CN103632070A - Any handwriting graphical password method used for payment system - Google Patents

Any handwriting graphical password method used for payment system Download PDF

Info

Publication number
CN103632070A
CN103632070A CN201310661652.5A CN201310661652A CN103632070A CN 103632070 A CN103632070 A CN 103632070A CN 201310661652 A CN201310661652 A CN 201310661652A CN 103632070 A CN103632070 A CN 103632070A
Authority
CN
China
Prior art keywords
input
payment system
password
hand
arbitrary graphic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310661652.5A
Other languages
Chinese (zh)
Other versions
CN103632070B (en
Inventor
胡建明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Fenwei Intelligence Technology Co Ltd
Original Assignee
Shanghai Fenwei Intelligence Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Fenwei Intelligence Technology Co Ltd filed Critical Shanghai Fenwei Intelligence Technology Co Ltd
Priority to CN201310661652.5A priority Critical patent/CN103632070B/en
Publication of CN103632070A publication Critical patent/CN103632070A/en
Application granted granted Critical
Publication of CN103632070B publication Critical patent/CN103632070B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Collating Specific Patterns (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to an any handwriting graphical password method used for a payment system. The method comprises a password setting step and a password verification step by taking a touch screen as graphical password input equipment, wherein the password setting step comprises the following steps of: receiving any handwriting graph input by a user via the touch screen; carrying out characteristic extracting and coding on any input handwriting graph; receiving the handwriting graph input by the user again via the touch screen; carrying out characteristic extracting and coding on the handwriting graph input for the second time; comparing the input of two times to judge the graphical password input effectiveness. The password verification step comprises the following steps of: receiving any handwriting graph input by the user via the touch screen; carrying out characteristic extracting and coding on the input handwriting graph; carrying out communication encryption on graph password; transmitting the graph password to a data center; comparing the graph password with the graph password of the data center to judge whether the two graph passwords are same or not; if so, passing the verification. Compared with the prior art, the handwriting graphical password method used for the payment system, which is disclosed by the invention, has the advantages of high encryption intensity, easiness in memorizing and managing and the like.

Description

Hand-written arbitrary graphic cryptographic methods for payment system
Technical field
The present invention relates to a kind of payment system safety technique, especially relate to a kind of hand-written arbitrary graphic cryptographic methods for payment system.
Background technology
In recent years, along with the development of mobile communication technology, the number of users paying by mobile phone or other mobile terminal is explosive growth, but its security can not guarantee, the report that constantly has user to suffer a loss.Tracing it to its cause, is mainly the attack that traditional numerical ciphers (for example bank by 6 bit digital as password) is very easily subject to hacker or fishing website, obtains easily user cipher.The security that how to crack mobile payment just becomes urgent problem instantly.
In addition, the quantity such as present various bank cards, credit card, consumption card, Payment Card are huge, and it is all 6 or long number composition that individual usually has the many all kinds of cards of quantity, its password, is difficult to remember, very large to the management difficulty of these passwords.Therefore, be also badly in need of finding alternative method.
Summary of the invention
Object of the present invention is exactly to provide a kind of hand-written arbitrary graphic cryptographic methods for payment system in order to overcome the defect of above-mentioned prior art existence, and the method has solved traditional cryptosecurity insufficient strength and password is difficult to memory and the problem of managing.
Object of the present invention can be achieved through the following technical solutions:
For a hand-written arbitrary graphic cryptographic methods for payment system, the method be take touch-screen as graphical passwords input equipment, comprises password setting steps and password authentification step, and described password setting steps comprises:
A1) touch-screen receives the hand-written arbitrary graphic of user's input;
A2) payment system is carried out feature extraction and coding to the handwritten patterns of input, saves as analysis result A;
A3) touch-screen receives the handwritten patterns of user's input again;
A4) payment system is carried out feature extraction and coding to the handwritten patterns of input for the second time, saves as analysis result B;
A5) payment system compares analysis result A and B, and if the validity of judgement graphical passwords input, effectively, communicates and encrypts the rear graphical passwords that forms encoding of graphs, is saved to the data center of payment system, if invalid, returns to step a1);
Described password authentification step comprises:
B1) touch-screen receives the handwritten patterns of user's input;
B2) payment system is carried out feature extraction and coding to the handwritten patterns of input, encoding of graphs is communicated to encryption, and transfer to data center, the graphical passwords of Jiang Qiyu data center is compared, judge whether identical, if, be verified, if not, checking is not passed through.
Described handwritten patterns is carried out to feature extraction be specially: the stroke of handwritten patterns is decomposed to extraction, obtain the topological relation structure of figure.
Described is encoded to handwritten patterns: the feature of extracting is encoded, be converted into 0 and 1 binary sequence.
Described encodes and is specially handwritten patterns: the figure of input is numbered decomposing each line segment obtaining by input sequencing, its decimal sequence is converted into binary sequence.
When described comparison analysis result A and B, judge that whether two topological relation structures in analysis result are consistent, if so, effective, if not, invalid.
Described hand-written arbitrary graphic consists of one or more figures.
Described touch-screen is the touch-screen that terminal carries.
Described terminal comprises mobile phone, panel computer or the terminal touch screen for paying.
Compared with prior art, the present invention adopts arbitrary graphic as password, there is the advantages such as Cipher Strength infinity, password be directly perceived easy to remember, utilize existing handset touch panel or other terminal touch screen as input equipment simultaneously, without extra equipment investment, greatly reduced user to the memory of various Payment Card passwords and management.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of graphical passwords setting steps of the present invention;
Fig. 2 is the schematic flow sheet of graphical passwords verification step of the present invention;
Fig. 3 is that initial graphics password arranges schematic diagram;
Wherein, Fig. 3 (a) is tablet pattern for the first time, and Fig. 3 (b) is tablet pattern for the second time;
Fig. 4 is the graphical passwords example that single figure forms;
Wherein, Fig. 4 (a) figure can be remembered for " 4 leaf tree "; Fig. 4 (b) figure can remember for certainly wound " name,, word; Fig. 4 (c) figure can be remembered for " people's face " and adds two angles; Fig. 4 (d) figure can be remembered for " cocked hat "; Fig. 4 (e) figure can be remembered for " 6 window room "; Fig. 4 (f) figure can be remembered for " wheel exterior feature+HI ";
Fig. 5 is the graphical passwords example that a plurality of figures form;
Wherein, Fig. 5 (a) graphical passwords is a plant name; Fig. 5 (b) graphical passwords is a character string; Fig. 5 (c) graphical passwords is the combination of 3 figures; Fig. 5 (d) graphical passwords is a mathematic formula;
Fig. 6 is that figure stroke is done the result that straight-line segment decomposes;
Fig. 7 is the coding schematic diagram of handwritten patterns password;
Fig. 8 is example that graphical passwords is verified and unsanctioned;
Wherein, Fig. 8 (a), Fig. 8 (d) they are original figure password, Fig. 8 (b), Fig. 8 (e) figure for being verified, and Fig. 8 (c), Fig. 8 (f) they are the unsanctioned figure of checking.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.The present embodiment be take technical solution of the present invention and is implemented as prerequisite, provided detailed embodiment and concrete operating process, but protection scope of the present invention is not limited to following embodiment.
A kind of hand-written arbitrary graphic cryptographic methods for payment system, it is graphical passwords input equipment that the method be take mobile phone, panel computer or other touch-screens carrying for payment terminal, the figure being comprised of the hand-written one or more patterns of user, as password, improves encryption strength, easy to use.As scheme as shown in I-Fig. 2, the method specifically comprises password setting steps and password authentification step.
(1) initial password setting: touch-screen receives the hand-written arbitrary graphic of user's input, payment system is by carrying out feature extraction and coding to the handwritten patterns of input, the Stroke decomposition of the geometric configuratioies such as straight line, curve, arbitrary polygon, circle is extracted, extract its stroke information and graph topology relational structure, save as analysis result A.Touch-screen receives the handwritten patterns of user input again, and whether system is carried out identical feature extraction and coding to tablet pattern, saves as analysis result B, and itself and analysis result A are compared, consistent to determine twice tablet pattern topological structure.If consistent, encoding of graphs is communicated and encrypts the rear graphical passwords that forms, be saved to the data center of payment system.Communication encrypting method can be free from existing encryption method.
Comparison is mainly that the topological relation of graphic structure is carried out, the feature size of like this user being inputted, and stroke length, degree of tilt has certain tolerance.
Fig. 3 has provided the figure of twice input of an initial graphics password, and its shape is identical with topological structure, and this initial password has obtained the approval of system.
(2) arranging of single graphical passwords generally followed simple principle easy to remember, can be pattern, word (comprising the word from wound), contour of object etc., and object adds the combination of word.Fig. 4 has provided the example of some graphical passwords.
(3) arranging of the password that a plurality of figures form generally also should be followed the simple principle that is easy to association easy to remember, can be animals and plants name, place name, building name, name etc., can be also character string, the combination of several figures, can also be mathematic formula, as shown in Figure 5.
(4) feature extraction of handwritten patterns password: the figure of input is done to straight-line segment by input sequencing to each stroke and decompose, as shown in Figure 6.
(5) a kind of method of the feature coding of handwritten patterns password is, each line segment that the figure of input is obtained Stroke decomposition by input sequencing is encoded.As shown in Figure 7, coding can carry out in the steps below:
A) take the screen upper left corner as true origin, find out the outer rim of current figure;
B) this figure is cut out along outer rim;
C) be normalized to the image (as 200 * 200) of a fixed measure;
D) take Fig. 7 upper left corner as true origin, the coordinate of line segment 1-5 is obtained, its decimal system coordinate figure is converted into scale-of-two coordinate figure.
(6) verification method of handwritten patterns password: the handwritten patterns to input when verifying, by (4) described feature extraction, then feature is encoded, the binary sequence after coding is communicated to encryption, encryption method can be selected Standard Encryption algorithm, also can designed, designed cryptographic algorithm.Binary sequence after encrypting is transferred to data processing centre (DPC), after deciphering, obtains the feature coding of figure.By the feature coding comparison of the initial password of feature coding and storage center, judge whether it is correct graphical passwords.Fig. 8 has provided example and the graphical passwords that a graphical passwords is verified and has verified unsanctioned example.In figure, 8 (a), 8 (d) are the graphical passwords of original start, and 8 (b), 8 (e) are the graphical passwords being verified, and 8 (c), 8 (f) are the unsanctioned graphical passwords of checking.

Claims (8)

1. for a hand-written arbitrary graphic cryptographic methods for payment system, it is characterized in that, the method be take touch-screen as graphical passwords input equipment, comprises password setting steps and password authentification step, and described password setting steps comprises:
A1) touch-screen receives the hand-written arbitrary graphic of user's input;
A2) payment system is carried out feature extraction and coding to the handwritten patterns of input, saves as analysis result A;
A3) touch-screen receives the handwritten patterns of user's input again;
A4) payment system is carried out feature extraction and coding to the handwritten patterns of input for the second time, saves as analysis result B;
A5) payment system compares analysis result A and B, and if the validity of judgement graphical passwords input, effectively, communicates and encrypts the rear graphical passwords that forms encoding of graphs, is saved to the data center of payment system, if invalid, returns to step a1);
Described password authentification step comprises:
B1) touch-screen receives the handwritten patterns of user's input;
B2) payment system is carried out feature extraction and coding to the handwritten patterns of input, encoding of graphs is communicated to encryption, and transfer to data center, the graphical passwords of Jiang Qiyu data center is compared, judge whether identical, if, be verified, if not, checking is not passed through.
2. a kind of hand-written arbitrary graphic cryptographic methods for payment system according to claim 1, it is characterized in that, described handwritten patterns is carried out to feature extraction be specially: the stroke of handwritten patterns is decomposed to extraction, obtain the topological relation structure of figure.
3. a kind of hand-written arbitrary graphic cryptographic methods for payment system according to claim 2, is characterized in that, described is encoded to handwritten patterns: the feature of extracting is encoded, be converted into 0 and 1 binary sequence.
4. a kind of hand-written arbitrary graphic cryptographic methods for payment system according to claim 3, it is characterized in that, described encodes and is specially handwritten patterns: the figure of input is numbered decomposing each line segment obtaining by input sequencing, its decimal sequence is converted into binary sequence.
5. a kind of hand-written arbitrary graphic cryptographic methods for payment system according to claim 2, is characterized in that, when described comparison analysis result A and B, judge that whether two topological relation structures in analysis result are consistent, if so, effective, if not, invalid.
6. a kind of hand-written arbitrary graphic cryptographic methods for payment system according to claim 1, is characterized in that, described hand-written arbitrary graphic consists of one or more figures.
7. a kind of hand-written arbitrary graphic cryptographic methods for payment system according to claim 1, is characterized in that, described touch-screen is the touch-screen that terminal carries.
8. a kind of hand-written arbitrary graphic cryptographic methods for payment system according to claim 7, is characterized in that, described terminal comprises mobile phone, panel computer or the terminal touch screen for paying.
CN201310661652.5A 2013-12-09 2013-12-09 Any handwriting graphical password method used for payment system Expired - Fee Related CN103632070B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310661652.5A CN103632070B (en) 2013-12-09 2013-12-09 Any handwriting graphical password method used for payment system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310661652.5A CN103632070B (en) 2013-12-09 2013-12-09 Any handwriting graphical password method used for payment system

Publications (2)

Publication Number Publication Date
CN103632070A true CN103632070A (en) 2014-03-12
CN103632070B CN103632070B (en) 2017-04-12

Family

ID=50213109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310661652.5A Expired - Fee Related CN103632070B (en) 2013-12-09 2013-12-09 Any handwriting graphical password method used for payment system

Country Status (1)

Country Link
CN (1) CN103632070B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886244A (en) * 2014-03-18 2014-06-25 上海分维智能科技有限公司 Method for conducting any graphical password handwriting for intelligent terminal starting-up system
CN105631267A (en) * 2015-12-26 2016-06-01 深圳市金立通信设备有限公司 Password check method and terminal
CN104135676B (en) * 2014-08-14 2017-04-05 诚迈科技(南京)股份有限公司 The method that business is paid is realized using figure destructing
CN108009419A (en) * 2017-11-24 2018-05-08 咪咕文化科技有限公司 Authentication method and device of graphic password and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020062217A1 (en) * 1996-11-01 2002-05-23 Junichi Fujimori System and method for preventing unauthorized data copying using communication network
CN1534445A (en) * 2003-03-31 2004-10-06 联想(北京)有限公司 Method of cipher setting and safety identification
CN103116750A (en) * 2013-03-14 2013-05-22 深圳市共进电子股份有限公司 Pattern identification authentication method capable of faintly matching

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020062217A1 (en) * 1996-11-01 2002-05-23 Junichi Fujimori System and method for preventing unauthorized data copying using communication network
CN1534445A (en) * 2003-03-31 2004-10-06 联想(北京)有限公司 Method of cipher setting and safety identification
CN103116750A (en) * 2013-03-14 2013-05-22 深圳市共进电子股份有限公司 Pattern identification authentication method capable of faintly matching

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886244A (en) * 2014-03-18 2014-06-25 上海分维智能科技有限公司 Method for conducting any graphical password handwriting for intelligent terminal starting-up system
CN104135676B (en) * 2014-08-14 2017-04-05 诚迈科技(南京)股份有限公司 The method that business is paid is realized using figure destructing
CN105631267A (en) * 2015-12-26 2016-06-01 深圳市金立通信设备有限公司 Password check method and terminal
CN108009419A (en) * 2017-11-24 2018-05-08 咪咕文化科技有限公司 Authentication method and device of graphic password and storage medium
CN108009419B (en) * 2017-11-24 2020-12-22 咪咕文化科技有限公司 Authentication method and device of graphic password and storage medium

Also Published As

Publication number Publication date
CN103632070B (en) 2017-04-12

Similar Documents

Publication Publication Date Title
CN110390191A (en) Method and system for safe biologic identification verifying
CN102638790A (en) Password control method, device and system
WO2014188210A1 (en) User authentication system and method
CN102223233A (en) Biological code authentication system and biological code authentication method
CN103632070A (en) Any handwriting graphical password method used for payment system
CN1523809A (en) Password variable identification verification technique
CN104023332B (en) A kind of electric terminal and its SMS encryption, decryption method
CN106204038A (en) The method and device that a kind of password string generates
CN104102868A (en) Multi-modal USB key authentication method based on face recognition technology
CN105897417A (en) Encrypted data input method and encrypted data input device
CN103118201A (en) System and method for unlocking touch screen
CN103106714B (en) Based on method for unlocking and the system of hand-held terminal device PDA and fingerprint identification technology
CN102185696B (en) Mobile phone user authentication method without trusted third party on basis of handwriting characteristics
CN204759430U (en) Random cipher input device
CN107403088A (en) Password identification method and device
CN105653054B (en) A kind of cipher processing method and device
US20160300416A1 (en) Electronic Lock and Verification Method for Unlocking the Same
CN104636677A (en) Data safety storage method based on privacy protection
KR101392537B1 (en) User memory method using plural one time password
CN105187219A (en) Method for preventing tampering of identity information in real name authentication
CN102684920A (en) User permission management system
CN103886244A (en) Method for conducting any graphical password handwriting for intelligent terminal starting-up system
CN104376236A (en) Scheme self-adaptive digital watermark embedding and extracting method based on camouflage technology
CN103873232A (en) Generation method for biologic key of user chirography on touch screen
CN205176929U (en) Bank card theftproof brush control management device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170412

Termination date: 20191209

CF01 Termination of patent right due to non-payment of annual fee