CN102737195A - Master and slave dynamic passwords - Google Patents
Master and slave dynamic passwords Download PDFInfo
- Publication number
- CN102737195A CN102737195A CN2012102290014A CN201210229001A CN102737195A CN 102737195 A CN102737195 A CN 102737195A CN 2012102290014 A CN2012102290014 A CN 2012102290014A CN 201210229001 A CN201210229001 A CN 201210229001A CN 102737195 A CN102737195 A CN 102737195A
- Authority
- CN
- China
- Prior art keywords
- password
- input
- countermark
- need
- master
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses master and slave dynamic passwords. According to the conventional password input field, a string of passwords is set into a master number and a slave number under the control of an internal system; and by arrangement of a screen for displaying, the dynamic passwords input can be realized without any equipment.
Description
Technical field
This scheme can be applicable to password input fields such as various finance, electric network, electronic insurance equipment.
Background technology
In nineteen eighty-two, a researchist of AT&T Labs has proposed the design proposal of one-time password in one piece of paper, even other people have cracked password like this, also can't reuse.This is problem and the solution that has systematically proposed dynamic password for the first time.But at present most dynamic passwords all need the additional apparatus support, and present password all can't divide major-minor to use, and have greatly limited the conveniency of password.
Summary of the invention
The major-minor dynamic password in Current Password input field, can be divided into main countermark with a string password area through built-in system control, and in addition a screen display can realize that need not to carry any equipment carries out the dynamic password input.The method is easy to use; Need not any extras and only need remember a string password and some numerals (minimum three of numeral; Countermark numeral of two master's numerals; Countermark of a countermark digitized representation can be established a plurality of countermarks), the shared password of password master countermark need not the different passwords of the many strings of extra memory again; Mutual restriction relation is arranged between password and the numeral, and Neither of the two can be dispensed during input, thus on different account numbers, use same password like custom, but password is unfortunate from other local leakages, and use the method can not involved; The method use the method that dynamic password input encrypted code partly imports (dynamically be input as one nine palace lattice, nine palace lattice are arranged by 1 to 9 sequence number, and through built-in system with 0 to 9 with a to z totally 36 character stochastic distribution in nine palace lattice; The cryptopart input is that running into this character of white square needs input through the rectangular black and white lattice input that provides of reference, and black square does not then need input; Example: user's setting code is 123456; White square at 1,3,5 position black squares in 2,4,6 positions; 1,3,5 respectively in nine palace lattice, 9,1,2 positions, only need import 912 when the user imports and can accomplish input), so having, this scheme can prevent keyboard record or the risk of being peeped by the people; Have for main number and can set up countermark on their own and can use function, countermark can use number of times, revise highest weight limit function such as password, countermark use only main number function of having set (main number counter master of the pushing away rule of the countermark of qualification is arranged in addition, thus countermark can by means of with other people use).
The present invention is the input of major-minor dynamic password; Solving the technical scheme that its technical matters adopts is: on display screen, have the rectangular as password input object of reference of little lattice with one; One nine palace lattice are used for the input of dynamic password, also have an input frame to be used for the user at last and import use.The major-minor dynamic password in Current Password input field, can be divided into main countermark with a string password area through built-in system control, and in addition a screen display can realize that need not to carry any equipment carries out the dynamic password input.
The invention has the beneficial effects as follows: need not to carry the safety input that any equipment can be realized dynamic password, only need a string password of memory can realize the different input demands of main password and secondary password, and secondary password can be borrowed and gives other people interim use and need not to change password.
Description of drawings
Fig. 1 is the principle of work synoptic diagram of major-minor dynamic password: (1) that indicates among the figure be password input with reference to bar; (2) be that dynamic password contrasts used nine palace lattice; (3) be the user cipher input frame.
It is earlier that password is corresponding with little lattice on rectangular when the user uses; See that then these lattice are black square or white square, run into white square just finds the corresponding password of these lattice in nine palace lattice position, and the sequence number of this position in the nine palace lattice is input in the input frame; As run into the input that black square then skips over said process and directly carry out the input of next bit white square; When being input to the position of main countermark numeral correspondence, import current white square or black square quantity but not original password, password afterwards moves without exception backward.(example: user's setting code is 12345678, uses 2 logins of countermark numeral, and white square is in 2,3,5 positions; Black square is in 1,4,6,7,8 positions; 2,3,5 respectively in nine palace lattice, 6,8,3 positions, originally only need not import 683 and can accomplish input according to adding main countermark rule user, but add after the countermark; Countermark will add the quantity of a black square in 2 positions; So will insert a black square quantity 5 in 2 positions, correspond to 3 at nine palace lattice 5, just calculate the input of accomplishing a countermark so the user need import 6383).
Claims (1)
1. major-minor dynamic password of the present invention; In Current Password input field; Can a string password area be divided into main countermark through built-in system control, and in addition a screen display can realize that need not to carry any equipment carries out the dynamic password input, is characterized in that: in Current Password input field; Can a string password area be divided into main countermark through built-in system control, and in addition a screen display can realize that need not to carry any equipment carries out the dynamic password input.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102290014A CN102737195A (en) | 2012-07-04 | 2012-07-04 | Master and slave dynamic passwords |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102290014A CN102737195A (en) | 2012-07-04 | 2012-07-04 | Master and slave dynamic passwords |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102737195A true CN102737195A (en) | 2012-10-17 |
Family
ID=46992682
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012102290014A Pending CN102737195A (en) | 2012-07-04 | 2012-07-04 | Master and slave dynamic passwords |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102737195A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1474317A (en) * | 2003-07-15 | 2004-02-11 | �̳��� | Hidden cipher coding and identifying method |
US20060248344A1 (en) * | 2005-05-02 | 2006-11-02 | Vince Yang | Method for verifying authorized access |
CN101064602A (en) * | 2006-04-24 | 2007-10-31 | 北京易诚世纪科技有限公司 | Cipher inputting method and system |
CN101291225A (en) * | 2007-04-27 | 2008-10-22 | 丁洪涛 | Authentication method adopting complex cryptographic technique |
CN101355414A (en) * | 2007-07-25 | 2009-01-28 | 原为民 | Authentication system for formulae cipher |
CN101604366A (en) * | 2009-07-13 | 2009-12-16 | 中山爱科数字科技有限公司 | A kind of password separate dynamic verification method and system |
CN101702191A (en) * | 2009-10-31 | 2010-05-05 | 浙江德施曼机电有限公司 | Device and method for verifying passwords |
CN102411682A (en) * | 2011-08-01 | 2012-04-11 | 吴成贵 | Password setting and authentication method |
-
2012
- 2012-07-04 CN CN2012102290014A patent/CN102737195A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1474317A (en) * | 2003-07-15 | 2004-02-11 | �̳��� | Hidden cipher coding and identifying method |
US20060248344A1 (en) * | 2005-05-02 | 2006-11-02 | Vince Yang | Method for verifying authorized access |
CN101064602A (en) * | 2006-04-24 | 2007-10-31 | 北京易诚世纪科技有限公司 | Cipher inputting method and system |
CN101291225A (en) * | 2007-04-27 | 2008-10-22 | 丁洪涛 | Authentication method adopting complex cryptographic technique |
CN101355414A (en) * | 2007-07-25 | 2009-01-28 | 原为民 | Authentication system for formulae cipher |
CN101604366A (en) * | 2009-07-13 | 2009-12-16 | 中山爱科数字科技有限公司 | A kind of password separate dynamic verification method and system |
CN101702191A (en) * | 2009-10-31 | 2010-05-05 | 浙江德施曼机电有限公司 | Device and method for verifying passwords |
CN102411682A (en) * | 2011-08-01 | 2012-04-11 | 吴成贵 | Password setting and authentication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102880398B (en) | A kind of mobile phone unlock method and mobile phone based on random digit array | |
CN103543939B (en) | A kind of electronic equipment unlocking method, system and electronic equipment | |
US8850603B2 (en) | System and method for enhancing device passcode security | |
WO2015054934A1 (en) | Authentication apparatus and authentication method | |
US20130229367A1 (en) | Dynamic Patterns for Mobile Device Authentication | |
CN103957106A (en) | User-defined two-way dynamic safety certification system | |
CN102148826B (en) | Method for dynamically setting password by setting graphic per se in grid digital array | |
CN105956857A (en) | System and method for generating security virtual password keyboard | |
CN103607274B (en) | A kind of method generating dynamic password with static password for source | |
CN104537300A (en) | Safe password setting and verifying mode | |
CN104283881B (en) | Method for the Certificate Authority and safe handling of Internet of Things sensing equipment | |
CN105335633A (en) | Mobile terminal anti-peeping method and mobile terminal | |
CN104408363A (en) | Safe password system | |
CN105046123A (en) | System for using picture to realize password security and setting method for using picture to realize password security | |
CN105184132A (en) | Electronic device privacy right management method and system | |
CN102710657B (en) | A kind of one-time password generates method and system | |
CN104252305A (en) | Electronic device unlocking system and method | |
JPWO2013035203A1 (en) | Programmable display | |
CN101382975B (en) | Method for inputting password | |
CN104192652A (en) | Method for protecting safety of elevator controller parameters and elevator | |
CN104462932B (en) | Method for generating and verifying maintenance password of embedded device | |
CN105282099B (en) | The generation method and device of firewall order | |
CN103199995A (en) | File encryption method and device | |
CN101561714B (en) | Group password input method | |
CN102868521B (en) | Method for enhancing secret key transmission of symmetrical secret key system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20121017 |
|
WD01 | Invention patent application deemed withdrawn after publication |