and write down the time interval t between the incoming symbol through keyboard or touch-screen
iWherein: n is the natural number greater than 1, and i is 1 to n-1 natural number, t
iIt is the time interval between i incoming symbol and the i+1 incoming symbol;
Checking: judge relatively whether the incoming symbol string is consistent with the symbol string of being preserved password, and the proving time is t at interval
iWith the time interval T that is preserved password
iWhether eligible, satisfy then checking simultaneously and pass through, otherwise failure.
It is T that this condition includes, but are not limited to
iAbsolute value+/-error range, a kind of below perhaps.
Another technical matters of the present invention further solves like this: make up a kind of method of password authentication, it is characterized in that, may further comprise the steps:
Input: import n character/note and write down the time interval t between input character/note through keyboard or touch-screen
iBe input vector β, wherein: n is the natural number greater than 2, and i is 1 to n-1 natural number, β={ t
1, t
2..., t
N-1, t
iIt is the time interval between i input character/note and the i+1 input character/note;
Relatively input character/note and character/note string of being preserved password, consistent then calculate and the angle theta of judging input vector β and verification vectors α whether less than maximum division of a ci poem value, be then to verify to pass through, otherwise fail α={ T
1, T
2..., T
N-1.
According to method of password authentication provided by the invention, said threshold value Q is 3~8 °, and said threshold range is [Q, Q].
According to method of password authentication provided by the invention, on said touch-screen, show the piano button before said input step or in the process.
According to method of password authentication provided by the invention, in said input step, also comprise according to input character/note and play corresponding note.
Password setting provided by the invention and verification method merge password figure and music (constituting multi-C vector jointly), have the following advantages than prior art:
1, in checking key string (first dimensional vector) simultaneous verification time series (second dimensional vector), promoted cipher safety, this time series has comprised user's button custom, even peeped in the input process, also is difficult to forge password;
2, adopt vector calculation, realization music rhythmization, promoted the interest of user's aesthetic feeling, enjoyment and interactive mode, such as: the user can also expand to other musical instrument as input through playing piano input password;
3, utilize the memory of music assisted user, the user can directly use the melody fragment of oneself being familiar with as password like this.
Description of drawings
Further the present invention is elaborated below in conjunction with accompanying drawing and specific embodiment:
Fig. 1 is the schematic flow sheet of the password initial set up routine of the specific embodiment of the invention;
Fig. 2 is the schematic flow sheet of the password input validation program of the specific embodiment of the invention.
Embodiment
The thinking of the specific embodiment of the invention at first, is described:
1. provide a kind of interesting interactive mode to let the user input password, and this password can comprise the information abundanter than numerical character, be identified more accurately, remembered by the user more easily simultaneously;
2. give piano key page of user, this page can be play the corresponding key sound of user key-press.Because the tune of music is remembered than numerical character more easily, the fragment in the music that the user can directly learn by heart with oneself is as the password that is provided with; Further also can use the method for liking tune+familiar numeral, as: the birthday numeral was imported by the time interval of liking tune;
3. the user is when playing melody by key, has user's time interval habitually between two keys, and this interval can be used as the additional information of password, carries out except that password figure, second taking turns checking;
4. for guaranteeing the accuracy of password authentification, when the user imports initial password, need repeatedly input, the vector angle of the button time interval correspondence of twice input to the last is all in an error threshold scope.When checking time, the vector angle that also requires the button time interval any one in password and the original password of input is in same threshold range.
The second, the key of the specific embodiment of the invention, time interval vectorization are described:
When the user imports password with key,, then can obtain a time series { t who comprises n-1 element if imported n key
1, t
2..., t
N-1, this just is a multi-C vector.In mathematical operation, the measurement foundation that the similarity of two multi-C vectors of comparison is used usually is the angle between them.Therefore, when the coupling interarrival is whether consistent, can adopt the following step:
1. be that unit converts vectorial α and β into the millisecond with interarrival;
2. the angle theta between calculation of alpha and the β;
The cosine law according to expansion then has:
Further launch, then have:
3. θ and threshold value are compared
The threshold value that the specific embodiment of the invention is chosen is-5 ° to+5 °, if θ in this scope, representes then that interarrival matees.
At last, the program that specifies the specific embodiment of the invention realizes:
(1) password initial setting up
As shown in Figure 1, the password initial set up routine specifically may further comprise the steps in the specific embodiment of the invention:
1001) demonstration piano key interface treats that the user imports;
1002) user plays piano key, further plays corresponding key sound, and the time interval when the key sequence (being corresponding key string) pressed of record is pressed with adjacent key simultaneously is that unit conversion is the multi-C vector preservation with the millisecond with the time interval;
1003) judging this input input whether for the first time, is to return step 1001), otherwise get into next step;
1004) judge with whether input key code is consistent for the first time, be to get into step 1008), otherwise return step 1001);
Whether the vector angle in the button time interval of 1005) relatively judging twice input is to get into next step between-5 ° to+5 °; Otherwise return step 1001);
1006) corresponding key sequence and vector are preserved as combination pin;
1007) finish.
(2) password input validation
As shown in Figure 2, password input validation program specifically may further comprise the steps in the specific embodiment of the invention:
2001) demonstration piano key interface treats that the user imports;
2002) user plays piano key, further plays corresponding key sound, and the time interval when the key sequence (being corresponding key string) pressed of record and adjacent key are pressed simultaneously is that unit conversion is a multi-C vector with the millisecond with the time interval;
2003) judging whether input key code is consistent with the key sequence of being preserved in the combination pin, be to get into next step, otherwise authentication failed gets into step 1006);
2004) relatively judge between button time interval vector and the vector of being preserved in the combination pin angle whether between-5 ° to+5 °, be entering next step; Otherwise authentication failed gets into step 1006);
2005) checking is passed through;
2006) finish.
At last, the above is merely preferred embodiment of the present invention, and all equalizations of being done according to claim scope of the present invention change and modify, and all should belong to the covering scope of claim of the present invention.
Claims (10)
1. a cipher set-up method is characterized in that, may further comprise the steps:
Input: through keyboard or n symbol of touch-screen input, n is the natural number greater than 1;
Record: record corresponding symbol string; Time interval Ti before and after the record between the incoming symbol, wherein: i is 1 to n-1 natural number, and Ti is the time interval between i incoming symbol and the i+1 incoming symbol;
Preserve: the combination of preserving said symbol string and time interval Ti.
2. a cipher set-up method is characterized in that, may further comprise the steps:
Input: through keyboard or n character/note of touch-screen input, n is the natural number greater than 2;
Record: the key string that the record character/note is corresponding; Time interval T between record input character/note
iBe verification vectors α, wherein: i is 1 to n-1 natural number, T
iIt is the time interval between i input character/note and the i+1 input character/note; α={ T
1, T
2..., T
N-1Preserve: the combination of preserving said key string and verification vectors α.
3. according to the said cipher set-up method of claim 2, it is characterized in that said key string is the corresponding digitally coded set of character/note.
4. according to claim 2 or 3 said cipher set-up methods, it is characterized in that said screen displaying piano button.
5. according to the said cipher set-up method of claim 1, it is characterized in that said input step need carry out twice, this cipher set-up method also comprises twice input of checking each self-corresponding said key string and time interval T
i, only when verifying through just carrying out said preservation step.
6. a method of password authentication is characterized in that, may further comprise the steps:
Input: import n symbol and write down the time interval t between the incoming symbol through keyboard or touch-screen
iWherein: n is the natural number greater than 1, and i is 1 to n-1 natural number, t
iIt is the time interval between i incoming symbol and the i+1 incoming symbol;
Checking: judge relatively whether the incoming symbol string is consistent with the symbol string of being preserved password, and the proving time is t at interval
iWith the time interval T that is preserved password
iWhether eligible, satisfy then checking simultaneously and pass through, otherwise failure.
7. a method of password authentication is characterized in that, may further comprise the steps:
Input: import n character/note and write down the time interval t between input character/note through keyboard or touch-screen
iBe input vector β, wherein: n is the natural number greater than 2, and i is 1 to n-1 natural number, β={ t
1, t
2..., t
N-1, t
iIt is the time interval between i input character/note and the i+1 input character/note;
Checking: relatively input character/note and character/note of being preserved password, consistent then calculate and the angle theta of judging input vector β and verification vectors α whether in threshold range, be then to verify to pass through, otherwise fail α={ T
1, T
2..., T
N-1, Ti is preserved the time interval of password.
8. according to the said method of password authentication of claim 7, it is characterized in that:
9. according to the said method of password authentication of claim 7, it is characterized in that said threshold value Q is 3~8 °, said threshold range is [Q, Q].
10. according to claim 7,8 or 9 said method of password authentications, it is characterized in that, in said input step, also comprise according to input character/note and play corresponding note.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104497236A CN102592088A (en) | 2011-12-28 | 2011-12-28 | Password setting and verifying method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104497236A CN102592088A (en) | 2011-12-28 | 2011-12-28 | Password setting and verifying method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102592088A true CN102592088A (en) | 2012-07-18 |
Family
ID=46480708
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011104497236A Pending CN102592088A (en) | 2011-12-28 | 2011-12-28 | Password setting and verifying method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102592088A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103455752A (en) * | 2013-09-10 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | Password setting method, password verification method, device and system using methods |
CN103839327A (en) * | 2012-11-21 | 2014-06-04 | 由田新技股份有限公司 | Password indirect confirming device and method |
CN103873455A (en) * | 2012-12-18 | 2014-06-18 | 阿里巴巴集团控股有限公司 | Method and device for information check |
CN104363087A (en) * | 2014-11-19 | 2015-02-18 | 深圳市中兴移动通信有限公司 | Encryption and decryption method and device |
CN104700040A (en) * | 2013-12-10 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Authority control method and device |
CN105354447A (en) * | 2015-11-01 | 2016-02-24 | 王向伟 | Method for implementing protection of software based on network communication |
CN105426704A (en) * | 2015-11-01 | 2016-03-23 | 王向伟 | Network communication based method for realizing computer software protection |
CN105450405A (en) * | 2014-07-18 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Password setting and authentication method and system |
CN106851542A (en) * | 2017-02-17 | 2017-06-13 | 武汉时代华声科技有限公司 | The Bluetooth pairing methods and system of musical instruments |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102170348A (en) * | 2010-11-08 | 2011-08-31 | 无敌科技(西安)有限公司 | Method for achieving encryption and decryption of data through recording user input speed |
CN102256011A (en) * | 2011-06-27 | 2011-11-23 | 深圳市同洲电子股份有限公司 | Mobile terminal, and method and device for unlocking same |
-
2011
- 2011-12-28 CN CN2011104497236A patent/CN102592088A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102170348A (en) * | 2010-11-08 | 2011-08-31 | 无敌科技(西安)有限公司 | Method for achieving encryption and decryption of data through recording user input speed |
CN102256011A (en) * | 2011-06-27 | 2011-11-23 | 深圳市同洲电子股份有限公司 | Mobile terminal, and method and device for unlocking same |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103839327A (en) * | 2012-11-21 | 2014-06-04 | 由田新技股份有限公司 | Password indirect confirming device and method |
CN103839327B (en) * | 2012-11-21 | 2016-10-05 | 由田新技股份有限公司 | Password indirect acknowledgment devices and methods therefor |
CN103873455A (en) * | 2012-12-18 | 2014-06-18 | 阿里巴巴集团控股有限公司 | Method and device for information check |
US10448247B2 (en) | 2012-12-18 | 2019-10-15 | Alibaba Group Holding Limited | Method and apparatus for information verification |
CN103873455B (en) * | 2012-12-18 | 2019-05-17 | 阿里巴巴集团控股有限公司 | A kind of method and device of information checking |
CN103455752B (en) * | 2013-09-10 | 2016-10-05 | 百度在线网络技术(北京)有限公司 | Password arranges the device and system with method of password authentication and using the method |
CN103455752A (en) * | 2013-09-10 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | Password setting method, password verification method, device and system using methods |
CN104700040A (en) * | 2013-12-10 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Authority control method and device |
CN105450405A (en) * | 2014-07-18 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Password setting and authentication method and system |
CN105450405B (en) * | 2014-07-18 | 2018-10-02 | 阿里巴巴集团控股有限公司 | A kind of setting of password and authentication method and system |
CN104363087A (en) * | 2014-11-19 | 2015-02-18 | 深圳市中兴移动通信有限公司 | Encryption and decryption method and device |
CN105426704A (en) * | 2015-11-01 | 2016-03-23 | 王向伟 | Network communication based method for realizing computer software protection |
CN105426704B (en) * | 2015-11-01 | 2018-05-01 | 佛山市电子政务科技有限公司 | A kind of method that protecting computer software is realized based on network service |
CN105354447B (en) * | 2015-11-01 | 2018-09-04 | 广州安士维信息科技有限公司 | A method of protecting computer software is realized based on network communication |
CN105354447A (en) * | 2015-11-01 | 2016-02-24 | 王向伟 | Method for implementing protection of software based on network communication |
CN106851542A (en) * | 2017-02-17 | 2017-06-13 | 武汉时代华声科技有限公司 | The Bluetooth pairing methods and system of musical instruments |
CN106851542B (en) * | 2017-02-17 | 2020-05-08 | 武汉时代华声科技有限公司 | Bluetooth pairing method and system for music equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102592088A (en) | Password setting and verifying method | |
CN101231737B (en) | Method and system for enhancing internet bank trade security | |
KR101757990B1 (en) | Method and device for voiceprint indentification | |
CN104217149B (en) | Biometric authentication method and equipment based on voice | |
Hwang et al. | Keystroke dynamics-based authentication for mobile devices | |
KR101201151B1 (en) | User authentication by combining speaker verification and reverse turing test | |
US8725514B2 (en) | Verifying a user using speaker verification and a multimodal web-based interface | |
US8136154B2 (en) | Hidden markov model (“HMM”)-based user authentication using keystroke dynamics | |
CN107316638A (en) | A kind of poem recites evaluating method and system, a kind of terminal and storage medium | |
CN101685635A (en) | Identity authentication system and method | |
CN105869641A (en) | Speech recognition device and speech recognition method | |
Rudrapal et al. | Voice recognition and authentication as a proficient biometric tool and its application in online exam for PH people | |
JP2015510147A5 (en) | ||
CN103873254A (en) | Method for generating human vocal print biometric key | |
WO2005045550A3 (en) | Password recovery system and method | |
CN107833168A (en) | Word learning method, device and system and intelligent pen | |
CN103002139A (en) | Unlocking method of touch screen terminal | |
CN110379411A (en) | For the phoneme synthesizing method and device of target speaker | |
CN107046517A (en) | A kind of method of speech processing, device and intelligent terminal | |
CN107292141A (en) | A kind of authentication means, terminal and method | |
He et al. | " OK, Siri" or" Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score. | |
CN101663855A (en) | Information processor, program, and recording medium | |
CN109492357B (en) | Identity authentication method, identity authentication equipment and computer storage medium | |
CN106384595A (en) | Voice password based payment platform login method and device | |
Giot et al. | Analysis of the acquisition process for keystroke dynamics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120718 |