CN102810140A - Mode for verifying mobile phone screen contact to be mobile application security password - Google Patents
Mode for verifying mobile phone screen contact to be mobile application security password Download PDFInfo
- Publication number
- CN102810140A CN102810140A CN201110142256.2A CN201110142256A CN102810140A CN 102810140 A CN102810140 A CN 102810140A CN 201110142256 A CN201110142256 A CN 201110142256A CN 102810140 A CN102810140 A CN 102810140A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- user
- mode
- phone screen
- mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention relates to a mode for verifying a mobile phone screen contact to be a mobile application security password. The mode comprises the following steps of: using a mobile phone with a touch input function; when application software is opened for the first time, prompting a user of setting a geometric plane shape and setting a security threshold of the geometric plane shape by a mobile phone screen; after the user carries out the setting operation, recording the geometric plane shape and the corresponding threshold thereof and establishing a pattern password file correlated with the application software by the mobile phone; when the user opens the application software again, promoting the user of inputting a geometric shape set by the user within an input range by the mobile phone; comparing the similarity of the drawn geometric shape with that of the drawn shape during setting and calculating the similarity percentage of the drawn shape and the set drawn shape by the mobile phone; and if the similarity percentage exceeds the set security threshold, allowing the user to continuously use and otherwise, refusing the use of the user and recording the similarity percentage into a security log. The mode can be convenient for memory and can individually set different thresholds according to different protection requirements of mobile phone software.
Description
Technical field
The present invention relates to field of information security technology, be specifically related to use the mode of mobile phone screen contact checking as the mobile application security password.
Background technology
Along with the growth of popularizing, moving bandwidth of smart mobile phone, mobile phone becomes mobile application terminal gradually.And mobile phone is as a kind of private personal effects, and the involved individual privacy safety problem of various application software also more and more receives users' concern in its system.As: individual's log, mobile payment number of the account, Mobile business consumption record etc. all are privacies that the user needs protection.
Yet the means to the mobile phone application software protection generally are to adopt key passwords at present, yet there is following shortcoming in this mode:
-receive the restriction of mobile phone key, generally only can use numerical ciphers, the intensity of password is not high
-password needs the user to remember, and too weak point is too regular breaks through easily, and oversize being not easy to again remembered
-different application software adopts different passwords, can improve security, but more is not easy to memory
There is a broken complete broken risk in the-different identical password of the soft employing of application.
Because there is above variety of problems in key passwords, users just need a kind of safer, technology of subscriber authentication more easily.
Based on above-mentioned technical background, the present invention proposes a kind of mode of using the checking of mobile phone screen contact as the mobile application security password.
The checking of mobile phone screen contact is the mode according to the plane geometric figure identity verification of personal set.The checking of mobile phone screen contact has registration (Voice Enrollment) and checking (Voice Verification) two links.Can when registration, be set by the user specific plane geometry pattern on the whole because of the concrete difference that realizes is different, the plane geometry pattern that input was set originally during checking judges whether the verifier is exactly the registrant.
Mobile phone screen contact checking proposed by the invention comprises fixedly described point and two kinds of patterns of not limited drafting, and the one, software defined described point quantity and position, the user sets the different combinations scheme in these described points; The 2nd, the user can arbitrarily import arbitrary shape, and system adopts the way of contrast similarity to verify.
For example; Existing mobile phone screen contact verification method; Like Chinese patent publication number CN101685361A, denomination of invention is the patent of invention of " hand-drawing graphics password input method ", its characteristic comprise the steps be: (a) show on several guiding punctuates and Touch Screens; (b) each guiding punctuate is associated with a character or symbol; (c) searching in regular turn should be guided punctuate on Touch Screen, imported a graphical passwords, and pairing character of guiding punctuate that this graphical passwords clicked continuously or symbol will be formed the valid password input of one group of character or symbol in proper order.Yet the method that this patent is introduced is owing to the quantity and the position of having limited described point, and therefore, if the described point quantity of restriction is many, the particular location of each point is remembered in inconvenience.If restriction described point quantity is few, then safeguard protection is not enough, has the risk that is cracked.And the method that this patent is introduced lacks personalized level of security setting.
Summary of the invention
The object of the invention is to provide a kind of mode of using the checking of mobile phone screen contact as the mobile application security password, is used to solve above technical matters.
The technical matters that the present invention solved can adopt following technical scheme to realize:
A kind of mode of using the checking of mobile phone screen contact as the mobile application security password is characterized in that the security password of mobile phone screen contact verification technique as mobile phone application software specifically may further comprise the steps:
1.. be to use a mobile phone, said mobile phone comprises the touch-screen input function;
2.. use first; The user is when opening application software; Mobile phone screen can be pointed out the user to set a plane geometric figure and set its safe threshold values; After the user drew and sets and accomplishes, mobile phone can write down this plane geometric figure threshold values corresponding with it, and set up the graphical passwords archives that are associated with this application software;
3.. when the user opened said application software once more, mobile phone can point out the user in the mobile phone screen input range, to import the geometric figure that user originally sets;
4.. mobile phone can carry out the similarity contrast with the figure painted of painting geometric figure when setting, and calculates this drawing shape and the similarity number percent of setting institute's drawing shape;
5.. if said similarity number percent surpasses the safe threshold values of said setting, then allow the user to continue to use this application software, otherwise refuse its use and charge to security log.
According to this method, said step 2. plane geometric figure is that the user can draw arbitrarily in the mobile phone screen input range.
According to this method, said step safe threshold values 2. is to be set by user oneself according to the safety requirements of application software.
According to this method, said step graphical passwords archives 2. are to be stored in the mobile phone.
According to this method, said step similarity number percent 4. is to calculate gained by mobile phone.
According to this method, said step security log 5. is by the mobile phone record and is stored in the mobile phone EMS memory.
Based on this method, it is characterized in that: comprise fixedly described point and two kinds of patterns of not limited drafting, different software can adopt the Validation Mode that is more suitable for software itself.
Beneficial effect: adopt the present technique scheme; Utilize the individual to draw the uniqueness of planar graph arbitrarily, both guaranteed the security of application software, make things convenient for the user to remember again; Simultaneously can be directed against different mobile phones application software different security requirement of shelter again, set the different security threshold values personalizedly.
Description of drawings
Fig. 1 uses the process flow diagram of mobile phone screen contact checking as the mode of mobile application security password for the present invention is a kind of;
Embodiment
For technological means, creation characteristic that the present invention is realized, reach purpose and effect and be easy to understand and understand, further set forth the present invention below in conjunction with concrete diagram.
Fig. 1 discloses a kind of process flow diagram of using the checking of mobile phone screen contact as the mode of mobile application security password of the present invention, and its step is following:
System uses a mobile phone, and said mobile phone comprises the touch-screen input function; Use first; The user is when opening application software, and mobile phone screen can be pointed out the user to set a plane geometric figure and set its safe threshold values, as: " after please setting a plane geometric figure and accomplishing and set its safe threshold values ".After the user drew and sets and accomplishes, mobile phone can write down this plane geometric figure threshold values corresponding with it, and set up the graphical passwords archives that are associated with this application software; When the user opened said application software once more, mobile phone can point out the user in the mobile phone screen input range, to import the geometric figure that user originally sets; As: " please draw the plane geometric figure of setting ".Mobile phone can with this figure painted of the geometric figure of painting when setting carry out the similarity contrast, and calculate this drawing shape and the similarity number percent of setting institute's drawing shape; If said similarity number percent surpasses the safe threshold values of said setting, then allow the user to continue to use this application software, otherwise refuse its use and charge to security log.As preferred version, can load fixedly described point and two kinds of patterns of not limited drafting simultaneously, different software can adopt the Validation Mode that more adapts to software itself, to reach the purpose of safe handling, convenient use.
More than show and described ultimate principle of the present invention and principal character and advantage of the present invention.The technician of the industry should understand; The present invention is not restricted to the described embodiments; That describes in the foregoing description and the instructions just explains the part effective means of the present invention in Chinese application, and under the prerequisite that does not break away from spirit and scope of the invention, the present invention can adopt other induction mode; Carry out the moving checking content of each side's displacement like handheld mobile phone, these checking contents all fall in the scope of the invention that requires protection.The present invention requires protection domain to be defined by appending claims and equivalent thereof.
Claims (7)
1. mode of using mobile phone screen contact checking as the mobile application security password is characterized in that may further comprise the steps:
1.. be to use a mobile phone, said mobile phone comprises the touch-screen input function;
2.. use first; The user is when opening application software; Mobile phone screen can be pointed out the user to set a plane geometric figure and set its safe threshold values; After the user drew and sets and accomplishes, mobile phone can write down this plane geometric figure threshold values corresponding with it, and set up the graphical passwords archives that are associated with this application software;
3.. when the user opened said application software once more, mobile phone can point out the user in the mobile phone screen input range, to import the geometric figure that user originally sets;
4.. mobile phone can carry out the similarity contrast with the figure painted of painting geometric figure when setting, and calculates this drawing shape and the similarity number percent of setting institute's drawing shape;
5.. if said similarity number percent surpasses the safe threshold values of said setting, then allow the user to continue to use this application software, otherwise refuse its use and charge to security log.
2. a kind of mode of using the checking of mobile phone screen contact as the mobile application security password according to claim 1 is characterized in that: said step 2. plane geometric figure is that the user can draw arbitrarily in the mobile phone screen input range.
3. a kind of mode of using the checking of mobile phone screen contact as the mobile application security password according to claim 1, it is characterized in that: said step safe threshold values 2. is to be set by user oneself according to the safety requirements of application software.
4. a kind of mode of using the checking of mobile phone screen contact as the mobile application security password according to claim 1, it is characterized in that: said step graphical passwords archives 2. are to be stored in the mobile phone.
5. a kind of mode of using the checking of mobile phone screen contact as the mobile application security password according to claim 1, it is characterized in that: said step similarity number percent 4. is to calculate gained by mobile phone.
6. a kind of mode of using the checking of mobile phone screen contact as the mobile application security password according to claim 1, it is characterized in that: said step security log 5. is by the mobile phone record and is stored in the mobile phone EMS memory.
7. a kind of mode of using the checking of mobile phone screen contact as the mobile application security password according to claim 1, it is characterized in that: comprise fixedly described point and two kinds of patterns of not limited drafting, different software can adopt the Validation Mode that is more suitable for software itself.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110142256.2A CN102810140A (en) | 2011-05-30 | 2011-05-30 | Mode for verifying mobile phone screen contact to be mobile application security password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110142256.2A CN102810140A (en) | 2011-05-30 | 2011-05-30 | Mode for verifying mobile phone screen contact to be mobile application security password |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102810140A true CN102810140A (en) | 2012-12-05 |
Family
ID=47233844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110142256.2A Pending CN102810140A (en) | 2011-05-30 | 2011-05-30 | Mode for verifying mobile phone screen contact to be mobile application security password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102810140A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488918A (en) * | 2013-09-18 | 2014-01-01 | 广东欧珀移动通信有限公司 | Application encrypting method and device for intelligent terminal |
CN104283668A (en) * | 2014-07-24 | 2015-01-14 | 山东大学(威海) | Method and device for obtaining application password based on mobile terminal |
WO2015010570A1 (en) * | 2013-07-22 | 2015-01-29 | Tencent Technology (Shenzhen) Company Limited | A method, device, and terminal for hiding or un-hiding content |
CN104618100A (en) * | 2013-12-23 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Identity authentication method, method for paying based on terminal, terminal and server |
CN107239719A (en) * | 2017-06-05 | 2017-10-10 | 中国农业银行股份有限公司 | Characteristic generating means, card reader, data handling system and method |
-
2011
- 2011-05-30 CN CN201110142256.2A patent/CN102810140A/en active Pending
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015010570A1 (en) * | 2013-07-22 | 2015-01-29 | Tencent Technology (Shenzhen) Company Limited | A method, device, and terminal for hiding or un-hiding content |
CN103488918A (en) * | 2013-09-18 | 2014-01-01 | 广东欧珀移动通信有限公司 | Application encrypting method and device for intelligent terminal |
CN103488918B (en) * | 2013-09-18 | 2016-09-14 | 广东欧珀移动通信有限公司 | Intelligent terminal applies encryption method and device |
CN104618100A (en) * | 2013-12-23 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Identity authentication method, method for paying based on terminal, terminal and server |
CN104618100B (en) * | 2013-12-23 | 2019-03-01 | 腾讯科技(深圳)有限公司 | Authentication, method, terminal and the server paid based on terminal |
CN104283668A (en) * | 2014-07-24 | 2015-01-14 | 山东大学(威海) | Method and device for obtaining application password based on mobile terminal |
CN104283668B (en) * | 2014-07-24 | 2017-11-10 | 山东大学(威海) | The method and device of applied cryptography is obtained based on mobile terminal |
CN107239719A (en) * | 2017-06-05 | 2017-10-10 | 中国农业银行股份有限公司 | Characteristic generating means, card reader, data handling system and method |
CN107239719B (en) * | 2017-06-05 | 2021-04-02 | 中国农业银行股份有限公司 | Characteristic data generating device, card reader, data processing system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104052873B (en) | Terminal, multi-screen unlocking device and method and unlocking method for different areas of screens | |
CN102073810B (en) | Method for integrating account management function in input method software | |
WO2021038298A3 (en) | Id verification with a mobile device | |
CN104049806B (en) | A kind of touch control terminal and its control method and system | |
CN105320864A (en) | Method and apparatus for processing event operation | |
CN102810140A (en) | Mode for verifying mobile phone screen contact to be mobile application security password | |
CN103503038A (en) | Method and system for verifying transactor identity on ATM | |
CN104063642A (en) | Intelligent terminal safety authentication method and device based on pressure sensor | |
CN103942477A (en) | Smart phone authentication method based on touch screen pressure sensing | |
CN102760262A (en) | System and method based on biometrics identification payment risks | |
CN109033771B (en) | System and method for PIN entry on a mobile device | |
CN104134028A (en) | Identity authentication method and system based on gesture characteristics | |
CN103971048A (en) | Method and system for entering password | |
CN102869008A (en) | Technology for applying vocal print verification as security codes of mobile applications | |
CN108154017A (en) | A kind of method of password authentication and password validation system based on intelligent terminal | |
CN103259796A (en) | Authentication system and method | |
CN106453243A (en) | Server, terminal and validation method of authorization code of terminal | |
CN101729649A (en) | Mobile terminal and method for authenticating identity of user using same | |
CN106534479B (en) | Mobile phone password protection system based on hidden code identification and hidden transformation | |
CN205912265U (en) | WIFI device based on biological identification verifies | |
CN107194219A (en) | Intelligent terminal identity identifying method based on similarity | |
CN102413146A (en) | Client authorized logon method based on dynamic codes | |
CN103200298A (en) | System and method for controlling mobile terminal to conduct voice communication | |
CN105956858A (en) | Payment method and electronic device | |
CN106131044B (en) | A kind of identity identifying method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20121205 |