CN103455738A - Method and computer device for providing time ratio-based password/challenge authentication - Google Patents
Method and computer device for providing time ratio-based password/challenge authentication Download PDFInfo
- Publication number
- CN103455738A CN103455738A CN2012101813005A CN201210181300A CN103455738A CN 103455738 A CN103455738 A CN 103455738A CN 2012101813005 A CN2012101813005 A CN 2012101813005A CN 201210181300 A CN201210181300 A CN 201210181300A CN 103455738 A CN103455738 A CN 103455738A
- Authority
- CN
- China
- Prior art keywords
- password
- input
- user
- pattern
- access code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a method for providing time ratio-based password/challenge authentication for login. The method includes receiving access codes or patterns inputted by a user; recording relevant time information of each member of the access codes or patterns; generating data combined with each member of the access codes or patterns and the relevant time information of the member; storing data records.
Description
Technical field
The present invention relates to about providing cipher to cross-examine the mechanism of authentication; Time scale formula password/cross-examine method and the computer installation of authentication especially are provided.
Background technology
Use massaging device miscellaneous in daily life, such as mobile phone, personal computer, mobile computer, flat computer etc., wherein all may store user's personal data and status data.Along with popularizing of network, increasing network application is carried out with on line operation (on-line).Particularly, server is in order to provide services on the Internet, for example social networking service, web mail service, Mobile business service, bank's online trading service, database access service or content information provides service etc., also store user's personal data and status data.Therefore for the considering of security and privacy, server or personal information apparatus generally all can require the user before using its service, need to observe authentication (authentication) program with identification user identity.At present, the most frequently used is that cipher is cross-examined (password-based challenge) authentication procedure.For example server generally can require the user before using its service, need first input user's account number and password (or title access code) and carry out identification (or be called log in), avoids user's personal data be stolen or alter.
Due to the quick increase of network covering scope and accessibility, simple password no longer can provide enough protections, and various different mechanisms are suggested to the protection that provides better.For example, require Password Length, complicacy and unpredictability, with the Cipher Strength that acquisition is resisted roughly and the lexicographic search is attacked.In addition, require to change termly password, Old Password was lost efficacy, thereby can reduce the possibility that password is cracked.These mechanism have increased security, therefore can help the user to protect its account number.
Yet as shown in Figure 1, client 100 by cross-examining 101 and the authentication procedure of account number/password 102 is provided, requires heterogeneous networks service to website A 110, website B 120, website C 130 etc. by network 140.In fact most users use different account number/passwords usually to different website A 110, website B120, website C 130 etc.These mechanism require the user must remember the password of the network service of a plurality of access different web sites.In addition, people often only login the minority website every day, the password of the website that therefore usually is not easy correctly to remember that those seldom visit.Generalized case, user's password that must hazard a guess, and probably because of too many wrong the trial, be lockable.
Therefore there is the demand that can help the user to remember to make us the password of puzzlement and can maintain again security.Existing disposal password (one-time password, OTP) technology provides solution.So OTP requires extra technology to provide password to the user.In many situations, OTP utilization electronic installation.This electronic installation may be lost, and has therefore increased the risk of losing password.In addition, different tissues may be difficult to share its OTP generation mechanism.If the user will access the network service that different web sites provides, will need different electronic installations.Therefore, the user carries a plurality of electronic installations by needs, and this more increases the risk of loss.
The mechanism of password prompt (hint) provides another solution.Yet this mechanism may reduce security, because the unauthorized person also can see this password prompt usually, thereby can help hacker's decryption.In addition, this mechanism is difficult to provide suitable password prompt to complicated password.Therefore, today secret (sensitive) system seldom utilize this mechanism.
The method that has at present many ciphers that better protection is provided to cross-examine, for example can, with reference to U.S. Pat 7653818, be incorporated to this paper at this by reference.This U.S. Pat 7653818 adds while disclosing Password Input, time of limit for cryptographic thump (keystrokes) for example, and time-out (pause) the time equal time factor that adds predetermined length between thump, avoid without the access of authorizing it as the part of password to increase security.
Summary of the invention
In this instructions mentioned characteristic, advantage or similar expression way do not imply the present invention attainable characteristic and advantage should in any single specific embodiment of the present invention, all realize.But should understand, the expression way of relevant characteristic and advantage refers to that described specific feature, advantage or characteristic are included at least one specific embodiment of the present invention in conjunction with specific embodiments.Therefore, in this instructions for characteristic and advantage, and the discussion of similar expression way can be relevant with identical specific embodiment, but also inessential.
In addition, can be in any suitable manner, in one or more specific embodiments in conjunction with characteristic of the present invention, advantage, and characteristic.It will be understood by those skilled in the art that and also can implement the present invention in the situation that there is no one or more specific feature or the advantage of certain specific embodiments.In other example, should understand, other characteristic in certain specific embodiments and advantage may not occur in all specific embodiments of the present invention.
The invention provides a kind of new cipher mechanism of cross-examining with identification user identity.This mechanism cross-examinees the input sequence of machine-processed password thump except considering the existing password formula, and each thump is inputted time out between required time, each thump input and the input of whole thump formed so-called rhythm (rhythm), beat (tempo) or bat (beat) etc. all as the part of password.The present invention is except considering time factor, the speed of also considering rhythm is inputted password (or claiming access code) (or pattern (pattern) of Touch Screen input), to carry out the so-called time scale formula of the present invention (Time Ratio-Based) password/the cross-examine method of authentication.That is, the Password Input of the rhythm of friction speed (speed difference), will be regarded as same password.
In addition, the present invention also supports multikey or multipoint mode to input the part as password, thereby similar function of playing on musical instrument is provided.Therefore, the present invention is applicable to input media miscellaneous for example keyboard, Touch Screen, mouse etc.The user can press simultaneously " A " reach " B " key, or press the left button of mouse and right button etc. part as password simultaneously.
Due to the present invention in conjunction with the speed of rhythm, beat or bat and rhythm the part as password, therefore can set up than hommization and be easy to the password of memory.In addition, the present invention also can be in conjunction with the help (aide) of sound or vision to assist the memory of password.For example, when Password Input, coordinate this input to provide corresponding to musical instrument sounds such as the piano of the rhythm of user's input or flutes.For Touch Screen, separately but combined with virtual keyboard or emulation fingerboard are conveniently inputted password for the user.These mechanism increase the complexity of password, so enhanced safety, and the characteristic that is easy to memory still can be provided.
According to the embodiment of the present invention, a kind of time scale formula password/cross-examine the method for the login of authentication of providing is provided, the method comprises:
Receive access code or the pattern of user's input;
Record this access code or each member's of pattern information correlation time;
Generation in conjunction with each member of this access code or pattern and correlation time information data recording; And
Store this data.
According to another embodiment of the present invention, a kind of time scale formula password/cross-examine the method for logining of authentication of providing is provided, the method comprises:
Finish the member by first of the access code stored or pattern and user's input reference code (or pattern) and calculate the beat ratio;
Utilize this beat ratio to change each member of access code or the pattern of this storage;
But utilize predetermined acceptance threshold to calculate acceptable beat scope; And
Be confirmed whether that the access code of this user's input or each member of pattern and the corresponding member of this storage are complementary in this acceptable beat scope.
According to another embodiment of the present invention, a kind of time scale formula password/cross-examine the computer installation of the login of authentication of providing is provided, comprise:
Main frame; This main frame comprises,
Bus system;
Storer, be connected to this bus system, and wherein this storer comprises the group instruction;
Be connected to the processing unit of this bus system, wherein this processing unit is carried out this group instruction, to carry out method as aforesaid as the present invention.
According to another embodiment of the present invention, a kind of time scale formula password/cross-examine the computer installation of logining of authentication of providing is provided, comprise:
Main frame; This main frame comprises,
Bus system;
Storer, be connected to this bus system, and wherein this storer comprises the group instruction;
Be connected to the processing unit of this bus system, wherein this processing unit is carried out this group instruction, to carry out aforesaid method.
With reference to following explanation and appended claims or the embodiments of the present invention of utilization as hereinafter carried, can more understand these characteristics of the present invention and advantage.
The accompanying drawing explanation
In order to understand immediately advantage of the present invention, please refer to certain specific embodiments as shown in drawings, describe above the present invention of brief narration in detail.Only describe typical specific embodiment of the present invention and therefore be not regarded as restriction category of the present invention in the situation that understand these icons, with reference to accompanying drawing, with extra definition and details, the present invention being described, graphic in:
Fig. 1 is a kind of existing password/cross-examine system schematic of authentication;
The hardware environment calcspar that Fig. 2 is exemplary computer installation 202 of the present invention;
Fig. 3 is a kind of password according to the specific embodiment of the invention/cross-examine method flow diagram of the login (registration) of authentication;
Each member's of Fig. 4 display password or pattern position and the coordinate of time close figure;
Fig. 5 is a kind of password according to the specific embodiment of the invention/cross-examine method flow diagram of logining of authentication.
Embodiment
In this instructions, quoting of " specific embodiment " or similar expression way refers in conjunction with the described specific feature of this specific embodiment, structure or characteristic and is included at least specific embodiment of the present invention.Therefore, in this manual, the appearance of the term of " in specific embodiment " and similar expression way may not refer to identical specific embodiment.
Those skilled in the art be when knowing, the present invention can be embodied as computer installation, method or as the computer-readable medium of computer program.Therefore, the present invention may be embodied as various forms, such as the example of hardware implementation completely, implement software example (comprising firmware, resident software, microprogram code etc.) completely, perhaps also can be embodied as the form of implementation of software and hardware, in following meeting, be called as " circuit ", " module " or " system ".In addition, the present invention also can any tangible form of medium be embodied as computer program, but it has the storage of computing machine service routine code thereon.
One or more computing machine can use or the combination of readable media can utilize.For instance, computing machine can use or readable media can be (but being not limited to) electronics, magnetic, optics, electromagnetism, ultrared or semi-conductive system, device, equipment or propagation medium.More specifically computer-readable medium embodiment can comprise following shown in (infinite illustration): the electrical connection formed by one or more connecting lines, portable computer disk, hard disk, random access storage device (RAM), ROM (read-only memory) (ROM), the programmable read-only memory (EPROM or flash memory) of can erasing, optical fiber, portable disc sheet (CD-ROM), optical disc drive, transmission medium (for example the basis of world-wide web (Internet) or internal network (intranet) connects), or magnetic storage device.Should be noted, computing machine can use or readable media more can be printed on it program line to make this program can be once again by the suitable medium of electronization for paper or any can be used for, for example nationality is by this paper of optical scanning or other medium, and then compiling, decipher or other suitable necessary processing mode, then can be stored in computer memory once again.In this article, computing machine can use or readable media can be any medium for maintenance, storage, transmission, propagation or transmission procedure code, for coupled instruction execution system, device or equipment, processes.But but the computing machine working medium can comprise the propagation data signal that wherein stores computing machine service routine code, no matter be with fundamental frequency (baseband) or the kenel of partial carrier wave.But the transmission of computing machine service routine code can be used any fit medium, comprise that (but being not limited to) is wireless, wired, Connectorized fiber optic cabling, radio frequency (RF) etc.
Can write with the combination of one or more program languages for the computer program code of carrying out the present invention's operation, comprise OO program language (for example Java, Smalltalk, C++ or other fellow) and traditional program program language (for example c programming language or other similar program language).Program code can the stand alone software external member form complete on user's computing machine, carry out or part is carried out on user's computing machine, or part in user's computing machine and part in remote computer.
Below relevant narration meeting of the present invention with reference to process flow diagram and/or the calcspar of computer installation, method and computer program according to the specific embodiment of the invention, describe.Each square in can understanding each process flow diagram and/or calcspar, and any combination of square in process flow diagram and/or calcspar, can implement with computer program instructions.These computer program instructions can be carried out for general purpose computer or the processor of special computers or the machine that other programmable data processing equipment forms, and instruction is processed via computing machine or other programmable data processing equipment so that illustrated function or operation in implementing procedure figure and/or calcspar.
These computer program instructions also can be stored on computer-readable medium, so that instruct computer or other programmable data processing equipment carry out specific function, and these are stored in instructions on computer-readable medium and form manufactured goods, but illustrated function or operation in the instruction implementing procedure figure comprised in it and/or calcspar.
Computer program instructions also can be loaded on computing machine or other programmable data processing equipment, so that carry out the system operation steps on computing machine or other programmable device, and produce computer-implemented program to reach function illustrated in process flow diagram and/or calcspar or operation while on this computing machine or other programmable device, carrying out this instruction.
Secondly, please refer to Fig. 2 to Fig. 5, process flow diagram and calcspar in graphic middle demonstration according to the enforceable framework of computer installation, method and computer program, function and the operation of various embodiments of the invention.Therefore, but the program code of each the square representation module in process flow diagram or calcspar, section or part, and it comprises one or more executable instructions, to implement the logic function of appointment.Another as attention person, in some other embodiment, the described function of square can be disobeyed the order shown in figure and be carried out.For instance, the square that two icons are connected in fact also can be carried out simultaneously, or complies with the order that involved function in some cases also can be contrary according to icon and carry out.Should be noted in addition, the square of each calcspar and/or process flow diagram, and the combination of square in calcspar and/or process flow diagram, but nationality is implemented by the system based on specific purposes hardware, perhaps nationality, by the combination of specific purposes hardware and computer instruction, is carried out specific function or operation.
<computer installation >
Fig. 2 illustrates the hardware environment calcspar of exemplary computer installation 202 of the present invention.In an exemplary embodiment, computer installation is universal desktop PC, can have processor to carry out various application programs; Storage device is to store various information and program code; Display device, communication and defeated in/out device are as the interface with user's communication; And peripheral assembly or other special-purpose assembly.In other embodiments, the present invention also can be embodied as other form, and has more or less other device or assembly.Network also can be embodied as the online of any pattern, comprise that the LAN (LAN) or the Wide Area Network (WAN) that are fixedly connected with are online, or utilize the Internet services supplier temporarily to pull and connect to world-wide web, also be not limited to the various connected modes such as wire and wireless, such as communicating by letter with client computer by wireless networks such as GSM or Wi-Fi.Yet should be appreciated that, though not shown other hardware and component software (such as extra computation machine system, router, fire wall etc.) can be contained among network.
As shown in Figure 2, computer installation 202 comprises the processor unit 204 that is coupled to system bus 206.Display adapter 208 (it controls display 210) also is coupled to system bus 206.System bus 206 is coupled to I/O (I/O) bus 214 by bus bridge 212.I/O interface 216 is coupled to I/O bus 214.I/O interface 216 can be communicated by letter with each I/O device, and described I/O device comprises keyboard 218, mouse 220, cd-ROM (CD-ROM) 222, floppy drive 224 and flash memory portable disk 226.The I/O device also can be digital camera module in order to input image data or bar code data, or the I/O device can be integrated into Touch Screen with display 210, uses for user's operating application program and writes information.Being connected to the specification of the port of I/O interface 216, can be any known to familiar with computers architecture technology person, and it includes, but is not limited to USB (universal serial bus) (USB) port.
Use network interface 230, computer installation 202 can be communicated by letter with server 252 by network 228, and network interface 230 is coupled to system bus 206.Network 228 can be external network (for example, world-wide web) or internal network (for example, Ethernet or virtual private net (VPN)).Use network 228, computer installation 202 can use the present invention with server 252 interactions.
Hard-disk interface 232 also is coupled on system bus 206.Hard-disk interface 232 is connected with hard disk 234.In a preferred embodiment, hard disk 234 is moved into (populates) system storage 236, and this system storage 236 also is coupled to system bus 206.The data of moving into system storage 236 comprise operating system (OS) 238 and the application program 244 of computer installation 202.
OS 238 comprises for shell (shell) 240 and core 242 for user's access such as the resources such as application program 244.Shell 240 can provide the program of interpreter and interface between user and operating system.This shell provides system prompt, decipher to be inputted order that medium inputs and for example, sent order through decipher for being processed to the suitable lower-level (, core 242) of this operating system by keyboard, mouse or other user.Although shell 240 is generally to take word as basic guide type User's Interface, the present invention also can support other User's Interface pattern, such as pattern of figure, voice, dumb show etc.Core 242 comprises the lower-level function of OS 238, described lower-level function comprises that this basic service comprises by the other parts of OS 238 and the desired basic service of application program 244: the management of memory management, processing order and task management, disk management and mouse and keyboard.
The nextport hardware component NextPort illustrated in computer installation 202 nonexcludability, but represented most important components used in the present invention.For example, computer installation 202 can comprise alternative memorizer memory devices in addition, such as tape (magnetic cassette), diversified optical digital disk (DVD), (Bernoulli) card casket and fellow.These and other variation will be included in spirit of the present invention and category.
<password/cross-examine identifying procedure >
Fig. 3 with Fig. 5, coordinate Fig. 4 to show cipher of the present invention cross-examine the method step of module.
Fig. 3 is a kind of password according to the specific embodiment of the invention/cross-examine method flow diagram of the login (registration) of authentication.
● step 310: the account number and the password (or pattern of Touch Screen input) that receive user's input.
● step 320: information correlation time that records each member of password (or pattern).When keyboard is inputted, this member is each thump character of input password.When Touch Screen is inputted, this member is each thump at dummy keyboard or emulation fingerboard input password, or each stroke.After more details are described in reference to Fig. 4.
● step 330: produce the data recording in conjunction with each member of this password (or pattern) and relevant temporal information thereof.
● step 340: store this data recording in password database 350.
Should be noted have the mechanism of some authentications not comprise user's account number and only require the input password to obtain access right.For example, the PIN of mobile phone or mobile device (as flat computers such as iPad) input or startup password input or release.
Each member's of Fig. 4 display password or pattern position and the coordinate of time close figure.When the user wants login password, each password or pattern member can use following format record: [start time, concluding time, XY coordinate].As shown in Figure 4, suppose that the user inputs the password of 6 seconds altogether, therefore lower column data is recorded and is stored in password database 350: [0,1, X3Y5] 400, [0,3, X1Y1] 410, [2,4, X2Y3] 420, [3,4, X3Y5] 430, [4,5, REST] 440, [5,6, X2Y3] 450.[0,3, X1Y1] 410 wherein, meaning is that coordinate (X1Y1) is pressed at time point 0, and has continued 3 seconds.Be pressed (or Touch Screen when input, be pressed without any position) without any key when [4,5, REST] 440 is illustrated in the 4th second in addition, and continued 1 second.It is a part that the REST time also forms password.By recording this REST time, the complexity of password increases.Therefore, what the foundation of password just do not input, and what has recorded be not transfused to.The time interocclusal record enforcement, only need be outside existing record keyboard input (or as the touch location on Touch Screen), the time point of internal clocking when reading finger contact simultaneously and leaving the input media of computer installation.Should be noted, this database can be in the local computing machine, also can be in remote server, and the present invention does not limit.
When the user to login (login) and the input password after, in the password (or pattern) of inputting in the time of the user can being logined, the member's of first end duration is as basis (base), with be stored in database 350 in password (or pattern) in duration of corresponding member compare, and calculate beat ratio R.By this ratio R, be multiplied by other member's of this password duration, form the password member's of follow-up user's input the corresponding time, i.e. [0R, 1R, X3Y5], [0R, 3R, X1Y1], [2R, 4R, X2Y3], [3R, 4R, X3Y5], [4R, 5R, REST], [5R, 6R, X2Y3].But calculate acceptable beat scope by the predetermined nearly step of acceptance threshold.Therefore, according to the present invention, but the Password Input that has the same password input sequence to reach the input beat in predetermined acceptance threshold scope will be regarded as same password, and allow to login.For example, according to the present invention, sequentially input " Do<press 4 seconds > "; "<suspend 2 seconds > "; " Re<press 4 seconds > ", "<suspend 2 seconds > " " Mi<press 4 seconds " and following input Do<press 2 seconds ", "<suspend 1 second > "; " Re<press 2 seconds > ", "<suspend 1 second > " " Mi<press 2 seconds " identical.Be the Password Input of the rhythm (speed difference) of friction speed, will be regarded as same password.
As shown in Figure 4, the present invention also supports multikey or multipoint mode input, and similar function of playing on musical instrument is provided.Therefore, the present invention is applicable to input media miscellaneous for example keyboard, Touch Screen, mouse etc.The user can press simultaneously " A " reach " B " key, or press the left button of mouse and right button etc. part as password simultaneously.
In addition, the present invention also can be in conjunction with the help of sound or vision to assist the memory of password.For example, when Password Input, coordinate this input to provide corresponding to musical instrument sounds such as the piano of the rhythm of user's input or flutes.For Touch Screen, separately but combined with virtual keyboard or emulation fingerboard are conveniently inputted password for the user.Even can utilize the application module (as the App of iPhone) of emulation flute for the input password.And produce the flute music as Password Input by playing wind instruments of microphone on massaging device, and can be when the lower demand release of some situation (as driven), the input of providing convenience.These mechanism have increased the complexity of password, so enhanced safety, and the characteristic that is easy to memory still can be provided
Fig. 5 is a kind of password according to the specific embodiment of the invention/cross-examine method flow diagram of logining of authentication; Fig. 5 coordinates Fig. 4 to show the method step of logining of the present invention.
● step 510: the password (or pattern) that user's input will be logined.
● step 520: the password (or pattern) of dynamically relatively inputting and the password or the pattern that store.Further illustrating of step 520 is as follows:
● step 522: the member who inputs first end of password (or pattern) according to password (or pattern) and the user of this storage calculates beat ratio, R.
● step 524: utilize this beat ratio to change each member of access code or the pattern of this storage.Be about to this ratio R, be multiplied by other member's of this password duration, form the password member's of follow-up user's input the corresponding time.For example the user is with very fast beat input password, is input as [0,0.5, X3Y5] 400 as first.Beat ratio R=0.5.Therefore, all follow-up password members need be mated this beat ratio.So [0R, 3R, X1Y1] will be [0,1.5, X1Y1] 410.Whole password ratio conversion all according to this forms new reference password number.
● step 526: but utilize predetermined acceptance threshold, calculate acceptable beat scope.
● step 528: be confirmed whether that each member of the password (or pattern) that this user inputs and the corresponding member of this storage are complementary in this acceptable beat scope.
● step 530: if each member and the storage person of the password (or pattern) of user's input are complementary, login successfully (step 540)
It should be noted that, according to of the present invention open, when the present invention also supports that multikey or multipoint mode input user use Touch Screen, can be on Touch Screen any Position input password.As shown in Figure 4, cipher cross-examinees that module 246 can analyze the difference of the phasor coordinate of every bit, for example, by X1Y1 to X2Y3, to X3Y5, and calculates slope and the angle of each vector.Because each member all uses the relative vector coordinate, can be on Touch Screen any Position input password.Input password from prior art different on Touch Screen, the present invention allows the user to input password and must not see screen, as long as each password member has correct relative vector coordinate.In a word, the present invention cross-examinees the input sequence of machine-processed password thump except considering the existing password formula, input between required time, the input of each thump time out and whole thump and input formed institute rhythmic meter and calculate beat ratio R by recording each password member, as the part of password.Therefore cipher of the present invention is cross-examined module 246, and except considering the Password Input order, what also consider in addition is beat and ratio thereof, but not the real time of being considered as U.S. Pat 7653818.
The present invention, applicable to the environment that network service miscellaneous generally is provided, cross-examinees that module is in server-side and cipher of the present invention is installed.The present invention also is applicable to the computer installation miscellaneous of general non-use network, such as mobile phone, personal computer, mobile computer, flat computer etc., personal data and status data because all storing the user wherein, therefore also can utilize cipher of the present invention to cross-examine module, and the application of unit is provided.This cipher cross-examinees that module 246 can be the module in application program, but in other embodiments, also can implement by the program kenel of other form, for example, cross-examinees the user while being integrated into the operating system level for the activation manipulation system.
In the situation that do not break away from the present invention's spirit or necessary characteristic, can other particular form embody the present invention.Described specific embodiment each side only should be considered as to illustrative and non-limiting.Therefore, category of the present invention is as shown in appended claims but not as shown in above stated specification.All equivalent meaning and interior changes of scope that drop on claim should be considered as dropping in the category of claim.
Claims (10)
1. one kind provides time scale formula password/cross-examine the method for the login of authentication, and the method comprises:
Receive access code or the pattern of user's input;
Record this access code or each member's of pattern information correlation time;
Generation in conjunction with each member of this access code or pattern and correlation time information data recording; And
Store this data.
2. method as claimed in claim 1, the access code of wherein said reception user input further comprises and receives user's account number.
3. method as claimed in claim 1, wherein each member of this access code or pattern is with following format record: [start time, concluding time, XY coordinate].
4. method as claimed in claim 1, wherein each member of this access code or pattern comprises time out.
5. method as claimed in claim 1, wherein this user inputs and supports multikey or multipoint mode input, and similar function of playing on musical instrument is provided.
6. method as claimed in claim 1, its help further combined with sound or vision, to assist the memory of password, when Password Input, coordinates this input to provide the musical instrument sound corresponding to the beat of user's input; Wherein this musical instrument is piano or flute.
7. method as claimed in claim 1, wherein this user's input can be by keyboard or Touch Screen, wherein, but this Touch Screen combined with virtual keyboard or emulation musical instrument are inputted password for the user.
8. one kind provides time scale formula password/cross-examine the method for logining of authentication, and the method comprises:
Finish the member by first of the access code stored or pattern and user's input reference code or pattern and calculate the beat ratio;
Utilize this beat ratio to change each member of access code or the pattern of this storage;
But utilize predetermined acceptance threshold to calculate acceptable beat scope; And
Be confirmed whether that the access code of this user's input or each member of pattern and the corresponding member of this storage are complementary in this acceptable beat scope.
9. one kind provides time scale formula password/cross-examine the computer installation of the login of authentication, comprises:
Main frame; This main frame comprises,
Bus system;
Storer, be connected to this bus system, and wherein this storer comprises the group instruction;
Be connected to the processing unit of this bus system, wherein this processing unit is carried out this group instruction, to carry out method as described as claim 1 to 7 any one.
10. one kind provides time scale formula password/cross-examine the computer installation of logining of authentication, comprises:
Main frame; This main frame comprises,
Bus system;
Storer, be connected to this bus system, and wherein this storer comprises the group instruction;
Be connected to the processing unit of this bus system, wherein this processing unit is carried out this group instruction, to carry out method as claimed in claim 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101813005A CN103455738A (en) | 2012-06-04 | 2012-06-04 | Method and computer device for providing time ratio-based password/challenge authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101813005A CN103455738A (en) | 2012-06-04 | 2012-06-04 | Method and computer device for providing time ratio-based password/challenge authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103455738A true CN103455738A (en) | 2013-12-18 |
Family
ID=49738090
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012101813005A Pending CN103455738A (en) | 2012-06-04 | 2012-06-04 | Method and computer device for providing time ratio-based password/challenge authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103455738A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105893825A (en) * | 2016-04-25 | 2016-08-24 | 广东欧珀移动通信有限公司 | Display screen unlocking method, device and mobile terminal based on music identifier |
WO2017028140A1 (en) * | 2015-08-16 | 2017-02-23 | 张焰焰 | Method and mobile terminal for logging in to account according to gesture |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040143767A1 (en) * | 2002-12-19 | 2004-07-22 | International Business Machines Corporation | Software method for improved password entry |
CN101344825A (en) * | 2008-07-31 | 2009-01-14 | 华为技术有限公司 | Method and terminal for inceptive cipher setting and cipher validation based on touch screen |
CN101557287A (en) * | 2008-04-07 | 2009-10-14 | 冀连有 | Method for identity identification according to characteristics of user keystroke |
CN102142071A (en) * | 2011-04-26 | 2011-08-03 | 汉王科技股份有限公司 | Method and device for verifying mobile terminal |
-
2012
- 2012-06-04 CN CN2012101813005A patent/CN103455738A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040143767A1 (en) * | 2002-12-19 | 2004-07-22 | International Business Machines Corporation | Software method for improved password entry |
CN101557287A (en) * | 2008-04-07 | 2009-10-14 | 冀连有 | Method for identity identification according to characteristics of user keystroke |
CN101344825A (en) * | 2008-07-31 | 2009-01-14 | 华为技术有限公司 | Method and terminal for inceptive cipher setting and cipher validation based on touch screen |
CN102142071A (en) * | 2011-04-26 | 2011-08-03 | 汉王科技股份有限公司 | Method and device for verifying mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017028140A1 (en) * | 2015-08-16 | 2017-02-23 | 张焰焰 | Method and mobile terminal for logging in to account according to gesture |
CN105893825A (en) * | 2016-04-25 | 2016-08-24 | 广东欧珀移动通信有限公司 | Display screen unlocking method, device and mobile terminal based on music identifier |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI474703B (en) | Method and computer system for providing time ratio-based password/challenge authentication | |
US10360412B2 (en) | Contextual contemporaneous gesture and keyboard entry authentication | |
US20230188521A1 (en) | Secure authorization for access to private data in virtual reality | |
US9531701B2 (en) | Method, device, and system of differentiating among users based on responses to interferences | |
JP5969012B2 (en) | Image gesture authentication | |
Yan et al. | Designing leakage-resilient password entry on touchscreen mobile devices | |
CN106575281A (en) | System and method for implementing a hosted authentication service | |
WO2021244531A1 (en) | Payment method and apparatus based on facial recognition | |
JP2014067366A (en) | Information processor, information processing method, and program | |
KR101267229B1 (en) | Method and system for authenticating using input pattern | |
JP2012027530A (en) | One-time password generator, server apparatus, authentication system, method, program, and recording medium | |
US9760699B2 (en) | User authentication | |
CN103455738A (en) | Method and computer device for providing time ratio-based password/challenge authentication | |
Wu et al. | CaiAuth: Context-aware implicit authentication when the screen is awake | |
Badigar et al. | Voice Based Email Application For Visually Impaired | |
KR20120107610A (en) | The apparatus for verifying user in portable appliance and the method thereof | |
CN113672886A (en) | Prompting method and device | |
Renz et al. | Authentication methods for voice services on smart speakers–a multi-method study on perceived security and ease of use | |
TW201508530A (en) | Method and computer system for providing time ratio-based password/challenge authentication | |
Doja et al. | User authentication schemes for mobile and handheld devices | |
Ho et al. | Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired | |
JP2023142553A (en) | Information protection device, information protection method, program and recording medium | |
TW201441859A (en) | Method for inputting account and password to computer or telecom device via audio interface | |
Solvande et al. | Three Factor Graphical Authentication Mechanism | |
JP2011227762A (en) | User authentication device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20131218 |