CN103116718A - Password setting and verification method based on spatial position code log-in computer system - Google Patents

Password setting and verification method based on spatial position code log-in computer system Download PDF

Info

Publication number
CN103116718A
CN103116718A CN2013100703854A CN201310070385A CN103116718A CN 103116718 A CN103116718 A CN 103116718A CN 2013100703854 A CN2013100703854 A CN 2013100703854A CN 201310070385 A CN201310070385 A CN 201310070385A CN 103116718 A CN103116718 A CN 103116718A
Authority
CN
China
Prior art keywords
password
button
click
input
buttons
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100703854A
Other languages
Chinese (zh)
Inventor
石新宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Defero Technology Co Ltd
Original Assignee
Wuxi Defero Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Defero Technology Co Ltd filed Critical Wuxi Defero Technology Co Ltd
Priority to CN2013100703854A priority Critical patent/CN103116718A/en
Publication of CN103116718A publication Critical patent/CN103116718A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a password setting and verification method based on a spatial position code log-in computer system. Password buttons which need to be input are provided with the number, the area and the space distribution positions of the password buttons according to an arrangement mode of the space positions in a button positioning layer, and the buttons which are input are converted into initial password character strings. Simultaneously, the clicking time limit of the password buttons is set, and a pattern display layer covers a password button display layer. When password verification is conducted, input space password character strings and the time of clicking two adjacent passwords serve as standards of verification password input. Due to the fact that the input passwords have certain concealment, information resources are effectively protected from being changed or stolen, and the confidentiality of the system is greatly improved.

Description

Log in password setting and the verification method of computer system based on the locus code
Technical field
The present invention relates to a kind of protecting software cipher method based on the automatic payment machine, relate in particular to a kind of locus code that utilizes based on touch-screen and log in password setting and the verification method of computer system.
Background technology
At present, common cryptoguard input mode has following two kinds: a kind of is to utilize the keyboard input, and the use keyboard is by Password Input in the text box of appointment, and consistent with the password of former setting if the user inputs password in text box, Password Input is successful.The 2nd, use the dummy keyboard technology, the dummy keyboard formed on touch-screen is carried out to the key entry of password, can have soft keyboard on the text box side of input password, the above indicates numeral or numeral and the alphabetical one group of button mixed, click the button on dummy keyboard, corresponding password will be presented in text box, if the password of the password of input and setting is consistent, and Password Input success.But two kinds of top methods, no matter utilize dummy keyboard or actual keyboard all to exist the character confidentiality on keyboard not strong, easily decoded by the people, and effectively the protection information resource is not modified or steals; So there is defect in prior art, need to improve.
Summary of the invention
The objective of the invention is, the defect existed for above-mentioned prior art provides a kind of and has reduced code breaking, made disguised password setting and the verification method improved of Password Input.
Technical scheme of the present invention is as follows: a kind of cipher set-up method that logs in computing machine based on the locus code, the method comprises the steps:
A, renewal system display buffer content, arrange at least one pattern displaying layer and a button alignment layers;
B, Password Input unit arrange several Password Input locating areas on described button alignment layers, distribute successively at least one password button on each locating area after, determine the click order of each password button, and described password button is arranged to the click time restriction;
C, by converting unit, several password buttons are converted into to several code characters, arrange between each code characters by the location, locus, several code characters form initial password character strings;
D, storage unit are preserved described initial password character string and button click time;
E, by display unit, be user's display reminding information, the password setting completes.
Described cipher set-up method, wherein, between several different code characters, arranged distribution is set in distance.
Described cipher set-up method, wherein, described spaced be that to take the upper left corner of described button alignment layers be reference coordinate, according to described reference coordinate, the coordinate position of each different code characters is dragged on described button alignment layers corresponding X-axis and Y-axis coordinate to the auxiliary image that shows of stack on described button alignment layers.
Described cipher set-up method, wherein, arrange the click mistiming of adjacent two password buttons, in 2 seconds-30 seconds scopes of described difference .
A kind of method of password authentication, the cipher set-up method that employing logs in computing machine based on the locus code carries out password authentification, and the method comprises the steps:
A, enter system master interface, by the information of input block click location, recording user is clicked password button position, order and click time;
B, the position of the user being clicked by converting unit and order are converted to password string;
After C, authentication unit verified the password string that obtains and button click time and initial password character string and the click time of in storage unit, preserving compare, if consistent, the password authentification success, show the result by display unit, otherwise authentication failed.
Described method of password authentication, wherein, the auxiliary image that shows of stack on described password button.
The present invention adopts technique scheme; make unauthorized user be difficult to know and decryption; the present invention is by changing the mode of now intrinsic Password Input; the password button of input is pressed to locus code spread pattern; the protection information resource is not modified or steals effectively, and the confidentiality of system is improved greatly.
The accompanying drawing explanation
Fig. 1 is password setting procedure figure of the present invention;
Fig. 2 is the installation drawing that password of the present invention arranges;
Fig. 3 is password authentification process flow diagram of the present invention;
The installation drawing that Fig. 4 is password authentification of the present invention;
The display layer schematic diagram that Fig. 5 is embodiment of the present invention password button;
Fig. 6 is embodiment of the present invention pattern displaying layer schematic diagram.
Embodiment
The invention provides a kind of password setting and verification method that logs in computer system based on the locus code, clearer, clear and definite for making purpose of the present invention, technical scheme and advantage, referring to accompanying drawing, developing simultaneously, the present invention is described in more detail for embodiment.
In order to solve the poor problem of existing cryptographic security in prior art, the present invention is directed to prior art improves in the mode of using touch-screen to be inputted password to dummy keyboard, its innovative point is: by upgrading the display buffer content of system, at least two display layers are set, one is pattern displaying layer, one is the button alignment layers, the button alignment layers display layer of password button namely wherein, by the password button that will need input at password button display layer, the quantity of password button is set according to the arrangement mode of locus, the position of area and space distribution, and the button of input is changed into to the initial password character string, within the specific limits by the click time restriction between the password button simultaneously, finally pattern displaying layer is covered on password button display layer, make it from visually can't see the password button, after the password setting completes, when user's load button, touch-screen detects user touch location, after receiving clicked position signalling, the position signalling of click is delivered to touch screen controller, and the converting unit by system converts code characters to and compares with the initial password character string of preserving in storage unit, if correct position, password authentification is passed through, and enters system.
Shown in 1 and 2, password setting device of the present invention comprises by reference to the accompanying drawings: input block, converting unit, storage unit and display unit, wherein: order and the click time restriction of input block for input password button is set; Converting unit is for transforming code characters by the password button, and a plurality of code characters form password string; Storage unit is clicked time restriction for preserving the password position, password string and the button that set; Display unit is used to the user to show set information.When initial password is set, the user is after input block completes and password quantity, area, position and order is set and clicks time restriction, the button of the user being inputted by input block by conversion unit changes into code characters, the character string that will obtain by converting unit and input block (password button sequence) and click time restriction are kept in storage unit, finally in display unit display reminding user profile.
The password process step comprises:
Step 110, renewal system display buffer content, arrange at least one pattern displaying layer and a button alignment layers;
Step 120, Password Input unit set in advance several Password Input locating areas on described button alignment layers, distribute successively at least one password button on each locating area after, determine the click order of each password button, and described password button is arranged to the click time restriction;
Step 130, by converting unit, several password buttons are converted into to several code characters, arrange between each code characters by the location, locus, several code characters form initial password character strings;
Step 140, storage unit are preserved described initial password character string and button click time;
Step 150, by display unit, be user's display reminding information, the password setting completes
According to top password setting procedure step ground, describe, it specifically comprises content is set as follows: at first Show Picture (pattern displaying layer) will with touch screen interface useful size in the same size, otherwise its Show Picture may torsional deformation; Observe picture, determine that each password button is placed on optimum position, area and the quantity in picture, (concrete how optimum position, area and the quantity of setting code button in picture is that those skilled in the art know technology, so be not described in detail herein); Then take the picture upper left corner places first password button as coordinate at zero point (being reference coordinate), according to described reference coordinate, the coordinate position of each password button is dragged on the corresponding X-axis of button alignment layers and Y-axis coordinate, each password button is by the location, locus, that is to say that each password button arranged distribution is set in distance, the password button position of setting is changed into to password string using this password string as initial password and preserve with the password click time of setting, finally, pattern displaying layer is covered on the button alignment layers;
Wherein, the setting of password button quantity is needed by the client and privacy degrees determines, the minimum setting 2individual, but to consider the privacy degrees of its password, not restriction at most, but also will be with respect to user's memory capability, so best quantity is 5.
Wherein, the size of password button according to actual needs with to determine in conjunction with picture, by clicking operating key, with mouse, in the position of needs, go out to draw out determine that area gets final product (area of each password button can: in 1-4 square centimeter scope);
The basic skills that its password press button area is definite: consider that the normal person uses the rate of hitting while clicking, press button area can not be too small, the too small meeting of button is difficult for point and hits, increase the difficulty of operation, press button area can not be excessive, cross conference and be easier to a little hit, avoid unconscious point to hit cryptographic zone; Then the area position of password button can with pattern displaying layer on picture in " content " combine, reach the purpose that strengthens memory, " content " in picture comprising: point, line, face, or the mixing of point-line-surface, word, pattern etc., " content " combination of button and picture: the password button can be contained in outside " content "; Also can place with " content " among; Perhaps other think the combination that can reach memory, the concrete position that how to utilize " content " in the picture on pattern displaying layer to remove to cover the password button is that industry is known technology and omitted herein, thisly utilizes the special graph above the pattern displaying layer picture to help to go memory to be hidden in following password button position.
The invention still further relates to and take the button click order as cipher code protection method, the spatial order of its Password Input is uncertain, can be according to user's request and actual needs setting, as can input clockwise password, counterclockwise input password or intersect input password etc. other sequentially arrange; The click in space is sequentially the password string order, for example, in button 1 place's assignment ' 1 ', button 2 place's assignment ' 2 ', button 3 place's assignment ' 3 ', form password string ' 123 ' password string ' 123 ' order be the spatial order of Password Input, this on button assignment can be numeral, letter and other sign, so password string can be the combination of numeral, letter and other sign, can be only also word or letter etc.
The invention still further relates to and take the cipher code protection method that the time is restrictive condition, its restriction to the time is mainly by the system library function CTime::getcurrenttime () that utilizes Microsoft to provide, click a button and obtain a current time in system point T1, click again another button and obtain another time point T2, time point T1 to the mistiming between time point T2 be T, reach the purpose of cryptoguard by the restriction of the span to mistiming T, T can be set in outside certain time point, also can be set in outside certain time point, or within certain time period (optimum range of the present invention is to using 2-30 second two mistimings between adjacent buttons as criterion).For example: can suppose that the time period T clicked between adjacent two buttons must after 3 seconds effectively will compare with 3 seconds when the user clicks the resulting time period T of these two buttons so, if be greater than 3 seconds, this operation is effective, enters next operation; Be less than 3 seconds invalid, will return and re-enter; The time qualified judgement of this password was all judged every two adjacent buttons click times, only the wherein click mistiming between a pair of adjacent buttons in a plurality of password buttons is judged, such as: if password string is 123, carry out so when judgement click time, button click 2 and button 1 are carried out to the time judgement, then continue button click 3, the click time between combination and button 2 is judged again, and the mistiming between whether every adjacent two buttons of checking meets the required value of setting; Again for example: if password string is ABCDE, carry out so the judgement of click time, wherein two the adjacent buttons that can only set in above-mentioned character string are clicked the mistiming, click as the button by between adjacent two button D and E the Rule of judgment that the mistiming is set as the time of clicking, specifically how to set and need to carry out according to user's demand and privacy degrees.
Shown in 3 and 4, password authentication device of the present invention comprises by reference to the accompanying drawings: input block, converting unit, storage unit, authentication unit and display unit; Wherein: input block is for click password button position, order and the click time of recording user; Converting unit is for being converted to password string by user's click location and order; Storage unit is for reading initial password and the time restriction parameter of setting from storage unit; Authentication unit is for band of position order and the correctness of the time of click of authentication of users button click; Display unit is for being shown to the user by system information and program information.
Password authentification flow process of the present invention comprises: step 210, user pass through the click location information of input block, the position of the click password button of recording user and order; Step 220, by converting unit, convert corresponding password string to; Step 230, then from storage unit, obtain the correct information of screen coordinate and button sequence; Step 240, by authentication unit, the password string that obtains and button click time are verified after and initial password character string and the click time of in storage unit, preserving compare; If step 250 is consistent, the password authentification success, show the result by display unit, step 216 otherwise authentication failed.If above the checking mistake once, will warning prompt once, errors number will be carried out screen locking after surpassing 3 times.
Because the present invention has changed traditional password input mode, the user need to click its specific position according to specific order and could correctly log in, so the user of non-device systems mandate can't determine its password input mode and input area according to ordinary thinking.Therefore, the present invention has very strong protectiveness.The present invention especially is applicable to touch screen terminal including, but not limited to having the mobile phone of touch screen data disposal system, PDA, the terminals such as notebook computer.
Below in conjunction with an embodiment, further illustrate, by reference to the accompanying drawings 5 and Fig. 6 shown in: enter the system initial interface, put successively A with the order of accompanying drawing 5 respectively, B, C, D, E, the area of space position of these six buttons of F, spaced between these six buttons, go to be superimposed upon 6 above button with the butterfly figure of different sizes above the pattern displaying layer picture, help goes memory to be hidden in following password button position, and the time interval between button click E and button F is between 4 seconds-20 seconds, if it is consistent with the password of former setting to click ordinal position and the time interval, Password Input success, system will jump to automatically uses interface, otherwise, prompt cipher input error, if continuous three input errors, system interface locks, all operations is invalid.
The concrete setting is described below:
System interface resolution: the 1024*768 pixel, system interface size: 17*12.8(unit: centimetre)
The pattern displaying layer dimension of picture: the 1024*768 pixel, dimension of picture: 17*12.8(unit: centimetre)
Two display layers are set, the one, the button alignment layers, one is pattern displaying layer, and the size Showed Picture will with the in the same size of bottom (button alignment layers) and display;
Observe picture and actual needs by combination, can in Fig. 5, set 6 password buttons, difference called after button A, button B, button C, button D, button E, button F, its button A wants respectively outside the pattern of butterfly in coverage diagram 6 to button E size, can click button when guaranteeing to click corresponding butterfly regional, and button F is placed on the blank space in the upper left corner, and two coincident of two edges and picture, due to without distinguishing mark, be easy to hit, more bigger, the in the same size of the size of button F and button A, be set to counterclockwise order.
The coordinate at zero point in the picture upper left corner of take is reference coordinate (coordinate of button F 1 is reference coordinate), obtains respectively the coordinate on four summits that button is corresponding, and its coordinate is respectively (unit is pixel):
Button A:A1 (424,571) A2 (592,571) A3 (592,739) A4 (424,739)
Button B:B1 (620,623) B2 (736,623) B3 (736,739) B4 (620,739)
Button C:C1 (733,571) C2 (901,571) C3 (901,739) C4 (733,739)
Button D:(D1928,623) D2 (1044,623) D3 (1044,739) D4 (928,739)
Button E:E1 (876,39) E2 (992,39) E3 (992,155) E4 (876,155)
Button F: F1(0,0) F2 (168,0) F3 (168,168) F4 (0,168)
The area of button A is: 2.6*2.6(unit: centimetre)
The area of button B is: 1.5*1.5(unit: centimetre)
The area of button C is: 2.6*2.6(unit: centimetre)
The area of button D is: 1.5*1.5(unit: centimetre)
The area of button E is: 1.5*1.5(unit: centimetre)
The area of button F is: 2.6*2.6(unit: centimetre)
Then button control is dragged on corresponding coordinate, by the button click control, draws out successively respectively needed size in the needs position with mouse, respectively six buttons are placed on to the bottom with the picture correspondence position; Graph layer is covered on bottom, from visually can't see the password button, but retained the function of button.
Simultaneously in arithmetic element, use system library function CTime::getcurrenttime (), set to click after password button E will be after 4 seconds button click 6 in 20 seconds, if when the time period between user's button click E and button F is within 4 seconds-20 seconds, operation effectively, otherwise invalid, system is by the initial interface of auto-returned display unit.
By converting unit in button A place assignment ' A ', button B place assignment ' B ', button C place assignment ' C ', button D place assignment ' D ', button E place assignment ' E ', button F place assignment ' F ', form character string ' ABCDEF ', it is kept to storage unit, so just be provided with one group of password button counterclockwise rotated as the initial password button, during login, the user clicks six password button position of pattern displaying layer successively, verify that by authentication unit the sequence of positions clicked and time are whether with the password string of initial setting with click time qualified coupling, if coupling, Password Input success, system will jump to the use interface of display unit automatically.Otherwise, display unit prompt cipher input error, if continuous three input errors, display unit locks, all operations is invalid.
It should be noted that, above embodiment is only unrestricted in order to technical scheme of the present invention to be described, although with reference to preferred embodiment, the present invention is had been described in detail, those of ordinary skill in the art is to be understood that, can modify or be equal to replacement technical scheme of the present invention, and not breaking away from the spirit and scope of technical solution of the present invention, it all should be encompassed in the middle of claim scope of the present invention.

Claims (6)

1. a cipher set-up method that logs in computing machine based on the locus code, is characterized in that, the method comprises the steps:
A, renewal system display buffer content, arrange at least one pattern displaying layer and a button alignment layers;
B, Password Input unit set in advance several Password Input locating areas on described button alignment layers, distribute successively at least one password button on each locating area after, determine the click order of each password button, and described password button is arranged to the click time restriction;
C, by converting unit, several password buttons are converted into to several code characters, arrange between each code characters by the location, locus, several code characters form initial password character strings;
D, storage unit are preserved described initial password character string and button click time;
E, by display unit, be user's display reminding information, the password setting completes.
2. cipher set-up method according to claim 1, is characterized in that, between several code characters, arranged distribution is set in distance.
3. cipher set-up method according to claim 2, it is characterized in that, described spaced be that to take the upper left corner of described button alignment layers be reference coordinate, according to described reference coordinate, the coordinate position of each different code characters is dragged on described button alignment layers corresponding X-axis and Y-axis coordinate to the auxiliary image that shows of stack on described button alignment layers.
4. cipher set-up method according to claim 1, is characterized in that, the click mistiming of adjacent two password buttons is set, and described difference is in 2-30 scope second.
5. a method of password authentication, adopt claim 1 and the cipher set-up method that logs in computing machine based on the locus code claimed in claim 2 to carry out password authentification, it is characterized in that, the method comprises the steps:
A, enter system master interface, by the information of input block click location, recording user is clicked password button position, order and click time;
B, the position of the user being clicked by converting unit and order are converted to password string;
After C, authentication unit verified the password string that obtains and button click time and initial password character string and the click time of in storage unit, preserving compare, if consistent, the password authentification success, show the result by display unit, otherwise authentication failed.
6. method of password authentication according to claim 5, is characterized in that, the auxiliary image that shows of stack on described password button.
CN2013100703854A 2013-03-06 2013-03-06 Password setting and verification method based on spatial position code log-in computer system Pending CN103116718A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100703854A CN103116718A (en) 2013-03-06 2013-03-06 Password setting and verification method based on spatial position code log-in computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100703854A CN103116718A (en) 2013-03-06 2013-03-06 Password setting and verification method based on spatial position code log-in computer system

Publications (1)

Publication Number Publication Date
CN103116718A true CN103116718A (en) 2013-05-22

Family

ID=48415091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100703854A Pending CN103116718A (en) 2013-03-06 2013-03-06 Password setting and verification method based on spatial position code log-in computer system

Country Status (1)

Country Link
CN (1) CN103116718A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544428A (en) * 2013-10-16 2014-01-29 东南大学 Intelligent terminal user authentication method based on multi-touch position sequence
CN104639563A (en) * 2015-03-02 2015-05-20 利诚服装集团股份有限公司 Method and device for safely processing data
CN105391556A (en) * 2015-11-27 2016-03-09 厦门雅迅网络股份有限公司 Method and apparatus for generating dynamic password, authentication method and system
CN108256301A (en) * 2018-01-05 2018-07-06 京东方科技集团股份有限公司 A kind of unlocking method and tripper
CN111639322A (en) * 2020-06-17 2020-09-08 中国银行股份有限公司 Application login method and device, electronic equipment and computer storage medium
CN112000947A (en) * 2020-08-13 2020-11-27 中国石油天然气集团有限公司 Password input method and system based on topographic map

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559961A (en) * 1994-04-04 1996-09-24 Lucent Technologies Inc. Graphical password
CN101344825A (en) * 2008-07-31 2009-01-14 华为技术有限公司 Method and terminal for inceptive cipher setting and cipher validation based on touch screen
CN101645121A (en) * 2008-08-06 2010-02-10 深圳富泰宏精密工业有限公司 System and method for setting password protection by utilizing picture
CN102142071A (en) * 2011-04-26 2011-08-03 汉王科技股份有限公司 Method and device for verifying mobile terminal
CN102663311A (en) * 2012-03-31 2012-09-12 惠州Tcl移动通信有限公司 Method for releasing screen locking and device thereof
CN102799833A (en) * 2012-07-02 2012-11-28 人民搜索网络股份公司 Digital encryption and decryption method based on keying rhythm or keying force conversion

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559961A (en) * 1994-04-04 1996-09-24 Lucent Technologies Inc. Graphical password
CN101344825A (en) * 2008-07-31 2009-01-14 华为技术有限公司 Method and terminal for inceptive cipher setting and cipher validation based on touch screen
CN101645121A (en) * 2008-08-06 2010-02-10 深圳富泰宏精密工业有限公司 System and method for setting password protection by utilizing picture
CN102142071A (en) * 2011-04-26 2011-08-03 汉王科技股份有限公司 Method and device for verifying mobile terminal
CN102663311A (en) * 2012-03-31 2012-09-12 惠州Tcl移动通信有限公司 Method for releasing screen locking and device thereof
CN102799833A (en) * 2012-07-02 2012-11-28 人民搜索网络股份公司 Digital encryption and decryption method based on keying rhythm or keying force conversion

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544428A (en) * 2013-10-16 2014-01-29 东南大学 Intelligent terminal user authentication method based on multi-touch position sequence
CN104639563A (en) * 2015-03-02 2015-05-20 利诚服装集团股份有限公司 Method and device for safely processing data
CN105391556A (en) * 2015-11-27 2016-03-09 厦门雅迅网络股份有限公司 Method and apparatus for generating dynamic password, authentication method and system
CN108256301A (en) * 2018-01-05 2018-07-06 京东方科技集团股份有限公司 A kind of unlocking method and tripper
CN111639322A (en) * 2020-06-17 2020-09-08 中国银行股份有限公司 Application login method and device, electronic equipment and computer storage medium
CN111639322B (en) * 2020-06-17 2023-09-29 中国银行股份有限公司 Application login method and device, electronic equipment and computer storage medium
CN112000947A (en) * 2020-08-13 2020-11-27 中国石油天然气集团有限公司 Password input method and system based on topographic map

Similar Documents

Publication Publication Date Title
AU2006307996B2 (en) Method and system for secure password/PIN input via mouse scroll wheel
US8353017B2 (en) User password protection
US9064104B2 (en) Graphical authentication
Chiang et al. Improving user authentication on mobile devices: A touchscreen graphical password
US9117068B1 (en) Password protection using pattern
CN103116718A (en) Password setting and verification method based on spatial position code log-in computer system
CN101075873B (en) Method and system for inputting content
CN105335641B (en) A kind of auth method and device based on fingerprint recognition
CN104049897B (en) Touch panel device unlock method and device
KR101201934B1 (en) Method and apparatus for authenticating password of user device using variable password
EP2936277B1 (en) Method and apparatus for information verification
KR102055625B1 (en) Authentication server device, program, and authentication method
CN103200011A (en) Password authentication method and device
CN104978512A (en) Password input and confirmation method and system thereof
CN103996011A (en) Method and device for protecting codes to be input safely
CN106484231A (en) A kind of method and device of application hides
CN102957688A (en) Password input and verification method and device
US9652619B2 (en) Method of inputting confidential data on a terminal
KR20090036820A (en) Hacking protection input system and method of the virtual keyboard
CN104834840A (en) Password protection method based on mapping drifting technology
CN103297391A (en) Graphical dynamic password inputting and verifying method
CN101655768A (en) Anti-peep password input method
CN101561714B (en) Group password input method
KR20130015566A (en) Apparatus for security certification using key pad being figure or graphics and method for the same
US20200382487A1 (en) Password protection in a computing environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130522