CN103902477B - 3d云锁 - Google Patents
3d云锁 Download PDFInfo
- Publication number
- CN103902477B CN103902477B CN201310757439.4A CN201310757439A CN103902477B CN 103902477 B CN103902477 B CN 103902477B CN 201310757439 A CN201310757439 A CN 201310757439A CN 103902477 B CN103902477 B CN 103902477B
- Authority
- CN
- China
- Prior art keywords
- data
- projections
- registration
- customization
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Processing Or Creating Images (AREA)
- Information Transfer Between Computers (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/728,034 US9118675B2 (en) | 2012-12-27 | 2012-12-27 | 3D cloud lock |
| US13/728,034 | 2012-12-27 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN103902477A CN103902477A (zh) | 2014-07-02 |
| CN103902477B true CN103902477B (zh) | 2018-07-31 |
Family
ID=49949444
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201310757439.4A Active CN103902477B (zh) | 2012-12-27 | 2013-12-27 | 3d云锁 |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US9118675B2 (enExample) |
| EP (1) | EP2750351B1 (enExample) |
| JP (1) | JP6317924B2 (enExample) |
| KR (1) | KR20140085358A (enExample) |
| CN (1) | CN103902477B (enExample) |
| CA (1) | CA2838273A1 (enExample) |
| IN (1) | IN2013MU04017A (enExample) |
Families Citing this family (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103064607A (zh) * | 2011-10-20 | 2013-04-24 | 网秦无限(北京)科技有限公司 | 具有触摸屏的设备解锁的方法和系统 |
| US9397992B1 (en) * | 2013-10-23 | 2016-07-19 | Emc Corporation | Authentication using color-shape pairings |
| US9430634B1 (en) * | 2012-10-23 | 2016-08-30 | Emc Corporation | Authentication using gesture passwords |
| US9509671B2 (en) | 2012-12-27 | 2016-11-29 | Dassault Systèmes | 3D bot detection |
| US9864801B2 (en) * | 2013-01-28 | 2018-01-09 | Red Hat, Inc. | Responsive layout based on behavioral intent in a multi-tenant platform-as-a-service (PaaS) system |
| US10204530B1 (en) * | 2014-07-11 | 2019-02-12 | Shape Matrix Geometric Instruments, LLC | Shape-matrix geometric instrument |
| CN107103227B (zh) * | 2017-06-02 | 2019-12-03 | 广东汇泰龙科技有限公司 | 一种基于云锁的图案解锁验证的方法及其系统 |
| EP3518130A1 (en) | 2018-01-30 | 2019-07-31 | OneVisage SA | Method and system for 3d graphical authentication on electronic devices |
| US10783230B2 (en) * | 2018-05-09 | 2020-09-22 | Shape Matrix Geometric Instruments, LLC | Methods and apparatus for encoding passwords or other information |
| US12047373B2 (en) * | 2019-11-05 | 2024-07-23 | Salesforce.Com, Inc. | Monitoring resource utilization of an online system based on browser attributes collected for a session |
| US11282288B2 (en) | 2019-11-20 | 2022-03-22 | Shape Matrix Geometric Instruments, LLC | Methods and apparatus for encoding data in notched shapes |
| JP7509032B2 (ja) * | 2020-12-25 | 2024-07-02 | サクサ株式会社 | 認証システム及び認証プログラム |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101622620A (zh) * | 2007-01-23 | 2010-01-06 | 卡内基梅隆大学 | 控制访问计算机系统和注释媒体文件的方法和装置 |
| EP2466518A1 (en) * | 2010-12-16 | 2012-06-20 | Research In Motion Limited | Password entry using 3D image with spatial alignment |
Family Cites Families (24)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5821933A (en) | 1995-09-14 | 1998-10-13 | International Business Machines Corporation | Visual access to restricted functions represented on a graphical user interface |
| JP2000271346A (ja) * | 1999-03-23 | 2000-10-03 | Nec Corp | 遊戯装置 |
| JP3807961B2 (ja) * | 2001-08-01 | 2006-08-09 | インターナショナル・ビジネス・マシーンズ・コーポレーション | セッション管理方法、セッション管理システムおよびプログラム |
| US7725395B2 (en) | 2003-09-19 | 2010-05-25 | Microsoft Corp. | System and method for devising a human interactive proof that determines whether a remote client is a human or a computer program |
| US7886350B2 (en) * | 2003-10-03 | 2011-02-08 | Verizon Services Corp. | Methodology for measurements and analysis of protocol conformance, performance and scalability of stateful border gateways |
| US20110119629A1 (en) * | 2005-10-07 | 2011-05-19 | Vesa Huotari | Graphical User Interface, a Method, a Device and a Computer Program for Providing a Menu and/or Inputting an Access Code |
| US7873237B2 (en) | 2006-02-17 | 2011-01-18 | Dassault Systèmes | Degrading 3D information |
| WO2008048579A2 (en) | 2006-10-13 | 2008-04-24 | University Of Idaho | Method for generating and using composite scene passcodes |
| US8510814B2 (en) | 2007-01-31 | 2013-08-13 | Binary Monkeys, Inc. | Method and apparatus for network authentication of human interaction and user identity |
| NO20076550A (no) * | 2007-12-19 | 2009-05-04 | Fast Search & Transfer Asa | Fremgangsmåte for å forbedre sikkerhet i prosedyrer for innlogging og tjenesteaksess |
| JP5400301B2 (ja) | 2008-01-23 | 2014-01-29 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 認証サーバ装置、認証方法、及び認証プログラム |
| JP2010079633A (ja) * | 2008-09-26 | 2010-04-08 | Toppan Printing Co Ltd | 生体情報認証システム、生体情報認証方法 |
| US8621396B1 (en) * | 2008-10-20 | 2013-12-31 | Google Inc. | Access using image-based manipulation |
| JP2010257109A (ja) * | 2009-04-23 | 2010-11-11 | Panasonic Corp | 障害特定情報を取得するためのクライアント端末、障害特定情報取得方法及びプログラム |
| CN101877042A (zh) * | 2009-04-30 | 2010-11-03 | 鸿富锦精密工业(深圳)有限公司 | 密码保护方法 |
| EP2339493A1 (en) * | 2009-12-22 | 2011-06-29 | Gemalto SA | Authenticating human interface device |
| US8843755B2 (en) | 2009-12-22 | 2014-09-23 | Nokia Corporation | User authentication |
| US9146669B2 (en) * | 2009-12-29 | 2015-09-29 | Bizmodeline Co., Ltd. | Password processing method and apparatus |
| US20110197268A1 (en) * | 2010-02-05 | 2011-08-11 | Yahoo! Inc. | Captchas that include overlapped characters, projections on virtual 3d surfaces, and/or virtual 3d objects |
| US8990959B2 (en) * | 2010-05-28 | 2015-03-24 | Microsoft Corporation | Manipulable human interactive proofs |
| US20120272302A1 (en) | 2011-04-21 | 2012-10-25 | Microsoft Corporation | Human User Verification |
| US8645700B2 (en) * | 2011-04-29 | 2014-02-04 | Verisign, Inc. | DNSSEC inline signing |
| US20120323700A1 (en) | 2011-06-20 | 2012-12-20 | Prays Nikolay Aleksandrovich | Image-based captcha system |
| US9509671B2 (en) | 2012-12-27 | 2016-11-29 | Dassault Systèmes | 3D bot detection |
-
2012
- 2012-12-27 US US13/728,034 patent/US9118675B2/en active Active
-
2013
- 2013-12-20 EP EP13199195.2A patent/EP2750351B1/en active Active
- 2013-12-23 CA CA2838273A patent/CA2838273A1/en not_active Abandoned
- 2013-12-23 IN IN4017MU2013 patent/IN2013MU04017A/en unknown
- 2013-12-26 JP JP2013269389A patent/JP6317924B2/ja active Active
- 2013-12-26 KR KR1020130164607A patent/KR20140085358A/ko not_active Withdrawn
- 2013-12-27 CN CN201310757439.4A patent/CN103902477B/zh active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101622620A (zh) * | 2007-01-23 | 2010-01-06 | 卡内基梅隆大学 | 控制访问计算机系统和注释媒体文件的方法和装置 |
| EP2466518A1 (en) * | 2010-12-16 | 2012-06-20 | Research In Motion Limited | Password entry using 3D image with spatial alignment |
Non-Patent Citations (1)
| Title |
|---|
| 《Authentication Using Graphical Password in Cloud》;Ming-Huang Guo, et al;《Wireless Personal Multimedia Communications(WPMC)》;20120924;第177-181页 * |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2014130598A (ja) | 2014-07-10 |
| US20140189819A1 (en) | 2014-07-03 |
| EP2750351B1 (en) | 2018-08-01 |
| IN2013MU04017A (enExample) | 2015-08-14 |
| JP6317924B2 (ja) | 2018-04-25 |
| KR20140085358A (ko) | 2014-07-07 |
| CN103902477A (zh) | 2014-07-02 |
| EP2750351A1 (en) | 2014-07-02 |
| CA2838273A1 (en) | 2014-06-27 |
| US9118675B2 (en) | 2015-08-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103902477B (zh) | 3d云锁 | |
| US11418341B2 (en) | Distributed consent protecting data across systems and services | |
| US10462142B2 (en) | Techniques for implementing a data storage device as a security device for managing access to resources | |
| US10891616B2 (en) | System and method for effort-based user authentication | |
| CN105830389B (zh) | 用于访问多个计算资源服务的单组证书 | |
| CN105027107B (zh) | 迁移计算资源的计算机实现的方法及计算系统 | |
| CN102281286B (zh) | 分布式混合企业的灵活端点顺从和强认证的方法和系统 | |
| CN105074720B (zh) | 基于云的环境中的自主策略管理 | |
| JP2018533141A (ja) | エンドユーザによって起動されるアクセスサーバ真正性チェック | |
| JP7223067B2 (ja) | ユーザリクエストを処理するための方法、装置、電子機器、コンピュータ可読記憶媒体及びコンピュータプロブラム | |
| CN108289129A (zh) | 区块链生态环境创建方法、系统及计算机可读存储介质 | |
| CN117061188A (zh) | 网络服务的安全认证方法、系统、装置和计算机设备 | |
| CN112738167A (zh) | 基于api网关的文件服务开放方法、装置、设备和介质 | |
| CN119989324A (zh) | 基于区块链的分布式可信虚拟人身份认证系统及方法 | |
| US20080120415A1 (en) | Filtering access to data objects | |
| US12020692B1 (en) | Secure interactions in a virtual environment using electronic voice | |
| Chen et al. | BSPPF: Blockchain‐Based Security and Privacy Preventing Framework for Data Middle Platform in the Era of IR 4.0 | |
| CN117992942A (zh) | 基于虚拟形象的认证方法、装置和电子设备 | |
| CA3184096A1 (en) | Personal information vault | |
| AlShawi | Applying data mining techniques to improve information security in the cloud: a single cache system approach | |
| CN118102293B (zh) | 无线设备密码设置方法、装置、计算机设备和存储介质 | |
| US12437474B2 (en) | System and method for generating and securing a user-specific application in an extended reality environment | |
| US20250068714A1 (en) | Authentication method | |
| CN117193518A (zh) | 基于资源获取项目的数据处理方法、装置、设备和介质 | |
| Rea | Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |