CN103810415B - A kind of graphical passwords guard method - Google Patents

A kind of graphical passwords guard method Download PDF

Info

Publication number
CN103810415B
CN103810415B CN201410040065.9A CN201410040065A CN103810415B CN 103810415 B CN103810415 B CN 103810415B CN 201410040065 A CN201410040065 A CN 201410040065A CN 103810415 B CN103810415 B CN 103810415B
Authority
CN
China
Prior art keywords
coordinate points
fundamental
graphical passwords
geometric
points
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410040065.9A
Other languages
Chinese (zh)
Other versions
CN103810415A (en
Inventor
曾立
张弦
曾凡嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410040065.9A priority Critical patent/CN103810415B/en
Publication of CN103810415A publication Critical patent/CN103810415A/en
Application granted granted Critical
Publication of CN103810415B publication Critical patent/CN103810415B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Abstract

A kind of graphical passwords guard method, method to set up including graphical passwords, the verification method of graphical passwords, the method to set up of graphical passwords is that several that first select on the display interface of processor display preset a geometric wherein width as the fundamental figure of graphical passwords, and this fundamental figure is set as the first graphical passwords, then change fundamental figure structure to form amended figure, again this amended figure is set as second graph password, the verification method of graphical passwords is that a width geometric figure and first graphical passwords of display on display interface are first compared by user, comparison by this geometric structure of rear change to form tablet pattern, and confirm to input this tablet pattern as checking password.The design not only improves the safety of password, and simple and efficient to handle.

Description

A kind of graphical passwords guard method
Technical field
The present invention relates to a kind of cipher code protection method, particularly relate to a kind of graphical passwords guard method, it is particularly applicable to improve the safety of password, simplify operation.
Background technology
It is currently used for the cryptographic system of the device of computer or mobile device etc, its input type mostly is keyboard entry method, and mostly use character input, the radix of this cryptographic system is simple, and the base character Gong choosing is identical, it is easily caused the appearance of problems with: be first safety problem, mainly show as personation, steal, can there is basic input dialogue frame in fake site, when user inputs, account and password will be stolen, simultaneously, user is carrying out password authentification with the input of character type numeral when, it is easy to stolen by trojan horse program;Next to that operational issue; owing to digital verification is easier to be cracked; user is in order to improve Account Guard rank; the longest character type password would generally be set, need input for a long time during checking password, it is impossible to simply, operate efficiently; additionally; when mobile devices such as utilizing smart mobile phone operates, user is more convenient for using the mode of touch input to operate, and the mode of input through keyboard is the most applicable.
Chinese patent application publication No. is CN10930509A, and Shen Qing Publication day is that in December, 2010 patent of invention of 29 days discloses a kind of cipher code protection method, comprises the steps: to show at least one graphics field on display interface with presets;The angle parameter that record produces because graphics field is carried out user rotation process, generates input information;Receive the confirmation operation of user;Respond this confirmation operation, the input information of generation being compared with the encrypted message preset, carry out password authentification, this method is by the data of transmission then to use graphical representation, belong to the mode utilizing safety cabinet password authentification principle a kind of to verify numeral, actually verify or the compatibility of many group numerals.
Chinese patent application publication No. is CN102243754A, Shen Qing Publication day is that the patent of invention on November 16th, 2011 discloses a kind of method and apparatus generating secret value, the method comprises the following steps: display includes the initial pictures of multiple graphic element, and each graphic element has at least two modification;Repeatedly receive user to input to select the modification of several the plurality of graphic elements, thus generate the image of amendment;From the modification of selected graphic element, at least generate secret value, although this method belongs to the category of image authentication, but the image needing checking must be prestored in mobile phone or equipment, otherwise when checking, carry out operating extremely complex, need time the longest, and if lost mobile phone or unauthorized people operation, this image password is easy to be stolen.
Summary of the invention
It is an object of the invention to overcome the problem that cipher safety is relatively low, operation is complicated present in prior art, it is provided that the graphical passwords guard method that a kind of safety is higher, easy and simple to handle.
For realizing object above, technical scheme is as follows:
A kind of graphical passwords guard method, the method includes the verification method of the method to set up of graphical passwords, graphical passwords;
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction that graphical passwords is set to processor, then shown several default geometric figures by processor on its display interface according to this instruction;
A2: on selected display interface, a wherein width geometric figure of display is as the fundamental figure of graphical passwords, and this fundamental figure is set as the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as second graph password, now, complete the setting of graphical passwords, wherein, at least one during the structure of described change fundamental figure includes the point on the point dragging on fundamental figure, connection fundamental figure operates.
Described geometric figure is to be positioned at the plane in coordinate dot matrix or solid geometry figure.
At least one operation that point on described dragging fundamental figure includes the end points dragging on fundamental figure, drags on fundamental figure in the coordinate points of non-end points.
End points on described dragging fundamental figure includes at least 1 basic operation, this basic operation refers to: drag the end point of arbitrary line segment on fundamental figure at a coordinate points in coordinate dot matrix, now, the former line segment at end points place is connected the new line segment formed replaced by another end points and a coordinate points of former line segment.
On described dragging fundamental figure, the coordinate points of non-end points includes at least one operation dragging the coordinate points of non-end points on the curve of fundamental figure, dragging on the straightway of fundamental figure in the coordinate points of non-end points.
On the curve of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation, this basic operation refers to: first selectes and is positioned at No. two coordinate points non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points, then No. four coordinate points between No. two coordinate points, No. three coordinate points are dragged on this curve at No. five coordinate points in coordinate dot matrix, now, the curved section this curve being end points with No. two coordinate points, No. three coordinate points is replaced by the broken line being sequentially connected with No. two coordinate points, No. five coordinate points, No. three coordinate points are formed.
On the straightway of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation, this basic operation refers to: at No. six coordinate points in the non-extreme coordinates point on arbitrary straightway of dragging fundamental figure to coordinate dot matrix, now, the broken line with No. six coordinate points as break is formed between two-end-point and No. six coordinate points on this straightway, and the former line segment at non-extreme coordinates point place is replaced by described broken line, wherein, No. six coordinate points are positioned at outside the former line segment at non-extreme coordinates point place.
Point on described connection fundamental figure includes at least 1 basic operation, and this basic operation refers to: first chooses No. seven coordinate points being positioned on different line segment, No. eight coordinate points on fundamental figure, then connects No. seven coordinate points, No. eight coordinate points.
The verification method of described graphical passwords comprises the following steps successively:
The first step is verified: user first sends the instruction of verification pattern password to processor, on its display interface, a width geometric figure is shown according to this instruction again by processor, then this geometric figure and the first graphical passwords are compared by user, if this geometric figure and the first graphical passwords are unanimously, enter second step checking, if this geometric figure and the first graphical passwords are inconsistent, stop checking;
Second step is verified: on change display interface, geometric structure is to form tablet pattern, and confirm to input this tablet pattern as checking password, then this tablet pattern is compared by processor with second graph password, if tablet pattern is consistent with graphical passwords, password authentification is passed through in prompting, if tablet pattern is inconsistent with second graph password, prompt cipher authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure includes dragging the point on geometric figure, connect at least one operation in the point on geometric figure.
Compared with prior art, the invention have the benefit that
1, in the present invention a kind of graphical passwords guard method, the method to set up of graphical passwords includes selecting a width to preset the fundamental figure as graphical passwords of the geometric figure within a processor, and this fundamental figure is set as the first graphical passwords, then the point dragged and/or connect on fundamental figure is to form amended figure, again using this amended figure as second graph password, this method is not only with the mode of contrast geometric figure structure, trojan horse program is made to be difficult to steal this password, and revise the easy and simple to handle of fundamental figure by the point dragged and/or connect on fundamental figure, fast, easily memory, simultaneously, geometric structure is with countless changes many, it is difficult to be hypothesized or crack, safety is the highest.Therefore, the present invention is not only effectively increased the safety of password, and easy and simple to handle, quick.
2, in the guard method of a kind of graphical passwords of the present invention, geometric figure is the closed figure being positioned in coordinate dot matrix, and this design makes user can judge shift position accurately when dragging geometry, it is ensured that the accuracy of operation.Therefore, this invention ensures that the accuracy of operation.
3, in the guard method of a kind of graphical passwords of the present invention, the verification method of graphical passwords includes that processor shows a width geometric figure according to password authentification instruction on its display interface; then this geometric figure and the first graphical passwords are compared by user; if this geometric figure and the first graphical passwords are inconsistent, stop checking; this operation allows users to the most unanimously judge to verify whether interface is fake site according to geometric figure and first graphical passwords of display on display interface, thus produces the effect stopping personation.Therefore, in the present invention, the verification method of graphical passwords can stop personation.
Accompanying drawing explanation
Fig. 1 is the geometric structural representation shown on display interface in step A1 of the present invention.
Fig. 2 is the structural representation of the first graphical passwords in the present invention.
Fig. 3 is the structural representation of second graph password in the embodiment of the present invention 1.
Fig. 4 is the structural representation of second graph password in the embodiment of the present invention 2.
Fig. 5 is the structural representation of second graph password in the embodiment of the present invention 3.
Fig. 6 is the structural representation of second graph password in the embodiment of the present invention 4.
In figure: 1, coordinate points B2 of terminal B, No. two coordinate points a, No. three coordinate points b, No. four coordinate points c, No. five coordinate points d, curved section ab, broken line adb, non-extreme coordinates point C1, No. six coordinate points C2, No. seven coordinate points D1, No. eight coordinate points D2.
Detailed description of the invention
The present invention is further detailed explanation with detailed description of the invention in explanation below in conjunction with the accompanying drawings.
Seeing Fig. 1 Fig. 6, a kind of graphical passwords guard method, the method includes the verification method of the method to set up of graphical passwords, graphical passwords;
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction that graphical passwords is set to processor, then shown several default geometric figures by processor on its display interface according to this instruction;
A2: on selected display interface, a wherein width geometric figure of display is as the fundamental figure of graphical passwords, and this fundamental figure is set as the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as second graph password, now, complete the setting of graphical passwords, wherein, at least one during the structure of described change fundamental figure includes the point on the point dragging on fundamental figure, connection fundamental figure operates.
Described geometric figure is to be positioned at the plane in coordinate dot matrix or solid geometry figure.
At least one operation that point on described dragging fundamental figure includes the end points dragging on fundamental figure, drags on fundamental figure in the coordinate points of non-end points.
End points on described dragging fundamental figure includes at least 1 basic operation, this basic operation refers to: drag the end point B1 of arbitrary line segment on fundamental figure at coordinate points B2 in coordinate dot matrix, now, the former line segment at terminal B 1 place is connected the new line segment formed replaced by another end points and coordinate points B2 of former line segment.
On described dragging fundamental figure, the coordinate points of non-end points includes at least one operation dragging the coordinate points of non-end points on the curve of fundamental figure, dragging on the straightway of fundamental figure in the coordinate points of non-end points.
On the curve of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation, this basic operation refers to: first selectes and is positioned at No. two coordinate points a non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points b, then drag and on this curve, be positioned at No. two coordinate points a, No. four coordinate points c between No. three coordinate points b are at No. five coordinate points d in coordinate dot matrix, now, with No. two coordinate points a on this curve, No. three coordinate points b are that the curved section ab of end points is sequentially connected with No. two coordinate points a, No. five coordinate points d, the broken line adb replacement that No. three coordinate points b are formed.
On the straightway of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation, this basic operation refers to: at No. six coordinate points C2 in the non-extreme coordinates point C1 on arbitrary straightway of dragging fundamental figure to coordinate dot matrix, now, the broken line with No. six coordinate points C2 as break is formed between two-end-point and No. six coordinate points C2 on this straightway, and the former line segment at non-extreme coordinates point C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-extreme coordinates point C1 place.
Point on described connection fundamental figure includes at least 1 basic operation, and this basic operation refers to: first No. seven coordinate points D1 being positioned on different line segment, No. eight coordinate points D2 first chosen on fundamental figure, then connects No. seven coordinate points D1, No. eight coordinate points D2.
The verification method of described graphical passwords comprises the following steps successively:
The first step is verified: user first sends the instruction of verification pattern password to processor, on its display interface, a width geometric figure is shown according to this instruction again by processor, then this geometric figure and the first graphical passwords are compared by user, if this geometric figure and the first graphical passwords are unanimously, enter second step checking, if this geometric figure and the first graphical passwords are inconsistent, stop checking;
Second step is verified: on change display interface, geometric structure is to form tablet pattern, and confirm to input this tablet pattern as checking password, then this tablet pattern is compared by processor with second graph password, if tablet pattern is consistent with graphical passwords, password authentification is passed through in prompting, if tablet pattern is inconsistent with second graph password, prompt cipher authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure includes dragging the point on geometric figure, connect at least one operation in the point on geometric figure.
The principle of the present invention is described as follows:
Due under conditions of there is no coordinate background, carry out when password authentification dragging or connect the problem that the processing ease of point on fundamental figure occurs to be dragged to accurately arrange site by point, the most easily forget to arrange site simultaneously, therefore geometric figure is placed in coordinate dot matrix by the present invention, user can accurately find when adjusting fundamental figure structure and arrange site, not only achieve and be accurately positioned, also allow for operation, it is particularly well-suited to handset touch panel, it addition, the number that the coordinate in coordinate dot matrix is counted can be adjusted according to the demand of different user.
When fundamental figure includes curvilinear structures, drag operation in the present invention needs first selected No. two non-adjacent coordinate points a on curve, No. three coordinate points b, so that it is determined that with No. two coordinate points a, No. three coordinate points b are the curved section ab variable section as this curve of end points, then drag and on this curve, be positioned at No. two coordinate points a, No. four coordinate points c between No. three coordinate points b are at No. five coordinate points d in coordinate dot matrix, now, curved section ab as variable section will become being sequentially connected with No. two coordinate points a, No. five coordinate points d, the broken line adb that No. three coordinate points b are formed.
In the verification method of graphical passwords of the present invention, first step checking uses the mode that user will show on the display interface of processor that a width geometric figure and the first graphical passwords are compared, if this geometric figure and the first graphical passwords are inconsistent, show to verify that interface is fake site, if this geometric figure and the first graphical passwords are unanimously, next step checking can be entered, therefore user can clearly judge by which to verify whether interface is fake site, thus improves the safety of password authentification.
Embodiment 1:
Seeing Fig. 1, Fig. 2, Fig. 3, a kind of graphical passwords guard method, the method includes that the verification method of the method to set up of graphical passwords, graphical passwords, the method to set up of described graphical passwords comprise the following steps successively:
A1: first sending the instruction arranging graphical passwords to processor, then shown several default geometric figures by processor on its display interface according to this instruction, wherein, described geometric figure is to be positioned at the plane in coordinate dot matrix or solid geometry figure;
A2: on selected display interface, a wherein width geometric figure of display is as the fundamental figure of graphical passwords, and this fundamental figure is set as the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as second graph password, now, complete the setting of graphical passwords, wherein, the structure of described change fundamental figure is following operation: drag the end point B1 of arbitrary line segment on fundamental figure to the coordinate points B2 place in coordinate dot matrix, and now, the former line segment at terminal B 1 place is replaced by the new line segment formed by another end points and coordinate points B2 connection of former line segment.
The verification method of described graphical passwords comprises the following steps successively:
The first step is verified: user first sends the instruction of verification pattern password to processor, on its display interface, a width geometric figure is shown according to this instruction again by processor, then this geometric figure and the first graphical passwords are compared by user, if this geometric figure and the first graphical passwords are unanimously, enter second step checking, if this geometric figure and the first graphical passwords are inconsistent, stop checking;
Second step is verified: on change display interface, geometric structure is to form tablet pattern, and confirm to input this tablet pattern as checking password, then this tablet pattern is compared by processor with second graph password, if tablet pattern is consistent with graphical passwords, password authentification is passed through in prompting, if tablet pattern is inconsistent with second graph password, prompt cipher authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure is following operation: drag the end point B1 of arbitrary line segment on geometric figure at coordinate points B2 in coordinate dot matrix, now, the former line segment at terminal B 1 place is connected the new line segment formed replaced by another end points and coordinate points B2 of former line segment.
Embodiment 2:
Seeing Fig. 1, Fig. 2, Fig. 4, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: first selectes and is positioned at No. two coordinate points a non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points b, then No. four coordinate points c between No. two coordinate points a, No. three coordinate points b are dragged on this curve at No. five coordinate points d in coordinate dot matrix, now, the curved section ab this curve being end points with No. two coordinate points a, No. three coordinate points b is replaced by the broken line adb being sequentially connected with No. two coordinate points a, No. five coordinate points d, No. three coordinate points b are formed;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: first chooses and is positioned at No. two coordinate points a non-adjacent on geometric arbitrary curve, No. three coordinate points b, then No. four coordinate points c between No. two coordinate points a, No. three coordinate points b are dragged on this curve at No. five coordinate points d in coordinate dot matrix, now, the curved section ab this curve being end points with No. two coordinate points a, No. three coordinate points b is replaced by the broken line adb being sequentially connected with No. two coordinate points a, No. five coordinate points d, No. three coordinate points b are formed.
Embodiment 3:
Seeing Fig. 1, Fig. 2, Fig. 5, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: at No. six coordinate points C2 in the non-extreme coordinates point C1 on arbitrary straightway of dragging fundamental figure to coordinate dot matrix, now, the broken line with No. six coordinate points C2 as break is formed between two-end-point and No. six coordinate points C2 on this straightway, and the former line segment at non-extreme coordinates point C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-extreme coordinates point C1 place;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: drag non-extreme coordinates point C1 on geometric arbitrary straightway at No. six coordinate points C2 in coordinate dot matrix, now, the broken line with No. six coordinate points C2 as break is formed between two-end-point and No. six coordinate points C2 on this straightway, and the former line segment at non-extreme coordinates point C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-extreme coordinates point C1 place.
Embodiment 4:
Seeing Fig. 1, Fig. 2, Fig. 6, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: first chooses on fundamental figure and is positioned at different No. seven coordinate points D1 of line segment, No. eight coordinate points D2, then connects No. seven coordinate points D1, No. eight coordinate points D2;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: first chooses on geometric figure and is positioned at different No. seven coordinate points D1 of line segment, No. eight coordinate points D2, then connects No. seven coordinate points D1, No. eight coordinate points D2.

Claims (9)

1. a graphical passwords guard method, the method includes the verification method of the method to set up of graphical passwords, graphical passwords, it is characterised in that:
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction that graphical passwords is set to processor, then shown several default geometric figures by processor on its display interface according to this instruction;
A2: on selected display interface, a wherein width geometric figure of display is as the fundamental figure of graphical passwords, and this fundamental figure is set as the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as second graph password, now, complete the setting of graphical passwords, wherein, at least one during the structure of described change fundamental figure includes the point on the point dragging on fundamental figure, connection fundamental figure operates.
A kind of graphical passwords guard method the most according to claim 1, it is characterised in that: described geometric figure is to be positioned at the plane in coordinate dot matrix or solid figure.
A kind of graphical passwords guard method the most according to claim 2, it is characterised in that: at least one operation that the point on described dragging fundamental figure includes the end points dragging on fundamental figure, drags on fundamental figure in the coordinate points of non-end points.
A kind of graphical passwords guard method the most according to claim 3; it is characterized in that: the end points on described dragging fundamental figure includes at least 1 basic operation; this basic operation refers to: drag the end point (B1) of arbitrary line segment on fundamental figure to coordinate points (B2) place in coordinate dot matrix; now, the former line segment at end points (B1) place is connected the new line segment formed replaced by another end points and a coordinate points (B2) of former line segment.
A kind of graphical passwords guard method the most according to claim 3, it is characterised in that: on described dragging fundamental figure, the coordinate points of non-end points includes at least one operation dragging the coordinate points of non-end points on the curve of fundamental figure, dragging on the straightway of fundamental figure in the coordinate points of non-end points.
A kind of graphical passwords guard method the most according to claim 5, it is characterized in that: on the curve of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation, this basic operation refers to: first selectes and is positioned at No. two coordinate points (a) non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points (b), then drag and on this curve, be positioned at No. two coordinate points (a), No. four coordinate points (c) between No. three coordinate points (b) are to No. five coordinate points (d) places in coordinate dot matrix, now, with No. two coordinate points (a) on this curve, No. three coordinate points (b) are that the curved section (ab) of end points is sequentially connected with No. two coordinate points (a), No. five coordinate points (d), broken line (adb) replacement that No. three coordinate points (b) are formed.
A kind of graphical passwords guard method the most according to claim 5; it is characterized in that: on the straightway of described dragging fundamental figure, the coordinate points of non-end points includes at least 1 basic operation; this basic operation refers to: No. six coordinate points (C2) places in non-extreme coordinates point (C1) on arbitrary line segment of dragging fundamental figure to coordinate dot matrix; now; the former line segment at non-extreme coordinates point (C1) place is replaced with No. six coordinate points (C2) broken line as break; wherein, No. six coordinate points (C2) are positioned at outside the former line segment at non-extreme coordinates point (C1) place.
A kind of graphical passwords guard method the most according to claim 2; it is characterized in that: the point on described connection fundamental figure includes at least 1 basic operation; this basic operation refers to: first chooses on fundamental figure and is positioned at different No. seven coordinate points (D1) of line segment, No. eight coordinate points (D2), then connects No. seven coordinate points (D1), No. eight coordinate points (D2).
9. according to a kind of graphical passwords guard method according to any one of claim 18, it is characterised in that the verification method of described graphical passwords comprises the following steps successively:
The first step is verified: user first sends the instruction of verification pattern password to processor, on its display interface, a width geometric figure is shown according to this instruction again by processor, then this geometric figure and the first graphical passwords are compared by user, if this geometric figure and the first graphical passwords are unanimously, enter second step checking, if this geometric figure and the first graphical passwords are inconsistent, stop checking;
Second step is verified: on change display interface, geometric structure is to form tablet pattern, and confirm to input this tablet pattern as checking password, then this tablet pattern is compared by processor with second graph password, if tablet pattern is consistent with second graph password, password authentification is passed through in prompting, if tablet pattern is inconsistent with second graph password, prompt cipher authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure includes dragging the point on geometric figure, connect at least one operation in the point on geometric figure.
CN201410040065.9A 2014-01-28 2014-01-28 A kind of graphical passwords guard method Expired - Fee Related CN103810415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410040065.9A CN103810415B (en) 2014-01-28 2014-01-28 A kind of graphical passwords guard method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410040065.9A CN103810415B (en) 2014-01-28 2014-01-28 A kind of graphical passwords guard method

Publications (2)

Publication Number Publication Date
CN103810415A CN103810415A (en) 2014-05-21
CN103810415B true CN103810415B (en) 2016-08-03

Family

ID=50707171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410040065.9A Expired - Fee Related CN103810415B (en) 2014-01-28 2014-01-28 A kind of graphical passwords guard method

Country Status (1)

Country Link
CN (1) CN103810415B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156655B (en) * 2014-05-28 2017-03-08 东莞盛世科技电子实业有限公司 Ambiguity cryptographic check method and cryptographic check equipment
CN105279424B (en) * 2015-11-02 2020-09-11 厦门雅迅网络股份有限公司 Method and device for identifying strength of graphic password
CN108009419B (en) * 2017-11-24 2020-12-22 咪咕文化科技有限公司 Authentication method and device of graphic password and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101676926A (en) * 2008-09-16 2010-03-24 深圳富泰宏精密工业有限公司 Touch type electronic equipment and its authority control method
CN102243754A (en) * 2010-05-11 2011-11-16 汤姆森特许公司 Method and a device for generating a secret value
CN102279910A (en) * 2010-06-11 2011-12-14 鸿富锦精密工业(深圳)有限公司 Device with encryption and decryption functions and encrypting and decrypting methods of device
CN102521550A (en) * 2011-12-09 2012-06-27 鸿富锦精密工业(深圳)有限公司 Electronic device with file encryption function and method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8090201B2 (en) * 2007-08-13 2012-01-03 Sony Ericsson Mobile Communications Ab Image-based code

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101676926A (en) * 2008-09-16 2010-03-24 深圳富泰宏精密工业有限公司 Touch type electronic equipment and its authority control method
CN102243754A (en) * 2010-05-11 2011-11-16 汤姆森特许公司 Method and a device for generating a secret value
CN102279910A (en) * 2010-06-11 2011-12-14 鸿富锦精密工业(深圳)有限公司 Device with encryption and decryption functions and encrypting and decrypting methods of device
CN102521550A (en) * 2011-12-09 2012-06-27 鸿富锦精密工业(深圳)有限公司 Electronic device with file encryption function and method thereof

Also Published As

Publication number Publication date
CN103810415A (en) 2014-05-21

Similar Documents

Publication Publication Date Title
JP5345850B2 (en) Method and apparatus for securely entering password or PIN by scrolling mouse wheel
US9507928B2 (en) Preventing the discovery of access codes
US8650635B2 (en) Pressure sensitive multi-layer passwords
CN104834449B (en) The icon management method and device of mobile terminal
CN106888202B (en) Authorized login method and device
US20160127134A1 (en) User authentication system and method
US20150100913A1 (en) Method for providing personalized virtual keyboard
CN103929306A (en) Intelligent secret key device and information management method of intelligent secret key device
US8635676B2 (en) Visual or touchscreen password entry
TW201539247A (en) Password input and verification method and system thereof
CN103996011A (en) Method and device for protecting codes to be input safely
CN103905188A (en) Method for generating dynamic password through intelligent secret key device, and intelligent secret key device
CN106355059A (en) Password input method and terminal
CN103136462B (en) A kind of method and system of password authentification
CN103810415B (en) A kind of graphical passwords guard method
KR20090036820A (en) Hacking protection input system and method of the virtual keyboard
CN104866129A (en) Computing device and password input method thereof
CN107967422A (en) One kind verification implementation method and electric terminal
CN104680376B (en) A kind of Transaction Information verification method and device
CN101561714B (en) Group password input method
CN105653054A (en) Code processing method and apparatus
CN106302344B (en) Security sweep method and system
CN104021322A (en) Electronic signature method, electronic signature equipment and electronic signature client
CN104346161A (en) Information processing method and electronic equipment
KR101648779B1 (en) Method for secure text input in information terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160803

Termination date: 20180128

CF01 Termination of patent right due to non-payment of annual fee