CN103810415B - A kind of graphical passwords guard method - Google Patents
A kind of graphical passwords guard method Download PDFInfo
- Publication number
- CN103810415B CN103810415B CN201410040065.9A CN201410040065A CN103810415B CN 103810415 B CN103810415 B CN 103810415B CN 201410040065 A CN201410040065 A CN 201410040065A CN 103810415 B CN103810415 B CN 103810415B
- Authority
- CN
- China
- Prior art keywords
- coordinate points
- fundamental
- graphical passwords
- geometric
- points
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Abstract
A kind of graphical passwords guard method, method to set up including graphical passwords, the verification method of graphical passwords, the method to set up of graphical passwords is that several that first select on the display interface of processor display preset a geometric wherein width as the fundamental figure of graphical passwords, and this fundamental figure is set as the first graphical passwords, then change fundamental figure structure to form amended figure, again this amended figure is set as second graph password, the verification method of graphical passwords is that a width geometric figure and first graphical passwords of display on display interface are first compared by user, comparison by this geometric structure of rear change to form tablet pattern, and confirm to input this tablet pattern as checking password.The design not only improves the safety of password, and simple and efficient to handle.
Description
Technical field
The present invention relates to a kind of cipher code protection method, particularly relate to a kind of graphical passwords guard method, it is particularly applicable to improve the safety of password, simplify operation.
Background technology
It is currently used for the cryptographic system of the device of computer or mobile device etc, its input type mostly is keyboard entry method, and mostly use character input, the radix of this cryptographic system is simple, and the base character Gong choosing is identical, it is easily caused the appearance of problems with: be first safety problem, mainly show as personation, steal, can there is basic input dialogue frame in fake site, when user inputs, account and password will be stolen, simultaneously, user is carrying out password authentification with the input of character type numeral when, it is easy to stolen by trojan horse program;Next to that operational issue; owing to digital verification is easier to be cracked; user is in order to improve Account Guard rank; the longest character type password would generally be set, need input for a long time during checking password, it is impossible to simply, operate efficiently; additionally; when mobile devices such as utilizing smart mobile phone operates, user is more convenient for using the mode of touch input to operate, and the mode of input through keyboard is the most applicable.
Chinese patent application publication No. is CN10930509A, and Shen Qing Publication day is that in December, 2010 patent of invention of 29 days discloses a kind of cipher code protection method, comprises the steps: to show at least one graphics field on display interface with presets;The angle parameter that record produces because graphics field is carried out user rotation process, generates input information;Receive the confirmation operation of user;Respond this confirmation operation, the input information of generation being compared with the encrypted message preset, carry out password authentification, this method is by the data of transmission then to use graphical representation, belong to the mode utilizing safety cabinet password authentification principle a kind of to verify numeral, actually verify or the compatibility of many group numerals.
Chinese patent application publication No. is CN102243754A, Shen Qing Publication day is that the patent of invention on November 16th, 2011 discloses a kind of method and apparatus generating secret value, the method comprises the following steps: display includes the initial pictures of multiple graphic element, and each graphic element has at least two modification;Repeatedly receive user to input to select the modification of several the plurality of graphic elements, thus generate the image of amendment;From the modification of selected graphic element, at least generate secret value, although this method belongs to the category of image authentication, but the image needing checking must be prestored in mobile phone or equipment, otherwise when checking, carry out operating extremely complex, need time the longest, and if lost mobile phone or unauthorized people operation, this image password is easy to be stolen.
Summary of the invention
It is an object of the invention to overcome the problem that cipher safety is relatively low, operation is complicated present in prior art, it is provided that the graphical passwords guard method that a kind of safety is higher, easy and simple to handle.
For realizing object above, technical scheme is as follows:
A kind of graphical passwords guard method, the method includes the verification method of the method to set up of graphical passwords, graphical passwords;
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction that graphical passwords is set to processor, then shown several default geometric figures by processor on its display interface according to this instruction;
A2: on selected display interface, a wherein width geometric figure of display is as the fundamental figure of graphical passwords, and this fundamental figure is set as the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as second graph password, now, complete the setting of graphical passwords, wherein, at least one during the structure of described change fundamental figure includes the point on the point dragging on fundamental figure, connection fundamental figure operates.
Described geometric figure is to be positioned at the plane in coordinate dot matrix or solid geometry figure.
At least one operation that point on described dragging fundamental figure includes the end points dragging on fundamental figure, drags on fundamental figure in the coordinate points of non-end points.
End points on described dragging fundamental figure includes at least 1 basic operation, this basic operation refers to: drag the end point of arbitrary line segment on fundamental figure at a coordinate points in coordinate dot matrix, now, the former line segment at end points place is connected the new line segment formed replaced by another end points and a coordinate points of former line segment.
On described dragging fundamental figure, the coordinate points of non-end points includes at least one operation dragging the coordinate points of non-end points on the curve of fundamental figure, dragging on the straightway of fundamental figure in the coordinate points of non-end points.
On the curve of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation, this basic operation refers to: first selectes and is positioned at No. two coordinate points non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points, then No. four coordinate points between No. two coordinate points, No. three coordinate points are dragged on this curve at No. five coordinate points in coordinate dot matrix, now, the curved section this curve being end points with No. two coordinate points, No. three coordinate points is replaced by the broken line being sequentially connected with No. two coordinate points, No. five coordinate points, No. three coordinate points are formed.
On the straightway of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation, this basic operation refers to: at No. six coordinate points in the non-extreme coordinates point on arbitrary straightway of dragging fundamental figure to coordinate dot matrix, now, the broken line with No. six coordinate points as break is formed between two-end-point and No. six coordinate points on this straightway, and the former line segment at non-extreme coordinates point place is replaced by described broken line, wherein, No. six coordinate points are positioned at outside the former line segment at non-extreme coordinates point place.
Point on described connection fundamental figure includes at least 1 basic operation, and this basic operation refers to: first chooses No. seven coordinate points being positioned on different line segment, No. eight coordinate points on fundamental figure, then connects No. seven coordinate points, No. eight coordinate points.
The verification method of described graphical passwords comprises the following steps successively:
The first step is verified: user first sends the instruction of verification pattern password to processor, on its display interface, a width geometric figure is shown according to this instruction again by processor, then this geometric figure and the first graphical passwords are compared by user, if this geometric figure and the first graphical passwords are unanimously, enter second step checking, if this geometric figure and the first graphical passwords are inconsistent, stop checking;
Second step is verified: on change display interface, geometric structure is to form tablet pattern, and confirm to input this tablet pattern as checking password, then this tablet pattern is compared by processor with second graph password, if tablet pattern is consistent with graphical passwords, password authentification is passed through in prompting, if tablet pattern is inconsistent with second graph password, prompt cipher authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure includes dragging the point on geometric figure, connect at least one operation in the point on geometric figure.
Compared with prior art, the invention have the benefit that
1, in the present invention a kind of graphical passwords guard method, the method to set up of graphical passwords includes selecting a width to preset the fundamental figure as graphical passwords of the geometric figure within a processor, and this fundamental figure is set as the first graphical passwords, then the point dragged and/or connect on fundamental figure is to form amended figure, again using this amended figure as second graph password, this method is not only with the mode of contrast geometric figure structure, trojan horse program is made to be difficult to steal this password, and revise the easy and simple to handle of fundamental figure by the point dragged and/or connect on fundamental figure, fast, easily memory, simultaneously, geometric structure is with countless changes many, it is difficult to be hypothesized or crack, safety is the highest.Therefore, the present invention is not only effectively increased the safety of password, and easy and simple to handle, quick.
2, in the guard method of a kind of graphical passwords of the present invention, geometric figure is the closed figure being positioned in coordinate dot matrix, and this design makes user can judge shift position accurately when dragging geometry, it is ensured that the accuracy of operation.Therefore, this invention ensures that the accuracy of operation.
3, in the guard method of a kind of graphical passwords of the present invention, the verification method of graphical passwords includes that processor shows a width geometric figure according to password authentification instruction on its display interface; then this geometric figure and the first graphical passwords are compared by user; if this geometric figure and the first graphical passwords are inconsistent, stop checking; this operation allows users to the most unanimously judge to verify whether interface is fake site according to geometric figure and first graphical passwords of display on display interface, thus produces the effect stopping personation.Therefore, in the present invention, the verification method of graphical passwords can stop personation.
Accompanying drawing explanation
Fig. 1 is the geometric structural representation shown on display interface in step A1 of the present invention.
Fig. 2 is the structural representation of the first graphical passwords in the present invention.
Fig. 3 is the structural representation of second graph password in the embodiment of the present invention 1.
Fig. 4 is the structural representation of second graph password in the embodiment of the present invention 2.
Fig. 5 is the structural representation of second graph password in the embodiment of the present invention 3.
Fig. 6 is the structural representation of second graph password in the embodiment of the present invention 4.
In figure: 1, coordinate points B2 of terminal B, No. two coordinate points a, No. three coordinate points b, No. four coordinate points c, No. five coordinate points d, curved section ab, broken line adb, non-extreme coordinates point C1, No. six coordinate points C2, No. seven coordinate points D1, No. eight coordinate points D2.
Detailed description of the invention
The present invention is further detailed explanation with detailed description of the invention in explanation below in conjunction with the accompanying drawings.
Seeing Fig. 1 Fig. 6, a kind of graphical passwords guard method, the method includes the verification method of the method to set up of graphical passwords, graphical passwords;
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction that graphical passwords is set to processor, then shown several default geometric figures by processor on its display interface according to this instruction;
A2: on selected display interface, a wherein width geometric figure of display is as the fundamental figure of graphical passwords, and this fundamental figure is set as the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as second graph password, now, complete the setting of graphical passwords, wherein, at least one during the structure of described change fundamental figure includes the point on the point dragging on fundamental figure, connection fundamental figure operates.
Described geometric figure is to be positioned at the plane in coordinate dot matrix or solid geometry figure.
At least one operation that point on described dragging fundamental figure includes the end points dragging on fundamental figure, drags on fundamental figure in the coordinate points of non-end points.
End points on described dragging fundamental figure includes at least 1 basic operation, this basic operation refers to: drag the end point B1 of arbitrary line segment on fundamental figure at coordinate points B2 in coordinate dot matrix, now, the former line segment at terminal B 1 place is connected the new line segment formed replaced by another end points and coordinate points B2 of former line segment.
On described dragging fundamental figure, the coordinate points of non-end points includes at least one operation dragging the coordinate points of non-end points on the curve of fundamental figure, dragging on the straightway of fundamental figure in the coordinate points of non-end points.
On the curve of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation, this basic operation refers to: first selectes and is positioned at No. two coordinate points a non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points b, then drag and on this curve, be positioned at No. two coordinate points a, No. four coordinate points c between No. three coordinate points b are at No. five coordinate points d in coordinate dot matrix, now, with No. two coordinate points a on this curve, No. three coordinate points b are that the curved section ab of end points is sequentially connected with No. two coordinate points a, No. five coordinate points d, the broken line adb replacement that No. three coordinate points b are formed.
On the straightway of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation, this basic operation refers to: at No. six coordinate points C2 in the non-extreme coordinates point C1 on arbitrary straightway of dragging fundamental figure to coordinate dot matrix, now, the broken line with No. six coordinate points C2 as break is formed between two-end-point and No. six coordinate points C2 on this straightway, and the former line segment at non-extreme coordinates point C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-extreme coordinates point C1 place.
Point on described connection fundamental figure includes at least 1 basic operation, and this basic operation refers to: first No. seven coordinate points D1 being positioned on different line segment, No. eight coordinate points D2 first chosen on fundamental figure, then connects No. seven coordinate points D1, No. eight coordinate points D2.
The verification method of described graphical passwords comprises the following steps successively:
The first step is verified: user first sends the instruction of verification pattern password to processor, on its display interface, a width geometric figure is shown according to this instruction again by processor, then this geometric figure and the first graphical passwords are compared by user, if this geometric figure and the first graphical passwords are unanimously, enter second step checking, if this geometric figure and the first graphical passwords are inconsistent, stop checking;
Second step is verified: on change display interface, geometric structure is to form tablet pattern, and confirm to input this tablet pattern as checking password, then this tablet pattern is compared by processor with second graph password, if tablet pattern is consistent with graphical passwords, password authentification is passed through in prompting, if tablet pattern is inconsistent with second graph password, prompt cipher authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure includes dragging the point on geometric figure, connect at least one operation in the point on geometric figure.
The principle of the present invention is described as follows:
Due under conditions of there is no coordinate background, carry out when password authentification dragging or connect the problem that the processing ease of point on fundamental figure occurs to be dragged to accurately arrange site by point, the most easily forget to arrange site simultaneously, therefore geometric figure is placed in coordinate dot matrix by the present invention, user can accurately find when adjusting fundamental figure structure and arrange site, not only achieve and be accurately positioned, also allow for operation, it is particularly well-suited to handset touch panel, it addition, the number that the coordinate in coordinate dot matrix is counted can be adjusted according to the demand of different user.
When fundamental figure includes curvilinear structures, drag operation in the present invention needs first selected No. two non-adjacent coordinate points a on curve, No. three coordinate points b, so that it is determined that with No. two coordinate points a, No. three coordinate points b are the curved section ab variable section as this curve of end points, then drag and on this curve, be positioned at No. two coordinate points a, No. four coordinate points c between No. three coordinate points b are at No. five coordinate points d in coordinate dot matrix, now, curved section ab as variable section will become being sequentially connected with No. two coordinate points a, No. five coordinate points d, the broken line adb that No. three coordinate points b are formed.
In the verification method of graphical passwords of the present invention, first step checking uses the mode that user will show on the display interface of processor that a width geometric figure and the first graphical passwords are compared, if this geometric figure and the first graphical passwords are inconsistent, show to verify that interface is fake site, if this geometric figure and the first graphical passwords are unanimously, next step checking can be entered, therefore user can clearly judge by which to verify whether interface is fake site, thus improves the safety of password authentification.
Embodiment 1:
Seeing Fig. 1, Fig. 2, Fig. 3, a kind of graphical passwords guard method, the method includes that the verification method of the method to set up of graphical passwords, graphical passwords, the method to set up of described graphical passwords comprise the following steps successively:
A1: first sending the instruction arranging graphical passwords to processor, then shown several default geometric figures by processor on its display interface according to this instruction, wherein, described geometric figure is to be positioned at the plane in coordinate dot matrix or solid geometry figure;
A2: on selected display interface, a wherein width geometric figure of display is as the fundamental figure of graphical passwords, and this fundamental figure is set as the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as second graph password, now, complete the setting of graphical passwords, wherein, the structure of described change fundamental figure is following operation: drag the end point B1 of arbitrary line segment on fundamental figure to the coordinate points B2 place in coordinate dot matrix, and now, the former line segment at terminal B 1 place is replaced by the new line segment formed by another end points and coordinate points B2 connection of former line segment.
The verification method of described graphical passwords comprises the following steps successively:
The first step is verified: user first sends the instruction of verification pattern password to processor, on its display interface, a width geometric figure is shown according to this instruction again by processor, then this geometric figure and the first graphical passwords are compared by user, if this geometric figure and the first graphical passwords are unanimously, enter second step checking, if this geometric figure and the first graphical passwords are inconsistent, stop checking;
Second step is verified: on change display interface, geometric structure is to form tablet pattern, and confirm to input this tablet pattern as checking password, then this tablet pattern is compared by processor with second graph password, if tablet pattern is consistent with graphical passwords, password authentification is passed through in prompting, if tablet pattern is inconsistent with second graph password, prompt cipher authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure is following operation: drag the end point B1 of arbitrary line segment on geometric figure at coordinate points B2 in coordinate dot matrix, now, the former line segment at terminal B 1 place is connected the new line segment formed replaced by another end points and coordinate points B2 of former line segment.
Embodiment 2:
Seeing Fig. 1, Fig. 2, Fig. 4, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: first selectes and is positioned at No. two coordinate points a non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points b, then No. four coordinate points c between No. two coordinate points a, No. three coordinate points b are dragged on this curve at No. five coordinate points d in coordinate dot matrix, now, the curved section ab this curve being end points with No. two coordinate points a, No. three coordinate points b is replaced by the broken line adb being sequentially connected with No. two coordinate points a, No. five coordinate points d, No. three coordinate points b are formed;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: first chooses and is positioned at No. two coordinate points a non-adjacent on geometric arbitrary curve, No. three coordinate points b, then No. four coordinate points c between No. two coordinate points a, No. three coordinate points b are dragged on this curve at No. five coordinate points d in coordinate dot matrix, now, the curved section ab this curve being end points with No. two coordinate points a, No. three coordinate points b is replaced by the broken line adb being sequentially connected with No. two coordinate points a, No. five coordinate points d, No. three coordinate points b are formed.
Embodiment 3:
Seeing Fig. 1, Fig. 2, Fig. 5, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: at No. six coordinate points C2 in the non-extreme coordinates point C1 on arbitrary straightway of dragging fundamental figure to coordinate dot matrix, now, the broken line with No. six coordinate points C2 as break is formed between two-end-point and No. six coordinate points C2 on this straightway, and the former line segment at non-extreme coordinates point C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-extreme coordinates point C1 place;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: drag non-extreme coordinates point C1 on geometric arbitrary straightway at No. six coordinate points C2 in coordinate dot matrix, now, the broken line with No. six coordinate points C2 as break is formed between two-end-point and No. six coordinate points C2 on this straightway, and the former line segment at non-extreme coordinates point C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-extreme coordinates point C1 place.
Embodiment 4:
Seeing Fig. 1, Fig. 2, Fig. 6, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: first chooses on fundamental figure and is positioned at different No. seven coordinate points D1 of line segment, No. eight coordinate points D2, then connects No. seven coordinate points D1, No. eight coordinate points D2;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: first chooses on geometric figure and is positioned at different No. seven coordinate points D1 of line segment, No. eight coordinate points D2, then connects No. seven coordinate points D1, No. eight coordinate points D2.
Claims (9)
1. a graphical passwords guard method, the method includes the verification method of the method to set up of graphical passwords, graphical passwords, it is characterised in that:
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction that graphical passwords is set to processor, then shown several default geometric figures by processor on its display interface according to this instruction;
A2: on selected display interface, a wherein width geometric figure of display is as the fundamental figure of graphical passwords, and this fundamental figure is set as the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as second graph password, now, complete the setting of graphical passwords, wherein, at least one during the structure of described change fundamental figure includes the point on the point dragging on fundamental figure, connection fundamental figure operates.
A kind of graphical passwords guard method the most according to claim 1, it is characterised in that: described geometric figure is to be positioned at the plane in coordinate dot matrix or solid figure.
A kind of graphical passwords guard method the most according to claim 2, it is characterised in that: at least one operation that the point on described dragging fundamental figure includes the end points dragging on fundamental figure, drags on fundamental figure in the coordinate points of non-end points.
A kind of graphical passwords guard method the most according to claim 3; it is characterized in that: the end points on described dragging fundamental figure includes at least 1 basic operation; this basic operation refers to: drag the end point (B1) of arbitrary line segment on fundamental figure to coordinate points (B2) place in coordinate dot matrix; now, the former line segment at end points (B1) place is connected the new line segment formed replaced by another end points and a coordinate points (B2) of former line segment.
A kind of graphical passwords guard method the most according to claim 3, it is characterised in that: on described dragging fundamental figure, the coordinate points of non-end points includes at least one operation dragging the coordinate points of non-end points on the curve of fundamental figure, dragging on the straightway of fundamental figure in the coordinate points of non-end points.
A kind of graphical passwords guard method the most according to claim 5, it is characterized in that: on the curve of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation, this basic operation refers to: first selectes and is positioned at No. two coordinate points (a) non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points (b), then drag and on this curve, be positioned at No. two coordinate points (a), No. four coordinate points (c) between No. three coordinate points (b) are to No. five coordinate points (d) places in coordinate dot matrix, now, with No. two coordinate points (a) on this curve, No. three coordinate points (b) are that the curved section (ab) of end points is sequentially connected with No. two coordinate points (a), No. five coordinate points (d), broken line (adb) replacement that No. three coordinate points (b) are formed.
A kind of graphical passwords guard method the most according to claim 5; it is characterized in that: on the straightway of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation; this basic operation refers to: No. six coordinate points (C2) places in non-extreme coordinates point (C1) on arbitrary line segment of dragging fundamental figure to coordinate dot matrix; now; the former line segment at non-extreme coordinates point (C1) place is replaced with No. six coordinate points (C2) broken line as break; wherein, No. six coordinate points (C2) are positioned at outside the former line segment at non-extreme coordinates point (C1) place.
A kind of graphical passwords guard method the most according to claim 2; it is characterized in that: the point on described connection fundamental figure includes at least 1 basic operation; this basic operation refers to: first chooses on fundamental figure and is positioned at different No. seven coordinate points (D1) of line segment, No. eight coordinate points (D2), then connects No. seven coordinate points (D1), No. eight coordinate points (D2).
9. according to a kind of graphical passwords guard method according to any one of claim 18, it is characterised in that the verification method of described graphical passwords comprises the following steps successively:
The first step is verified: user first sends the instruction of verification pattern password to processor, on its display interface, a width geometric figure is shown according to this instruction again by processor, then this geometric figure and the first graphical passwords are compared by user, if this geometric figure and the first graphical passwords are unanimously, enter second step checking, if this geometric figure and the first graphical passwords are inconsistent, stop checking;
Second step is verified: on change display interface, geometric structure is to form tablet pattern, and confirm to input this tablet pattern as checking password, then this tablet pattern is compared by processor with second graph password, if tablet pattern is consistent with second graph password, password authentification is passed through in prompting, if tablet pattern is inconsistent with second graph password, prompt cipher authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure includes dragging the point on geometric figure, connect at least one operation in the point on geometric figure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410040065.9A CN103810415B (en) | 2014-01-28 | 2014-01-28 | A kind of graphical passwords guard method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410040065.9A CN103810415B (en) | 2014-01-28 | 2014-01-28 | A kind of graphical passwords guard method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103810415A CN103810415A (en) | 2014-05-21 |
CN103810415B true CN103810415B (en) | 2016-08-03 |
Family
ID=50707171
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410040065.9A Expired - Fee Related CN103810415B (en) | 2014-01-28 | 2014-01-28 | A kind of graphical passwords guard method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103810415B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104156655B (en) * | 2014-05-28 | 2017-03-08 | 东莞盛世科技电子实业有限公司 | Ambiguity cryptographic check method and cryptographic check equipment |
CN105279424B (en) * | 2015-11-02 | 2020-09-11 | 厦门雅迅网络股份有限公司 | Method and device for identifying strength of graphic password |
CN108009419B (en) * | 2017-11-24 | 2020-12-22 | 咪咕文化科技有限公司 | Authentication method and device of graphic password and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101676926A (en) * | 2008-09-16 | 2010-03-24 | 深圳富泰宏精密工业有限公司 | Touch type electronic equipment and its authority control method |
CN102243754A (en) * | 2010-05-11 | 2011-11-16 | 汤姆森特许公司 | Method and a device for generating a secret value |
CN102279910A (en) * | 2010-06-11 | 2011-12-14 | 鸿富锦精密工业(深圳)有限公司 | Device with encryption and decryption functions and encrypting and decrypting methods of device |
CN102521550A (en) * | 2011-12-09 | 2012-06-27 | 鸿富锦精密工业(深圳)有限公司 | Electronic device with file encryption function and method thereof |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8090201B2 (en) * | 2007-08-13 | 2012-01-03 | Sony Ericsson Mobile Communications Ab | Image-based code |
-
2014
- 2014-01-28 CN CN201410040065.9A patent/CN103810415B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101676926A (en) * | 2008-09-16 | 2010-03-24 | 深圳富泰宏精密工业有限公司 | Touch type electronic equipment and its authority control method |
CN102243754A (en) * | 2010-05-11 | 2011-11-16 | 汤姆森特许公司 | Method and a device for generating a secret value |
CN102279910A (en) * | 2010-06-11 | 2011-12-14 | 鸿富锦精密工业(深圳)有限公司 | Device with encryption and decryption functions and encrypting and decrypting methods of device |
CN102521550A (en) * | 2011-12-09 | 2012-06-27 | 鸿富锦精密工业(深圳)有限公司 | Electronic device with file encryption function and method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN103810415A (en) | 2014-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5345850B2 (en) | Method and apparatus for securely entering password or PIN by scrolling mouse wheel | |
US9507928B2 (en) | Preventing the discovery of access codes | |
US8650635B2 (en) | Pressure sensitive multi-layer passwords | |
CN104834449B (en) | The icon management method and device of mobile terminal | |
CN106888202B (en) | Authorized login method and device | |
US20160127134A1 (en) | User authentication system and method | |
US20150100913A1 (en) | Method for providing personalized virtual keyboard | |
CN103929306A (en) | Intelligent secret key device and information management method of intelligent secret key device | |
US8635676B2 (en) | Visual or touchscreen password entry | |
TW201539247A (en) | Password input and verification method and system thereof | |
CN103996011A (en) | Method and device for protecting codes to be input safely | |
CN103905188A (en) | Method for generating dynamic password through intelligent secret key device, and intelligent secret key device | |
CN106355059A (en) | Password input method and terminal | |
CN103136462B (en) | A kind of method and system of password authentification | |
CN103810415B (en) | A kind of graphical passwords guard method | |
KR20090036820A (en) | Hacking protection input system and method of the virtual keyboard | |
CN104866129A (en) | Computing device and password input method thereof | |
CN107967422A (en) | One kind verification implementation method and electric terminal | |
CN104680376B (en) | A kind of Transaction Information verification method and device | |
CN101561714B (en) | Group password input method | |
CN105653054A (en) | Code processing method and apparatus | |
CN106302344B (en) | Security sweep method and system | |
CN104021322A (en) | Electronic signature method, electronic signature equipment and electronic signature client | |
CN104346161A (en) | Information processing method and electronic equipment | |
KR101648779B1 (en) | Method for secure text input in information terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160803 Termination date: 20180128 |
|
CF01 | Termination of patent right due to non-payment of annual fee |