CN103455738A - Method and computer device for providing time ratio-based password/challenge authentication - Google Patents

Method and computer device for providing time ratio-based password/challenge authentication Download PDF

Info

Publication number
CN103455738A
CN103455738A CN2012101813005A CN201210181300A CN103455738A CN 103455738 A CN103455738 A CN 103455738A CN 2012101813005 A CN2012101813005 A CN 2012101813005A CN 201210181300 A CN201210181300 A CN 201210181300A CN 103455738 A CN103455738 A CN 103455738A
Authority
CN
China
Prior art keywords
password
input
user
pattern
access code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101813005A
Other languages
Chinese (zh)
Inventor
傅心伟
郑云玲
吴旻璁
杨秉中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to CN2012101813005A priority Critical patent/CN103455738A/en
Publication of CN103455738A publication Critical patent/CN103455738A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method for providing time ratio-based password/challenge authentication for login. The method includes receiving access codes or patterns inputted by a user; recording relevant time information of each member of the access codes or patterns; generating data combined with each member of the access codes or patterns and the relevant time information of the member; storing data records.

Description

Time scale formula password/cross-examine method and the computer installation of authentication are provided
Technical field
The present invention relates to about providing cipher to cross-examine the mechanism of authentication; Time scale formula password/cross-examine method and the computer installation of authentication especially are provided.
Background technology
Use massaging device miscellaneous in daily life, such as mobile phone, personal computer, mobile computer, flat computer etc., wherein all may store user's personal data and status data.Along with popularizing of network, increasing network application is carried out with on line operation (on-line).Particularly, server is in order to provide services on the Internet, for example social networking service, web mail service, Mobile business service, bank's online trading service, database access service or content information provides service etc., also store user's personal data and status data.Therefore for the considering of security and privacy, server or personal information apparatus generally all can require the user before using its service, need to observe authentication (authentication) program with identification user identity.At present, the most frequently used is that cipher is cross-examined (password-based challenge) authentication procedure.For example server generally can require the user before using its service, need first input user's account number and password (or title access code) and carry out identification (or be called log in), avoids user's personal data be stolen or alter.
Due to the quick increase of network covering scope and accessibility, simple password no longer can provide enough protections, and various different mechanisms are suggested to the protection that provides better.For example, require Password Length, complicacy and unpredictability, with the Cipher Strength that acquisition is resisted roughly and the lexicographic search is attacked.In addition, require to change termly password, Old Password was lost efficacy, thereby can reduce the possibility that password is cracked.These mechanism have increased security, therefore can help the user to protect its account number.
Yet as shown in Figure 1, client 100 by cross-examining 101 and the authentication procedure of account number/password 102 is provided, requires heterogeneous networks service to website A 110, website B 120, website C 130 etc. by network 140.In fact most users use different account number/passwords usually to different website A 110, website B120, website C 130 etc.These mechanism require the user must remember the password of the network service of a plurality of access different web sites.In addition, people often only login the minority website every day, the password of the website that therefore usually is not easy correctly to remember that those seldom visit.Generalized case, user's password that must hazard a guess, and probably because of too many wrong the trial, be lockable.
Therefore there is the demand that can help the user to remember to make us the password of puzzlement and can maintain again security.Existing disposal password (one-time password, OTP) technology provides solution.So OTP requires extra technology to provide password to the user.In many situations, OTP utilization electronic installation.This electronic installation may be lost, and has therefore increased the risk of losing password.In addition, different tissues may be difficult to share its OTP generation mechanism.If the user will access the network service that different web sites provides, will need different electronic installations.Therefore, the user carries a plurality of electronic installations by needs, and this more increases the risk of loss.
The mechanism of password prompt (hint) provides another solution.Yet this mechanism may reduce security, because the unauthorized person also can see this password prompt usually, thereby can help hacker's decryption.In addition, this mechanism is difficult to provide suitable password prompt to complicated password.Therefore, today secret (sensitive) system seldom utilize this mechanism.
The method that has at present many ciphers that better protection is provided to cross-examine, for example can, with reference to U.S. Pat 7653818, be incorporated to this paper at this by reference.This U.S. Pat 7653818 adds while disclosing Password Input, time of limit for cryptographic thump (keystrokes) for example, and time-out (pause) the time equal time factor that adds predetermined length between thump, avoid without the access of authorizing it as the part of password to increase security.
Summary of the invention
In this instructions mentioned characteristic, advantage or similar expression way do not imply the present invention attainable characteristic and advantage should in any single specific embodiment of the present invention, all realize.But should understand, the expression way of relevant characteristic and advantage refers to that described specific feature, advantage or characteristic are included at least one specific embodiment of the present invention in conjunction with specific embodiments.Therefore, in this instructions for characteristic and advantage, and the discussion of similar expression way can be relevant with identical specific embodiment, but also inessential.
In addition, can be in any suitable manner, in one or more specific embodiments in conjunction with characteristic of the present invention, advantage, and characteristic.It will be understood by those skilled in the art that and also can implement the present invention in the situation that there is no one or more specific feature or the advantage of certain specific embodiments.In other example, should understand, other characteristic in certain specific embodiments and advantage may not occur in all specific embodiments of the present invention.
The invention provides a kind of new cipher mechanism of cross-examining with identification user identity.This mechanism cross-examinees the input sequence of machine-processed password thump except considering the existing password formula, and each thump is inputted time out between required time, each thump input and the input of whole thump formed so-called rhythm (rhythm), beat (tempo) or bat (beat) etc. all as the part of password.The present invention is except considering time factor, the speed of also considering rhythm is inputted password (or claiming access code) (or pattern (pattern) of Touch Screen input), to carry out the so-called time scale formula of the present invention (Time Ratio-Based) password/the cross-examine method of authentication.That is, the Password Input of the rhythm of friction speed (speed difference), will be regarded as same password.
In addition, the present invention also supports multikey or multipoint mode to input the part as password, thereby similar function of playing on musical instrument is provided.Therefore, the present invention is applicable to input media miscellaneous for example keyboard, Touch Screen, mouse etc.The user can press simultaneously " A " reach " B " key, or press the left button of mouse and right button etc. part as password simultaneously.
Due to the present invention in conjunction with the speed of rhythm, beat or bat and rhythm the part as password, therefore can set up than hommization and be easy to the password of memory.In addition, the present invention also can be in conjunction with the help (aide) of sound or vision to assist the memory of password.For example, when Password Input, coordinate this input to provide corresponding to musical instrument sounds such as the piano of the rhythm of user's input or flutes.For Touch Screen, separately but combined with virtual keyboard or emulation fingerboard are conveniently inputted password for the user.These mechanism increase the complexity of password, so enhanced safety, and the characteristic that is easy to memory still can be provided.
According to the embodiment of the present invention, a kind of time scale formula password/cross-examine the method for the login of authentication of providing is provided, the method comprises:
Receive access code or the pattern of user's input;
Record this access code or each member's of pattern information correlation time;
Generation in conjunction with each member of this access code or pattern and correlation time information data recording; And
Store this data.
According to another embodiment of the present invention, a kind of time scale formula password/cross-examine the method for logining of authentication of providing is provided, the method comprises:
Finish the member by first of the access code stored or pattern and user's input reference code (or pattern) and calculate the beat ratio;
Utilize this beat ratio to change each member of access code or the pattern of this storage;
But utilize predetermined acceptance threshold to calculate acceptable beat scope; And
Be confirmed whether that the access code of this user's input or each member of pattern and the corresponding member of this storage are complementary in this acceptable beat scope.
According to another embodiment of the present invention, a kind of time scale formula password/cross-examine the computer installation of the login of authentication of providing is provided, comprise:
Main frame; This main frame comprises,
Bus system;
Storer, be connected to this bus system, and wherein this storer comprises the group instruction;
Be connected to the processing unit of this bus system, wherein this processing unit is carried out this group instruction, to carry out method as aforesaid as the present invention.
According to another embodiment of the present invention, a kind of time scale formula password/cross-examine the computer installation of logining of authentication of providing is provided, comprise:
Main frame; This main frame comprises,
Bus system;
Storer, be connected to this bus system, and wherein this storer comprises the group instruction;
Be connected to the processing unit of this bus system, wherein this processing unit is carried out this group instruction, to carry out aforesaid method.
With reference to following explanation and appended claims or the embodiments of the present invention of utilization as hereinafter carried, can more understand these characteristics of the present invention and advantage.
The accompanying drawing explanation
In order to understand immediately advantage of the present invention, please refer to certain specific embodiments as shown in drawings, describe above the present invention of brief narration in detail.Only describe typical specific embodiment of the present invention and therefore be not regarded as restriction category of the present invention in the situation that understand these icons, with reference to accompanying drawing, with extra definition and details, the present invention being described, graphic in:
Fig. 1 is a kind of existing password/cross-examine system schematic of authentication;
The hardware environment calcspar that Fig. 2 is exemplary computer installation 202 of the present invention;
Fig. 3 is a kind of password according to the specific embodiment of the invention/cross-examine method flow diagram of the login (registration) of authentication;
Each member's of Fig. 4 display password or pattern position and the coordinate of time close figure;
Fig. 5 is a kind of password according to the specific embodiment of the invention/cross-examine method flow diagram of logining of authentication.
Embodiment
In this instructions, quoting of " specific embodiment " or similar expression way refers in conjunction with the described specific feature of this specific embodiment, structure or characteristic and is included at least specific embodiment of the present invention.Therefore, in this manual, the appearance of the term of " in specific embodiment " and similar expression way may not refer to identical specific embodiment.
Those skilled in the art be when knowing, the present invention can be embodied as computer installation, method or as the computer-readable medium of computer program.Therefore, the present invention may be embodied as various forms, such as the example of hardware implementation completely, implement software example (comprising firmware, resident software, microprogram code etc.) completely, perhaps also can be embodied as the form of implementation of software and hardware, in following meeting, be called as " circuit ", " module " or " system ".In addition, the present invention also can any tangible form of medium be embodied as computer program, but it has the storage of computing machine service routine code thereon.
One or more computing machine can use or the combination of readable media can utilize.For instance, computing machine can use or readable media can be (but being not limited to) electronics, magnetic, optics, electromagnetism, ultrared or semi-conductive system, device, equipment or propagation medium.More specifically computer-readable medium embodiment can comprise following shown in (infinite illustration): the electrical connection formed by one or more connecting lines, portable computer disk, hard disk, random access storage device (RAM), ROM (read-only memory) (ROM), the programmable read-only memory (EPROM or flash memory) of can erasing, optical fiber, portable disc sheet (CD-ROM), optical disc drive, transmission medium (for example the basis of world-wide web (Internet) or internal network (intranet) connects), or magnetic storage device.Should be noted, computing machine can use or readable media more can be printed on it program line to make this program can be once again by the suitable medium of electronization for paper or any can be used for, for example nationality is by this paper of optical scanning or other medium, and then compiling, decipher or other suitable necessary processing mode, then can be stored in computer memory once again.In this article, computing machine can use or readable media can be any medium for maintenance, storage, transmission, propagation or transmission procedure code, for coupled instruction execution system, device or equipment, processes.But but the computing machine working medium can comprise the propagation data signal that wherein stores computing machine service routine code, no matter be with fundamental frequency (baseband) or the kenel of partial carrier wave.But the transmission of computing machine service routine code can be used any fit medium, comprise that (but being not limited to) is wireless, wired, Connectorized fiber optic cabling, radio frequency (RF) etc.
Can write with the combination of one or more program languages for the computer program code of carrying out the present invention's operation, comprise OO program language (for example Java, Smalltalk, C++ or other fellow) and traditional program program language (for example c programming language or other similar program language).Program code can the stand alone software external member form complete on user's computing machine, carry out or part is carried out on user's computing machine, or part in user's computing machine and part in remote computer.
Below relevant narration meeting of the present invention with reference to process flow diagram and/or the calcspar of computer installation, method and computer program according to the specific embodiment of the invention, describe.Each square in can understanding each process flow diagram and/or calcspar, and any combination of square in process flow diagram and/or calcspar, can implement with computer program instructions.These computer program instructions can be carried out for general purpose computer or the processor of special computers or the machine that other programmable data processing equipment forms, and instruction is processed via computing machine or other programmable data processing equipment so that illustrated function or operation in implementing procedure figure and/or calcspar.
These computer program instructions also can be stored on computer-readable medium, so that instruct computer or other programmable data processing equipment carry out specific function, and these are stored in instructions on computer-readable medium and form manufactured goods, but illustrated function or operation in the instruction implementing procedure figure comprised in it and/or calcspar.
Computer program instructions also can be loaded on computing machine or other programmable data processing equipment, so that carry out the system operation steps on computing machine or other programmable device, and produce computer-implemented program to reach function illustrated in process flow diagram and/or calcspar or operation while on this computing machine or other programmable device, carrying out this instruction.
Secondly, please refer to Fig. 2 to Fig. 5, process flow diagram and calcspar in graphic middle demonstration according to the enforceable framework of computer installation, method and computer program, function and the operation of various embodiments of the invention.Therefore, but the program code of each the square representation module in process flow diagram or calcspar, section or part, and it comprises one or more executable instructions, to implement the logic function of appointment.Another as attention person, in some other embodiment, the described function of square can be disobeyed the order shown in figure and be carried out.For instance, the square that two icons are connected in fact also can be carried out simultaneously, or complies with the order that involved function in some cases also can be contrary according to icon and carry out.Should be noted in addition, the square of each calcspar and/or process flow diagram, and the combination of square in calcspar and/or process flow diagram, but nationality is implemented by the system based on specific purposes hardware, perhaps nationality, by the combination of specific purposes hardware and computer instruction, is carried out specific function or operation.
<computer installation >
Fig. 2 illustrates the hardware environment calcspar of exemplary computer installation 202 of the present invention.In an exemplary embodiment, computer installation is universal desktop PC, can have processor to carry out various application programs; Storage device is to store various information and program code; Display device, communication and defeated in/out device are as the interface with user's communication; And peripheral assembly or other special-purpose assembly.In other embodiments, the present invention also can be embodied as other form, and has more or less other device or assembly.Network also can be embodied as the online of any pattern, comprise that the LAN (LAN) or the Wide Area Network (WAN) that are fixedly connected with are online, or utilize the Internet services supplier temporarily to pull and connect to world-wide web, also be not limited to the various connected modes such as wire and wireless, such as communicating by letter with client computer by wireless networks such as GSM or Wi-Fi.Yet should be appreciated that, though not shown other hardware and component software (such as extra computation machine system, router, fire wall etc.) can be contained among network.
As shown in Figure 2, computer installation 202 comprises the processor unit 204 that is coupled to system bus 206.Display adapter 208 (it controls display 210) also is coupled to system bus 206.System bus 206 is coupled to I/O (I/O) bus 214 by bus bridge 212.I/O interface 216 is coupled to I/O bus 214.I/O interface 216 can be communicated by letter with each I/O device, and described I/O device comprises keyboard 218, mouse 220, cd-ROM (CD-ROM) 222, floppy drive 224 and flash memory portable disk 226.The I/O device also can be digital camera module in order to input image data or bar code data, or the I/O device can be integrated into Touch Screen with display 210, uses for user's operating application program and writes information.Being connected to the specification of the port of I/O interface 216, can be any known to familiar with computers architecture technology person, and it includes, but is not limited to USB (universal serial bus) (USB) port.
Use network interface 230, computer installation 202 can be communicated by letter with server 252 by network 228, and network interface 230 is coupled to system bus 206.Network 228 can be external network (for example, world-wide web) or internal network (for example, Ethernet or virtual private net (VPN)).Use network 228, computer installation 202 can use the present invention with server 252 interactions.
Hard-disk interface 232 also is coupled on system bus 206.Hard-disk interface 232 is connected with hard disk 234.In a preferred embodiment, hard disk 234 is moved into (populates) system storage 236, and this system storage 236 also is coupled to system bus 206.The data of moving into system storage 236 comprise operating system (OS) 238 and the application program 244 of computer installation 202.
OS 238 comprises for shell (shell) 240 and core 242 for user's access such as the resources such as application program 244.Shell 240 can provide the program of interpreter and interface between user and operating system.This shell provides system prompt, decipher to be inputted order that medium inputs and for example, sent order through decipher for being processed to the suitable lower-level (, core 242) of this operating system by keyboard, mouse or other user.Although shell 240 is generally to take word as basic guide type User's Interface, the present invention also can support other User's Interface pattern, such as pattern of figure, voice, dumb show etc.Core 242 comprises the lower-level function of OS 238, described lower-level function comprises that this basic service comprises by the other parts of OS 238 and the desired basic service of application program 244: the management of memory management, processing order and task management, disk management and mouse and keyboard.
Server 252 can be used and the same or similar hardware structure of aforementioned computer installation 202, and or can utilize other architecture, the present invention does not limit yet.For instance, server can be desktop PC, mobile computer, personal digital assistant (PDA), intelligent mobile phone etc.Yet shown in Fig. 2 and above-mentioned example all be not intended to for limiting framework of the present invention.Server 252 can comprise browser.Browser comprises program module and instruction, and described program module and instruction are used super word transportation protocol (HTTP) information to make world wide web (WWW) client (that is: computer installation 202) send and to receive the network information to world-wide web.
Application program 244 can comprise that cipher of the present invention cross-examinees module 246.Cipher cross-examinees that module 246 comprises program module and instruction, and described program module and instruction can be communicated by letter with server 252, with identification user identity.This cipher cross-examinees that module 246 can be the module in application program, or implements in the mode of background program (Daemon).But also can implement by the program kenel of other form in other embodiments.This cipher cross-examinees that module 246 comprises for implementing the code of hereinafter illustrated Fig. 3 and 5 interior illustrated programs.
The nextport hardware component NextPort illustrated in computer installation 202 nonexcludability, but represented most important components used in the present invention.For example, computer installation 202 can comprise alternative memorizer memory devices in addition, such as tape (magnetic cassette), diversified optical digital disk (DVD), (Bernoulli) card casket and fellow.These and other variation will be included in spirit of the present invention and category.
<password/cross-examine identifying procedure >
Fig. 3 with Fig. 5, coordinate Fig. 4 to show cipher of the present invention cross-examine the method step of module.
Fig. 3 is a kind of password according to the specific embodiment of the invention/cross-examine method flow diagram of the login (registration) of authentication.
● step 310: the account number and the password (or pattern of Touch Screen input) that receive user's input.
● step 320: information correlation time that records each member of password (or pattern).When keyboard is inputted, this member is each thump character of input password.When Touch Screen is inputted, this member is each thump at dummy keyboard or emulation fingerboard input password, or each stroke.After more details are described in reference to Fig. 4.
● step 330: produce the data recording in conjunction with each member of this password (or pattern) and relevant temporal information thereof.
● step 340: store this data recording in password database 350.
Should be noted have the mechanism of some authentications not comprise user's account number and only require the input password to obtain access right.For example, the PIN of mobile phone or mobile device (as flat computers such as iPad) input or startup password input or release.
Each member's of Fig. 4 display password or pattern position and the coordinate of time close figure.When the user wants login password, each password or pattern member can use following format record: [start time, concluding time, XY coordinate].As shown in Figure 4, suppose that the user inputs the password of 6 seconds altogether, therefore lower column data is recorded and is stored in password database 350: [0,1, X3Y5] 400, [0,3, X1Y1] 410, [2,4, X2Y3] 420, [3,4, X3Y5] 430, [4,5, REST] 440, [5,6, X2Y3] 450.[0,3, X1Y1] 410 wherein, meaning is that coordinate (X1Y1) is pressed at time point 0, and has continued 3 seconds.Be pressed (or Touch Screen when input, be pressed without any position) without any key when [4,5, REST] 440 is illustrated in the 4th second in addition, and continued 1 second.It is a part that the REST time also forms password.By recording this REST time, the complexity of password increases.Therefore, what the foundation of password just do not input, and what has recorded be not transfused to.The time interocclusal record enforcement, only need be outside existing record keyboard input (or as the touch location on Touch Screen), the time point of internal clocking when reading finger contact simultaneously and leaving the input media of computer installation.Should be noted, this database can be in the local computing machine, also can be in remote server, and the present invention does not limit.
When the user to login (login) and the input password after, in the password (or pattern) of inputting in the time of the user can being logined, the member's of first end duration is as basis (base), with be stored in database 350 in password (or pattern) in duration of corresponding member compare, and calculate beat ratio R.By this ratio R, be multiplied by other member's of this password duration, form the password member's of follow-up user's input the corresponding time, i.e. [0R, 1R, X3Y5], [0R, 3R, X1Y1], [2R, 4R, X2Y3], [3R, 4R, X3Y5], [4R, 5R, REST], [5R, 6R, X2Y3].But calculate acceptable beat scope by the predetermined nearly step of acceptance threshold.Therefore, according to the present invention, but the Password Input that has the same password input sequence to reach the input beat in predetermined acceptance threshold scope will be regarded as same password, and allow to login.For example, according to the present invention, sequentially input " Do<press 4 seconds > "; "<suspend 2 seconds > "; " Re<press 4 seconds > ", "<suspend 2 seconds > " " Mi<press 4 seconds " and following input Do<press 2 seconds ", "<suspend 1 second > "; " Re<press 2 seconds > ", "<suspend 1 second > " " Mi<press 2 seconds " identical.Be the Password Input of the rhythm (speed difference) of friction speed, will be regarded as same password.
As shown in Figure 4, the present invention also supports multikey or multipoint mode input, and similar function of playing on musical instrument is provided.Therefore, the present invention is applicable to input media miscellaneous for example keyboard, Touch Screen, mouse etc.The user can press simultaneously " A " reach " B " key, or press the left button of mouse and right button etc. part as password simultaneously.
In addition, the present invention also can be in conjunction with the help of sound or vision to assist the memory of password.For example, when Password Input, coordinate this input to provide corresponding to musical instrument sounds such as the piano of the rhythm of user's input or flutes.For Touch Screen, separately but combined with virtual keyboard or emulation fingerboard are conveniently inputted password for the user.Even can utilize the application module (as the App of iPhone) of emulation flute for the input password.And produce the flute music as Password Input by playing wind instruments of microphone on massaging device, and can be when the lower demand release of some situation (as driven), the input of providing convenience.These mechanism have increased the complexity of password, so enhanced safety, and the characteristic that is easy to memory still can be provided
Fig. 5 is a kind of password according to the specific embodiment of the invention/cross-examine method flow diagram of logining of authentication; Fig. 5 coordinates Fig. 4 to show the method step of logining of the present invention.
● step 510: the password (or pattern) that user's input will be logined.
● step 520: the password (or pattern) of dynamically relatively inputting and the password or the pattern that store.Further illustrating of step 520 is as follows:
● step 522: the member who inputs first end of password (or pattern) according to password (or pattern) and the user of this storage calculates beat ratio, R.
● step 524: utilize this beat ratio to change each member of access code or the pattern of this storage.Be about to this ratio R, be multiplied by other member's of this password duration, form the password member's of follow-up user's input the corresponding time.For example the user is with very fast beat input password, is input as [0,0.5, X3Y5] 400 as first.Beat ratio R=0.5.Therefore, all follow-up password members need be mated this beat ratio.So [0R, 3R, X1Y1] will be [0,1.5, X1Y1] 410.Whole password ratio conversion all according to this forms new reference password number.
● step 526: but utilize predetermined acceptance threshold, calculate acceptable beat scope.
● step 528: be confirmed whether that each member of the password (or pattern) that this user inputs and the corresponding member of this storage are complementary in this acceptable beat scope.
● step 530: if each member and the storage person of the password (or pattern) of user's input are complementary, login successfully (step 540)
It should be noted that, according to of the present invention open, when the present invention also supports that multikey or multipoint mode input user use Touch Screen, can be on Touch Screen any Position input password.As shown in Figure 4, cipher cross-examinees that module 246 can analyze the difference of the phasor coordinate of every bit, for example, by X1Y1 to X2Y3, to X3Y5, and calculates slope and the angle of each vector.Because each member all uses the relative vector coordinate, can be on Touch Screen any Position input password.Input password from prior art different on Touch Screen, the present invention allows the user to input password and must not see screen, as long as each password member has correct relative vector coordinate.In a word, the present invention cross-examinees the input sequence of machine-processed password thump except considering the existing password formula, input between required time, the input of each thump time out and whole thump and input formed institute rhythmic meter and calculate beat ratio R by recording each password member, as the part of password.Therefore cipher of the present invention is cross-examined module 246, and except considering the Password Input order, what also consider in addition is beat and ratio thereof, but not the real time of being considered as U.S. Pat 7653818.
The present invention, applicable to the environment that network service miscellaneous generally is provided, cross-examinees that module is in server-side and cipher of the present invention is installed.The present invention also is applicable to the computer installation miscellaneous of general non-use network, such as mobile phone, personal computer, mobile computer, flat computer etc., personal data and status data because all storing the user wherein, therefore also can utilize cipher of the present invention to cross-examine module, and the application of unit is provided.This cipher cross-examinees that module 246 can be the module in application program, but in other embodiments, also can implement by the program kenel of other form, for example, cross-examinees the user while being integrated into the operating system level for the activation manipulation system.
In the situation that do not break away from the present invention's spirit or necessary characteristic, can other particular form embody the present invention.Described specific embodiment each side only should be considered as to illustrative and non-limiting.Therefore, category of the present invention is as shown in appended claims but not as shown in above stated specification.All equivalent meaning and interior changes of scope that drop on claim should be considered as dropping in the category of claim.

Claims (10)

1. one kind provides time scale formula password/cross-examine the method for the login of authentication, and the method comprises:
Receive access code or the pattern of user's input;
Record this access code or each member's of pattern information correlation time;
Generation in conjunction with each member of this access code or pattern and correlation time information data recording; And
Store this data.
2. method as claimed in claim 1, the access code of wherein said reception user input further comprises and receives user's account number.
3. method as claimed in claim 1, wherein each member of this access code or pattern is with following format record: [start time, concluding time, XY coordinate].
4. method as claimed in claim 1, wherein each member of this access code or pattern comprises time out.
5. method as claimed in claim 1, wherein this user inputs and supports multikey or multipoint mode input, and similar function of playing on musical instrument is provided.
6. method as claimed in claim 1, its help further combined with sound or vision, to assist the memory of password, when Password Input, coordinates this input to provide the musical instrument sound corresponding to the beat of user's input; Wherein this musical instrument is piano or flute.
7. method as claimed in claim 1, wherein this user's input can be by keyboard or Touch Screen, wherein, but this Touch Screen combined with virtual keyboard or emulation musical instrument are inputted password for the user.
8. one kind provides time scale formula password/cross-examine the method for logining of authentication, and the method comprises:
Finish the member by first of the access code stored or pattern and user's input reference code or pattern and calculate the beat ratio;
Utilize this beat ratio to change each member of access code or the pattern of this storage;
But utilize predetermined acceptance threshold to calculate acceptable beat scope; And
Be confirmed whether that the access code of this user's input or each member of pattern and the corresponding member of this storage are complementary in this acceptable beat scope.
9. one kind provides time scale formula password/cross-examine the computer installation of the login of authentication, comprises:
Main frame; This main frame comprises,
Bus system;
Storer, be connected to this bus system, and wherein this storer comprises the group instruction;
Be connected to the processing unit of this bus system, wherein this processing unit is carried out this group instruction, to carry out method as described as claim 1 to 7 any one.
10. one kind provides time scale formula password/cross-examine the computer installation of logining of authentication, comprises:
Main frame; This main frame comprises,
Bus system;
Storer, be connected to this bus system, and wherein this storer comprises the group instruction;
Be connected to the processing unit of this bus system, wherein this processing unit is carried out this group instruction, to carry out method as claimed in claim 8.
CN2012101813005A 2012-06-04 2012-06-04 Method and computer device for providing time ratio-based password/challenge authentication Pending CN103455738A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101813005A CN103455738A (en) 2012-06-04 2012-06-04 Method and computer device for providing time ratio-based password/challenge authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101813005A CN103455738A (en) 2012-06-04 2012-06-04 Method and computer device for providing time ratio-based password/challenge authentication

Publications (1)

Publication Number Publication Date
CN103455738A true CN103455738A (en) 2013-12-18

Family

ID=49738090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101813005A Pending CN103455738A (en) 2012-06-04 2012-06-04 Method and computer device for providing time ratio-based password/challenge authentication

Country Status (1)

Country Link
CN (1) CN103455738A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893825A (en) * 2016-04-25 2016-08-24 广东欧珀移动通信有限公司 Display screen unlocking method, device and mobile terminal based on music identifier
WO2017028140A1 (en) * 2015-08-16 2017-02-23 张焰焰 Method and mobile terminal for logging in to account according to gesture

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040143767A1 (en) * 2002-12-19 2004-07-22 International Business Machines Corporation Software method for improved password entry
CN101344825A (en) * 2008-07-31 2009-01-14 华为技术有限公司 Method and terminal for inceptive cipher setting and cipher validation based on touch screen
CN101557287A (en) * 2008-04-07 2009-10-14 冀连有 Method for identity identification according to characteristics of user keystroke
CN102142071A (en) * 2011-04-26 2011-08-03 汉王科技股份有限公司 Method and device for verifying mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040143767A1 (en) * 2002-12-19 2004-07-22 International Business Machines Corporation Software method for improved password entry
CN101557287A (en) * 2008-04-07 2009-10-14 冀连有 Method for identity identification according to characteristics of user keystroke
CN101344825A (en) * 2008-07-31 2009-01-14 华为技术有限公司 Method and terminal for inceptive cipher setting and cipher validation based on touch screen
CN102142071A (en) * 2011-04-26 2011-08-03 汉王科技股份有限公司 Method and device for verifying mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017028140A1 (en) * 2015-08-16 2017-02-23 张焰焰 Method and mobile terminal for logging in to account according to gesture
CN105893825A (en) * 2016-04-25 2016-08-24 广东欧珀移动通信有限公司 Display screen unlocking method, device and mobile terminal based on music identifier

Similar Documents

Publication Publication Date Title
TWI474703B (en) Method and computer system for providing time ratio-based password/challenge authentication
US10360412B2 (en) Contextual contemporaneous gesture and keyboard entry authentication
US20230188521A1 (en) Secure authorization for access to private data in virtual reality
US9531701B2 (en) Method, device, and system of differentiating among users based on responses to interferences
JP5969012B2 (en) Image gesture authentication
Yan et al. Designing leakage-resilient password entry on touchscreen mobile devices
CN106575281A (en) System and method for implementing a hosted authentication service
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
JP2014067366A (en) Information processor, information processing method, and program
KR101267229B1 (en) Method and system for authenticating using input pattern
JP2012027530A (en) One-time password generator, server apparatus, authentication system, method, program, and recording medium
US9760699B2 (en) User authentication
CN103455738A (en) Method and computer device for providing time ratio-based password/challenge authentication
Wu et al. CaiAuth: Context-aware implicit authentication when the screen is awake
Badigar et al. Voice Based Email Application For Visually Impaired
KR20120107610A (en) The apparatus for verifying user in portable appliance and the method thereof
CN113672886A (en) Prompting method and device
Renz et al. Authentication methods for voice services on smart speakers–a multi-method study on perceived security and ease of use
TW201508530A (en) Method and computer system for providing time ratio-based password/challenge authentication
Doja et al. User authentication schemes for mobile and handheld devices
Ho et al. Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired
JP2023142553A (en) Information protection device, information protection method, program and recording medium
TW201441859A (en) Method for inputting account and password to computer or telecom device via audio interface
Solvande et al. Three Factor Graphical Authentication Mechanism
JP2011227762A (en) User authentication device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20131218