CN102592088A - Password setting and verifying method - Google Patents

Password setting and verifying method Download PDF

Info

Publication number
CN102592088A
CN102592088A CN2011104497236A CN201110449723A CN102592088A CN 102592088 A CN102592088 A CN 102592088A CN 2011104497236 A CN2011104497236 A CN 2011104497236A CN 201110449723 A CN201110449723 A CN 201110449723A CN 102592088 A CN102592088 A CN 102592088A
Authority
CN
China
Prior art keywords
input
note
time interval
password
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104497236A
Other languages
Chinese (zh)
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN2011104497236A priority Critical patent/CN102592088A/en
Publication of CN102592088A publication Critical patent/CN102592088A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Input From Keyboards Or The Like (AREA)

Abstract

The invention relates to a password setting and verifying method, wherein the setting method comprises the steps of: recording and storing a vector Ti input by a user and composed of time interval of each character/musical note; and the verifying method comprises the steps of: judging whether the input characters/musical notes are consistent with the stored characters/musical notes and verifying whether a time interval ti and the stored time interval Ti match the condition, the verification is passed if the conditions are simultaneously matched, if not, the verification is failed, and furthermore, the condition indicates whether the included angle theta of the vectors (ti and Ti) formed by the two groups of time intervals is within a threshold range. The password setting and verifying method combines password digit and music to improve the password security and the input interest.

Description

A kind of password setting and verification method
Technical field
The present invention relates to computer cryptography, be specifically related to a kind of password setting and verification method, especially be applied on the handheld terminal.
Background technology
At present widely used password all is the numerical character password on the portable terminal, and input and verification mode be dullness very all, and the user is difficult to remember a lot of password, and the password that causes being provided with is often very simple, easy crack.In addition, the password input frame for common when the user imports, is easy to by snooping password.Generally speaking, this numerical character password had both lacked mutual entertaining, lacked security again.
Summary of the invention
The technical issues that need to address of the present invention are, how a kind of password setting and verification method are provided, and can improve security, further help the user to learn off.
First technical matters of the present invention solves like this: make up a kind of cipher set-up method, it is characterized in that, may further comprise the steps:
Input: through keyboard or n symbol of touch-screen input, n is the natural number greater than 1;
Record: record corresponding characters string; Time interval Ti before and after the record between the incoming symbol, wherein: i is 1 to n-1 natural number, and Ti is the time interval between i incoming symbol and the i+1 incoming symbol;
Preserve: the combination of preserving said symbol string and time interval Ti.
Said symbol can be the set of character/note/other computer digit codings.
First technical matters of the present invention further solves like this: make up a kind of cipher set-up method, it is characterized in that, may further comprise the steps:
Input: through keyboard or n character/note of touch-screen input, n is the natural number greater than 2;
Record: the key string that the record character/note is corresponding; Time interval T between record input character/note iBe verification vectors α, wherein: i is 1 to n-1 natural number, T iBe the time interval between i input character/note and the i+1 input character/note, α={ T 1, T 2..., T N-1;
Preserve: the combination of preserving said key string and verification vectors α.
According to cipher set-up method provided by the invention, said key string is the corresponding digitally coded set of character/note.
According to cipher set-up method provided by the invention, said screen displaying piano button.
According to cipher set-up method provided by the invention, comprise also and play the corresponding music of key string that this being applicable to done the password use with the tune of music.
According to cipher set-up method provided by the invention, said input step comprises twice, and this cipher set-up method also comprises twice input of checking each self-corresponding said key string and time interval T i, only when verifying through carrying out said preservation step.Wherein: said checking includes, but are not limited to adopt following verification mode.
Another technical matters of the present invention solves like this: make up a kind of method of password authentication, it is characterized in that, may further comprise the steps:
Input: import n symbol and write down the time interval t between the incoming symbol through keyboard or touch-screen iWherein: n is the natural number greater than 1, and i is 1 to n-1 natural number, t iIt is the time interval between i incoming symbol and the i+1 incoming symbol;
Checking: judge relatively whether the incoming symbol string is consistent with the symbol string of being preserved password, and the proving time is t at interval iWith the time interval T that is preserved password iWhether eligible, satisfy then checking simultaneously and pass through, otherwise failure.
It is T that this condition includes, but are not limited to iAbsolute value+/-error range, a kind of below perhaps.
Another technical matters of the present invention further solves like this: make up a kind of method of password authentication, it is characterized in that, may further comprise the steps:
Input: import n character/note and write down the time interval t between input character/note through keyboard or touch-screen iBe input vector β, wherein: n is the natural number greater than 2, and i is 1 to n-1 natural number, β={ t 1, t 2..., t N-1, t iIt is the time interval between i input character/note and the i+1 input character/note;
Relatively input character/note and character/note string of being preserved password, consistent then calculate and the angle theta of judging input vector β and verification vectors α whether less than maximum division of a ci poem value, be then to verify to pass through, otherwise fail α={ T 1, T 2..., T N-1.
According to method of password authentication provided by the invention,
Figure BDA0000125957800000031
According to method of password authentication provided by the invention, said threshold value Q is 3~8 °, and said threshold range is [Q, Q].
According to method of password authentication provided by the invention, on said touch-screen, show the piano button before said input step or in the process.
According to method of password authentication provided by the invention, in said input step, also comprise according to input character/note and play corresponding note.
Password setting provided by the invention and verification method merge password figure and music (constituting multi-C vector jointly), have the following advantages than prior art:
1, in checking key string (first dimensional vector) simultaneous verification time series (second dimensional vector), promoted cipher safety, this time series has comprised user's button custom, even peeped in the input process, also is difficult to forge password;
2, adopt vector calculation, realization music rhythmization, promoted the interest of user's aesthetic feeling, enjoyment and interactive mode, such as: the user can also expand to other musical instrument as input through playing piano input password;
3, utilize the memory of music assisted user, the user can directly use the melody fragment of oneself being familiar with as password like this.
Description of drawings
Further the present invention is elaborated below in conjunction with accompanying drawing and specific embodiment:
Fig. 1 is the schematic flow sheet of the password initial set up routine of the specific embodiment of the invention;
Fig. 2 is the schematic flow sheet of the password input validation program of the specific embodiment of the invention.
Embodiment
The thinking of the specific embodiment of the invention at first, is described:
1. provide a kind of interesting interactive mode to let the user input password, and this password can comprise the information abundanter than numerical character, be identified more accurately, remembered by the user more easily simultaneously;
2. give piano key page of user, this page can be play the corresponding key sound of user key-press.Because the tune of music is remembered than numerical character more easily, the fragment in the music that the user can directly learn by heart with oneself is as the password that is provided with; Further also can use the method for liking tune+familiar numeral, as: the birthday numeral was imported by the time interval of liking tune;
3. the user is when playing melody by key, has user's time interval habitually between two keys, and this interval can be used as the additional information of password, carries out except that password figure, second taking turns checking;
4. for guaranteeing the accuracy of password authentification, when the user imports initial password, need repeatedly input, the vector angle of the button time interval correspondence of twice input to the last is all in an error threshold scope.When checking time, the vector angle that also requires the button time interval any one in password and the original password of input is in same threshold range.
The second, the key of the specific embodiment of the invention, time interval vectorization are described:
When the user imports password with key,, then can obtain a time series { t who comprises n-1 element if imported n key 1, t 2..., t N-1, this just is a multi-C vector.In mathematical operation, the measurement foundation that the similarity of two multi-C vectors of comparison is used usually is the angle between them.Therefore, when the coupling interarrival is whether consistent, can adopt the following step:
1. be that unit converts vectorial α and β into the millisecond with interarrival;
2. the angle theta between calculation of alpha and the β;
The cosine law according to expansion then has:
θ = cos - 1 ( α , β ) | | α | | * | | β | |
Further launch, then have:
θ = cos - 1 Σ i = 1 n - 1 t i * T i Σ i = 1 n - 1 t i 2 * Σ i = 1 n - 1 T i 2
3. θ and threshold value are compared
The threshold value that the specific embodiment of the invention is chosen is-5 ° to+5 °, if θ in this scope, representes then that interarrival matees.
At last, the program that specifies the specific embodiment of the invention realizes:
(1) password initial setting up
As shown in Figure 1, the password initial set up routine specifically may further comprise the steps in the specific embodiment of the invention:
1001) demonstration piano key interface treats that the user imports;
1002) user plays piano key, further plays corresponding key sound, and the time interval when the key sequence (being corresponding key string) pressed of record is pressed with adjacent key simultaneously is that unit conversion is the multi-C vector preservation with the millisecond with the time interval;
1003) judging this input input whether for the first time, is to return step 1001), otherwise get into next step;
1004) judge with whether input key code is consistent for the first time, be to get into step 1008), otherwise return step 1001);
Whether the vector angle in the button time interval of 1005) relatively judging twice input is to get into next step between-5 ° to+5 °; Otherwise return step 1001);
1006) corresponding key sequence and vector are preserved as combination pin;
1007) finish.
(2) password input validation
As shown in Figure 2, password input validation program specifically may further comprise the steps in the specific embodiment of the invention:
2001) demonstration piano key interface treats that the user imports;
2002) user plays piano key, further plays corresponding key sound, and the time interval when the key sequence (being corresponding key string) pressed of record and adjacent key are pressed simultaneously is that unit conversion is a multi-C vector with the millisecond with the time interval;
2003) judging whether input key code is consistent with the key sequence of being preserved in the combination pin, be to get into next step, otherwise authentication failed gets into step 1006);
2004) relatively judge between button time interval vector and the vector of being preserved in the combination pin angle whether between-5 ° to+5 °, be entering next step; Otherwise authentication failed gets into step 1006);
2005) checking is passed through;
2006) finish.
At last, the above is merely preferred embodiment of the present invention, and all equalizations of being done according to claim scope of the present invention change and modify, and all should belong to the covering scope of claim of the present invention.

Claims (10)

1. a cipher set-up method is characterized in that, may further comprise the steps:
Input: through keyboard or n symbol of touch-screen input, n is the natural number greater than 1;
Record: record corresponding symbol string; Time interval Ti before and after the record between the incoming symbol, wherein: i is 1 to n-1 natural number, and Ti is the time interval between i incoming symbol and the i+1 incoming symbol;
Preserve: the combination of preserving said symbol string and time interval Ti.
2. a cipher set-up method is characterized in that, may further comprise the steps:
Input: through keyboard or n character/note of touch-screen input, n is the natural number greater than 2;
Record: the key string that the record character/note is corresponding; Time interval T between record input character/note iBe verification vectors α, wherein: i is 1 to n-1 natural number, T iIt is the time interval between i input character/note and the i+1 input character/note; α={ T 1, T 2..., T N-1Preserve: the combination of preserving said key string and verification vectors α.
3. according to the said cipher set-up method of claim 2, it is characterized in that said key string is the corresponding digitally coded set of character/note.
4. according to claim 2 or 3 said cipher set-up methods, it is characterized in that said screen displaying piano button.
5. according to the said cipher set-up method of claim 1, it is characterized in that said input step need carry out twice, this cipher set-up method also comprises twice input of checking each self-corresponding said key string and time interval T i, only when verifying through just carrying out said preservation step.
6. a method of password authentication is characterized in that, may further comprise the steps:
Input: import n symbol and write down the time interval t between the incoming symbol through keyboard or touch-screen iWherein: n is the natural number greater than 1, and i is 1 to n-1 natural number, t iIt is the time interval between i incoming symbol and the i+1 incoming symbol;
Checking: judge relatively whether the incoming symbol string is consistent with the symbol string of being preserved password, and the proving time is t at interval iWith the time interval T that is preserved password iWhether eligible, satisfy then checking simultaneously and pass through, otherwise failure.
7. a method of password authentication is characterized in that, may further comprise the steps:
Input: import n character/note and write down the time interval t between input character/note through keyboard or touch-screen iBe input vector β, wherein: n is the natural number greater than 2, and i is 1 to n-1 natural number, β={ t 1, t 2..., t N-1, t iIt is the time interval between i input character/note and the i+1 input character/note;
Checking: relatively input character/note and character/note of being preserved password, consistent then calculate and the angle theta of judging input vector β and verification vectors α whether in threshold range, be then to verify to pass through, otherwise fail α={ T 1, T 2..., T N-1, Ti is preserved the time interval of password.
8. according to the said method of password authentication of claim 7, it is characterized in that:
θ = cos - 1 ( α , β ) | | α | | * | | β | | .
9. according to the said method of password authentication of claim 7, it is characterized in that said threshold value Q is 3~8 °, said threshold range is [Q, Q].
10. according to claim 7,8 or 9 said method of password authentications, it is characterized in that, in said input step, also comprise according to input character/note and play corresponding note.
CN2011104497236A 2011-12-28 2011-12-28 Password setting and verifying method Pending CN102592088A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104497236A CN102592088A (en) 2011-12-28 2011-12-28 Password setting and verifying method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104497236A CN102592088A (en) 2011-12-28 2011-12-28 Password setting and verifying method

Publications (1)

Publication Number Publication Date
CN102592088A true CN102592088A (en) 2012-07-18

Family

ID=46480708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104497236A Pending CN102592088A (en) 2011-12-28 2011-12-28 Password setting and verifying method

Country Status (1)

Country Link
CN (1) CN102592088A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455752A (en) * 2013-09-10 2013-12-18 百度在线网络技术(北京)有限公司 Password setting method, password verification method, device and system using methods
CN103839327A (en) * 2012-11-21 2014-06-04 由田新技股份有限公司 Password indirect confirming device and method
CN103873455A (en) * 2012-12-18 2014-06-18 阿里巴巴集团控股有限公司 Method and device for information check
CN104363087A (en) * 2014-11-19 2015-02-18 深圳市中兴移动通信有限公司 Encryption and decryption method and device
CN104700040A (en) * 2013-12-10 2015-06-10 腾讯科技(深圳)有限公司 Authority control method and device
CN105354447A (en) * 2015-11-01 2016-02-24 王向伟 Method for implementing protection of software based on network communication
CN105426704A (en) * 2015-11-01 2016-03-23 王向伟 Network communication based method for realizing computer software protection
CN105450405A (en) * 2014-07-18 2016-03-30 阿里巴巴集团控股有限公司 Password setting and authentication method and system
CN106851542A (en) * 2017-02-17 2017-06-13 武汉时代华声科技有限公司 The Bluetooth pairing methods and system of musical instruments

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102170348A (en) * 2010-11-08 2011-08-31 无敌科技(西安)有限公司 Method for achieving encryption and decryption of data through recording user input speed
CN102256011A (en) * 2011-06-27 2011-11-23 深圳市同洲电子股份有限公司 Mobile terminal, and method and device for unlocking same

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102170348A (en) * 2010-11-08 2011-08-31 无敌科技(西安)有限公司 Method for achieving encryption and decryption of data through recording user input speed
CN102256011A (en) * 2011-06-27 2011-11-23 深圳市同洲电子股份有限公司 Mobile terminal, and method and device for unlocking same

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103839327A (en) * 2012-11-21 2014-06-04 由田新技股份有限公司 Password indirect confirming device and method
CN103839327B (en) * 2012-11-21 2016-10-05 由田新技股份有限公司 Password indirect acknowledgment devices and methods therefor
CN103873455A (en) * 2012-12-18 2014-06-18 阿里巴巴集团控股有限公司 Method and device for information check
US10448247B2 (en) 2012-12-18 2019-10-15 Alibaba Group Holding Limited Method and apparatus for information verification
CN103873455B (en) * 2012-12-18 2019-05-17 阿里巴巴集团控股有限公司 A kind of method and device of information checking
CN103455752B (en) * 2013-09-10 2016-10-05 百度在线网络技术(北京)有限公司 Password arranges the device and system with method of password authentication and using the method
CN103455752A (en) * 2013-09-10 2013-12-18 百度在线网络技术(北京)有限公司 Password setting method, password verification method, device and system using methods
CN104700040A (en) * 2013-12-10 2015-06-10 腾讯科技(深圳)有限公司 Authority control method and device
CN105450405A (en) * 2014-07-18 2016-03-30 阿里巴巴集团控股有限公司 Password setting and authentication method and system
CN105450405B (en) * 2014-07-18 2018-10-02 阿里巴巴集团控股有限公司 A kind of setting of password and authentication method and system
CN104363087A (en) * 2014-11-19 2015-02-18 深圳市中兴移动通信有限公司 Encryption and decryption method and device
CN105426704A (en) * 2015-11-01 2016-03-23 王向伟 Network communication based method for realizing computer software protection
CN105426704B (en) * 2015-11-01 2018-05-01 佛山市电子政务科技有限公司 A kind of method that protecting computer software is realized based on network service
CN105354447B (en) * 2015-11-01 2018-09-04 广州安士维信息科技有限公司 A method of protecting computer software is realized based on network communication
CN105354447A (en) * 2015-11-01 2016-02-24 王向伟 Method for implementing protection of software based on network communication
CN106851542A (en) * 2017-02-17 2017-06-13 武汉时代华声科技有限公司 The Bluetooth pairing methods and system of musical instruments
CN106851542B (en) * 2017-02-17 2020-05-08 武汉时代华声科技有限公司 Bluetooth pairing method and system for music equipment

Similar Documents

Publication Publication Date Title
CN102592088A (en) Password setting and verifying method
CN101231737B (en) Method and system for enhancing internet bank trade security
KR101757990B1 (en) Method and device for voiceprint indentification
CN104217149B (en) Biometric authentication method and equipment based on voice
Hwang et al. Keystroke dynamics-based authentication for mobile devices
KR101201151B1 (en) User authentication by combining speaker verification and reverse turing test
US8725514B2 (en) Verifying a user using speaker verification and a multimodal web-based interface
US8136154B2 (en) Hidden markov model (“HMM”)-based user authentication using keystroke dynamics
CN107316638A (en) A kind of poem recites evaluating method and system, a kind of terminal and storage medium
CN101685635A (en) Identity authentication system and method
CN105869641A (en) Speech recognition device and speech recognition method
Rudrapal et al. Voice recognition and authentication as a proficient biometric tool and its application in online exam for PH people
JP2015510147A5 (en)
CN103873254A (en) Method for generating human vocal print biometric key
WO2005045550A3 (en) Password recovery system and method
CN107833168A (en) Word learning method, device and system and intelligent pen
CN103002139A (en) Unlocking method of touch screen terminal
CN110379411A (en) For the phoneme synthesizing method and device of target speaker
CN107046517A (en) A kind of method of speech processing, device and intelligent terminal
CN107292141A (en) A kind of authentication means, terminal and method
He et al. " OK, Siri" or" Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
CN101663855A (en) Information processor, program, and recording medium
CN109492357B (en) Identity authentication method, identity authentication equipment and computer storage medium
CN106384595A (en) Voice password based payment platform login method and device
Giot et al. Analysis of the acquisition process for keystroke dynamics

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120718