CN104091134A - Password inputting method with combination of safety and convenience - Google Patents

Password inputting method with combination of safety and convenience Download PDF

Info

Publication number
CN104091134A
CN104091134A CN201410338829.2A CN201410338829A CN104091134A CN 104091134 A CN104091134 A CN 104091134A CN 201410338829 A CN201410338829 A CN 201410338829A CN 104091134 A CN104091134 A CN 104091134A
Authority
CN
China
Prior art keywords
password
described step
user
cipher
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410338829.2A
Other languages
Chinese (zh)
Other versions
CN104091134B (en
Inventor
谭皓文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410338829.2A priority Critical patent/CN104091134B/en
Publication of CN104091134A publication Critical patent/CN104091134A/en
Application granted granted Critical
Publication of CN104091134B publication Critical patent/CN104091134B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a password inputting method with a combination of safety and convenience. The password inputting method comprises the steps that (1) it is judged that an input box where a current input focus is located is a password input box; (2) device characteristics or environment characteristics are obtained; (3) original passwords input by a user are obtained; (4) according to the device characteristics or the environment characteristics which are obtained in the step (2) and the original passwords which are input by the user and obtained in the step (3), high-strength passwords are worked out according to a specific algorithm; (5) the password input box judged in the step (1) is filled with the high-strength passwords worked out in the step (4). According to the password inputting method with the combination of the safety and the convenience, the simple passwords are input by the user, so that the high-strength passwords are obtained; on one hand, memorizing is facilitated, so that convenience for password inputting and memorizing is achieved; on the other hand, the requirement for the high-safety passwords of an application program is met, the safety of program application is improved, and the combination of the convenience and the safety is achieved.

Description

One is taken into account safety and cipher-code input method easily
Technical field
The present invention relates to one and take into account safety and cipher-code input method easily, belong to network security technology field.
Background technology
At present, most internet application, no matter be in PC, on mobile phone or on panel computer, all needs user to input account and password carries out granted access.Conventionally user is using E-mail address, social media, even when the internet application such as shopping online, must first register account number and password; Wherein password arranges appropriately whether concerning the safe coefficient of account; General Password Length is longer, and it is more random that code characters forms distribution, and Cipher Strength is just stronger, and account is also just safer.But high strength password also has its weakness, the password that intensity is higher, and the difficulty of user's memory is also just larger, and the probability of forgeing is also just higher.
The requirement of strength difference of different internet applications to password, the password of program A accreditation cannot be by strength test in program B conventionally, and this just requires user to use different Cipher Strength settings to program A and program B; Although this has strengthened the security of user account, greatly increase user's memory burden, also greatly increase the probability of forgeing password.In actual conditions, user often selects easily to remember can meet the simple password of internet, applications minimum requirements simultaneously; And this simple password is easy to by illegal hacker, utilize the mode such as dictionary, rainbow table to decode easily, make user's network security be subject to serious threat.Some technical schemes that prior art provides can remember user's complicated password, and in the time that user uses internet, applications, Auto-writing password, does not need user to remember high strength password; On the surface, these technical schemes have seemed to solve the problem of cipher memory, but the enforcement of this technical scheme and equipment for surfing the net tight binding, once equipment for surfing the net is lost, or be illegally used without permission, just likely user's network security constituted a latent danger.
Summary of the invention
The deficiency that the present invention exists for prior art just, provides one to take into account safety and cipher-code input method easily, makes user in the time of access application input password, can realize the convenient effect of taking into account with network security of memory.
For addressing the above problem, the technical solution used in the present invention is as follows:
One is taken into account safety and cipher-code input method easily, comprises the following steps:
1) input frame of judging current input focus place is Password Input frame;
2) obtain apparatus characteristic or environmental characteristic;
3) obtain the original password that user inputs;
4) according to described step 2) apparatus characteristic or the environmental characteristic that obtain, and the original password of described step 3) user's input of obtaining, calculate high strength password by special algorithm;
5) the high strength password described step 4) being calculated is inserted in the Password Input frame of described step 1) judgement.
Apparently, described step 2) and 3) between without sequencing.
As technique scheme preferably, described apparatus characteristic or environmental characteristic comprise: the constraint to password of hardware sequence number, application name and application program.
As technique scheme preferably, described step 2) specifically comprise the following steps:
21) obtain application name;
22) judge whether apparatus characteristic or the environmental characteristic of preservation according to application name;
23) obtain hardware sequence number;
24) obtain the constraint of application program to password;
25) preserve apparatus characteristic or environmental characteristic;
26) provide apparatus characteristic or environmental characteristic;
If described step 22) judgement has apparatus characteristic or the environmental characteristic of preservation, directly performs step 26), without performing step again 23), 24) and 25); If described step 22) judgement without preserve apparatus characteristic or environmental characteristic, perform step 23), 24) and 25) after perform step again 26).
Described application program comprises the constraint of password: whether length, have special character etc.And described step 23 apparently) and 24) between without sequencing.
As technique scheme preferably, described step 4) specifically comprises the following steps:
41) by described step 21) application name obtaining, described step 23) original password that obtains of the hardware sequence number obtaining, described step 3) carries out combination in any to obtain password string;
42) by described step 41) password string that obtains calculates high strength password to be adjusted by special algorithm;
43) according to described step 24) constraint to password of the application program obtained, to described step 42) the high strength password to be adjusted that obtains adjusts, and obtains final high strength password.
As technique scheme preferably, described special algorithm is HASH algorithm.Further preferably, described HASH algorithm is any one algorithm in HMAC, SHA256, SHA512, RipeMD, WHIRLPOOL, SHA3, PBKDF2, bcrypt, scrypt or the combination in any of many algorithms.
As technique scheme preferably, described step 3) specifically comprises following mode: a) user inputs original password by input method, or b) user's track input original password that uses gesture, or c) user inputs original password by the mode of phonetic entry, or d) user inputs original password by picture or the mode of taking pictures, or combination in any a), b), c), d).
Technique scheme can be applied in mobile terminal, and described mobile terminal can include touch screen; The concrete mode of described " obtaining the original password of user's input " can be: user inputs password by input method; Eject gesture track inputting interface, user moves on screen with finger, and its gesture track forms password; Eject phonetic entry interface, user forms password by voice content; Eject video record or photograph taking interface, user is by recording or content of shooting formation password.
As technique scheme preferably, described step 5) specifically comprises the following steps:
51) whether the content that judges Password Input frame is empty;
52) content of Password Input frame is emptied;
53) the high strength password described step 4) being calculated is inserted in Password Input frame;
If described step 51) judge that the content of Password Input frame is empty, directly perform step 53), without performing step again 52); If described step 51) judge Password Input frame content for empty, perform step 52) after perform step again 53).
Compared with prior art, implementation result of the present invention is as follows in the present invention:
One of the present invention is taken into account safety and cipher-code input method easily, and user inputs simple password, obtains high strength password; On the one hand convenient memory provides multiple simple password input mode simultaneously, as gesture input, Speech input, video image input etc., reaches the convenience of Password Input and memory with this; On the other hand, met again the requirement of application program to high security password, the security of raising program application, reaches the convenient object having concurrently with safety.
And the present invention memory device feature or environmental characteristic, neither preserve original password, do not preserve final high strength password yet; If smart machine is obtained by other people, even if read apparatus characteristic or environmental characteristic, by program inverse compiling technique, obtain the cryptographic algorithm of original password to high strength password, but owing to cannot obtaining the original password of user's input, also just cannot calculate correct high strength password; Therefore, even if mobile phone, panel computer or other smart machine are illegally read or crack, also can not leak user's password, what make program has been applied in security a heavily protection many again.
Brief description of the drawings
A kind of safety and process flow diagram of cipher-code input method easily taken into account that Fig. 1 provides for the embodiment of the present invention;
The gesture track inputting interface design drawing that Fig. 2 provides for the embodiment of the present invention;
The equipment feature that Fig. 3 provides for the embodiment of the present invention or the process flow diagram of environmental characteristic;
The process flow diagram of the calculating high strength password that Fig. 4 provides for the embodiment of the present invention.
Embodiment
Content of the present invention is described below in conjunction with specific embodiments.
As shown in Figure 1, be a kind of safety and process flow diagram of cipher-code input method easily taken into account that the present embodiment provides, the one that the present embodiment provides is taken into account safety and can be comprised the following steps with cipher-code input method easily:
S101: judge whether the current input frame being activated is Password Input frame.Generally speaking, internet, applications need to be inputted password in three places: registration, login and Modify password.No matter which place is, all need Password Input frame could input password.Check whether input frame is Password Input frame; If be really Password Input frame, carry out s102, s103/s104/s105/s106, s107, s108; Otherwise finish.S103/s104/s105/s106 can only select one to carry out.Input frame has the attribute of input type, generally comprises text, password etc., on mobile device, even comprises telephone number, e-mail address etc.By checking the attribute of input frame, just can learn whether current input frame is Password Input frame.Only have Password Input frame to reach the execution requirements of unabridged version inventive embodiments, the input frame of other type is skipped without exception.
S102: equipment feature or environmental characteristic.Concrete, apparatus characteristic or environmental characteristic comprise: the sequence number of hardware, application name, the requirement of application program to password, wherein application program can be length, the combination that whether allows special character etc. to the requirement of password.On mobile terminal, hardware sequence number and application name can be provided by operating system.Different application programs varies to the requirement of password: the maximum length that requires having can not exceed 16, and some permission maximum lengths reach 32; What have must have special character, the combination that only allows letter and number having; Therefore need each application program difference to treat.
S103: allow user input original password by input method.Original password only has a requirement, simple and easy to remember.User can use same original password in all application programs, and the high strength password that the present invention goes out to each application computes is different.Such as in microblogging client, user inputs original password " 1 ", and gained high strength password may be " b+gRaPTLiQzRi2NNMjrU2lB3Nu "; In micro-letter client, still " 1 " of user's input, the high strength password obtaining may be " E7Pf4hueVk6G6yWuTMtOTJ/6Rw ".So just take into account safety and convenient.
S104: allow user's track input original password that uses gesture.Mobile terminal device is limited because of screen size, or use scenes is limited, cannot be singlehanded input smoothly original password by input method.The track inputting interface that now uses gesture, user only need complete gesture track arbitrarily with single finger (can hold mobile phone by one hand on mobile phone, with thumb operate) on screen, can input original password.
S105: allow user input original password by the mode of phonetic entry.This is applicable to some scene that cannot use one hand or both hands to input.The speech recognition software that mobile terminal is built-in is specific character string by user's speech recognition, using this as original password.
S106: allow user input original password by picture or the mode of taking pictures.Typically, user autodynes or takes some certain objects, special algorithm used for mobile terminal, and the proper vector in statistics picture, uses proper vector as original password.Proper vector can be the external appearance characteristic of object or facial constitutive characteristic of portrait etc.
S107: calculate high strength password by special algorithm with original password and apparatus characteristic or environmental characteristic.Special algorithm can adopt safe hash function, fully promotes the security intensity of password.Hash algorithm is an one-way function.It can be converted into the data of any size " fingerprint " of fixed length, and cannot be reversed calculating.In addition, even just very little change of data source, the result of Hash also can be completely different.
S108: the high strength password Auto-writing of generation is in Password Input frame.If Password Input frame is not empty, first empty the content of input frame, then high strength password is filled up in password box, guarantee that the original password that user inputs is not leaked.
As shown in Figure 2, the present embodiment provides gesture track inputting interface design drawing.Gesture track inputting interface adopts the mode of 9 palace lattice to arrange 9 points that can connect.User can start from any one point, with track arbitrarily, and wherein at least 5 points of connection.Each point can be connected repeatedly, and therefore the diversity of input trajectory is very high, can meet user's needs.Each point represents one section of character, and it can be the hardware sequence number in apparatus characteristic or environmental characteristic that the character string of 9 some representatives is stitched together in order, and can only be not simple 1,2,3,4,5,6,7,8,9; The content of each point of the input trajectory namely content of original password that is stitched together.
As shown in Figure 3, the equipment feature providing for the present embodiment or the process flow diagram of environmental characteristic, the flow process of described equipment feature or environmental characteristic is the sub-process of Password Input main flow in Fig. 1, and the equipment feature that the present embodiment provides or the method for environmental characteristic comprise the following steps:
S201: obtain application name.Obtain rear execution s202.The present embodiment need to be preserved apparatus characteristic or environmental characteristic with application name; Also need application name to participate in the calculating of password.Can realize like this in same equipment, identical original password, different application programs, the high strength password calculating is also different.Even illegal like this hacker by certain means (such as Brute Force, rainbow table etc.), (this password can only be the high strength password calculating at the password of server end to have cracked a kind of internet client program, original password cannot crack at server end), also be useless to other internet client program at the password of server end so, illegal hacker can only select Brute Force again.
S202: the apparatus characteristic or the environmental characteristic that judge whether preservation according to application name.If have apparatus characteristic or the environmental characteristic of preservation, carry out s206; Otherwise carry out s203, s204, s205, s206.
S203: obtain hardware sequence number.The hardware sequence number of mobile device can obtain by operating system.Hardware sequence number will participate in the calculating of password, can ensure like this on different mobile terminal, and identical original password, the high strength password calculating is also different.Substantially pulverize illegal hacker and utilized other mobile terminal, with same original password, obtained the attempt of high strength password.
S204: user arranges the length of password and whether allows special character.Each application program is different to the requirement of password, such as: the restriction of maximum length is different, is all different to whether using special character (as punctuation mark etc.).The present embodiment allows these password constraints of user to arrange, and accepts otherwise the high strength password generating can not be employed program, and the password of safety is all nonsensical so again.
S205: preserve apparatus characteristic or environmental characteristic.Apparatus characteristic or environmental characteristic are changeless on each mobile terminal, after obtaining once, just can retain to using next time.Apparatus characteristic or environmental characteristic are preserved by application name, and the apparatus characteristic that different application programs is corresponding or environmental characteristic are different.
S206: Returning equipment feature or environmental characteristic, to the main flow of Password Input shown in Fig. 1, then finish.
As shown in Figure 4, the present embodiment also provides the method for calculating high strength password, and high-intensity cryptographic algorithm has used 3 factors to participate in calculating.The 101 original password factors, from 100 interface for password input, can be that interface of input method can be also gesture track inputting interface; The 104 application name factors and the 103 hardware sequence number factors are from 102 operating systems at equipment place; These 3 factors are arbitrarily made with 105 original password strings, obtain high strength password by 106HASH One-Way Encryption function:
The combination in any of the environmental characteristic values such as password string=original password, hardware sequence number, application name;
High strength password=HASH(password string);
HASH is any one or more the combination in HMAC, SHA256, SHA512, RipeMD, WHIRLPOOL, SHA3, PBKDF2, bcrypt, scrypt scheduling algorithm.
After this according to the constraint to password in 107 apparatus characteristics or environmental characteristic, carry out 108 and adjust password, obtain 109 available high strength passwords.In high strength password generating algorithm, the effect of the 104 application name factors is, the final password generating of different application differs widely.User can use identical original password to all application, and the high strength password obtaining is completely different, has so both ensured the security of password, has alleviated again user's memory burden.The effect of the 103 hardware sequence number factors is to ensure different mobile terminal, identical original password, and the high strength password obtaining is not identical yet.Can resist like this two class security attacks: one is input hook wooden horse, and all input contents are all stealthily sent out away by wooden horse; A kind of special social engineering is attacked, and in the time that user uses mobile device input account password, takes advantage of user on one side and does not note, the stealthily input of recording user at it.This two classes security attack can obtain user's account and password, as long as but cannot obtain the hardware sequence number of user's mobile device, all cannot calculate correct high strength password.
Suppose that certain application program is lower to cipher safety requirement, maximum length only allows 16, only allows the content as password with letter and number.The high strength password generating so has (26+26+10) ^16, and namely 47,672,401,706,823,533,450,263,330,816.Supposing that illegal hacker is per second can check 1,000,000 password, and checking out so all passwords needs 1.5x10^15.This time is equivalent to 328,626 times of the age of the earth 4600000000 years.That is to say, the very possible earth has not existed, and does not complete and also crack.The password of this intensity, has enough protected user's safety.
The present embodiment provides one to take into account safety and cipher-code input method easily, for in the time that mobile terminal is inputted password, generate the cryptographic algorithm of mating according to apparatus characteristic or environmental characteristic, the password that user is inputted in terminal or gesture track are after cryptographic algorithm computing, generate high strength password and offer the application program in terminal, the security that improves user cipher with this.
Above content is detailed description made for the present invention in conjunction with specific embodiments, can not assert that the concrete enforcement of the present invention only limits to these explanations.For those skilled in the art, without departing from the inventive concept of the premise, can also make some simple deduction or replace, all should be considered as belonging to the scope of protection of the invention.

Claims (10)

1. take into account safety and a cipher-code input method easily, it is characterized in that, comprise the following steps:
1) input frame of judging current input focus place is Password Input frame;
2) obtain apparatus characteristic or environmental characteristic;
3) obtain the original password that user inputs;
4) according to described step 2) apparatus characteristic or the environmental characteristic that obtain, and the original password of described step 3) user's input of obtaining, calculate high strength password by special algorithm;
5) the high strength password described step 4) being calculated is inserted in the Password Input frame of described step 1) judgement.
2. one as claimed in claim 1 is taken into account safety and cipher-code input method easily, it is characterized in that, described apparatus characteristic or environmental characteristic comprise: the constraint to password of hardware sequence number, application name and application program.
3. one as claimed in claim 2 is taken into account safety and cipher-code input method easily, it is characterized in that described step 2) specifically comprise the following steps:
21) obtain application name;
22) judge whether apparatus characteristic or the environmental characteristic of preservation according to application name;
23) obtain hardware sequence number;
24) obtain the constraint of application program to password;
25) preserve apparatus characteristic or environmental characteristic;
26) provide apparatus characteristic or environmental characteristic;
If described step 22) judgement has apparatus characteristic or the environmental characteristic of preservation, directly performs step 26), without performing step again 23), 24) and 25); If described step 22) judgement without preserve apparatus characteristic or environmental characteristic, perform step 23), 24) and 25) after perform step again 26).
4. one as claimed in claim 3 is taken into account safety and cipher-code input method easily, it is characterized in that, described step 4) specifically comprises the following steps:
41) by described step 21) application name obtaining, described step 23) original password that obtains of the hardware sequence number obtaining, described step 3) carries out combination in any to obtain password string;
42) by described step 41) password string that obtains calculates high strength password to be adjusted by special algorithm;
43) according to described step 24) constraint to password of the application program obtained, to described step 42) the high strength password to be adjusted that obtains adjusts, and obtains final high strength password.
5. take into account safety and cipher-code input method easily as the one as described in arbitrary in claim 1 to 4, it is characterized in that, described special algorithm is HASH algorithm.
6. one as claimed in claim 5 is taken into account safety and cipher-code input method easily, it is characterized in that, described HASH algorithm is any one algorithm in HMAC, SHA256, SHA512, RipeMD, WHIRLPOOL, SHA3, PBKDF2, bcrypt, scrypt or the combination in any of many algorithms.
7. as the one as described in arbitrary in claim 1 to 4 is taken into account safety and cipher-code input method easily, it is characterized in that, described step 3) specifically comprises following mode: a) user inputs original password by input method, or b) user's track input original password that uses gesture, or c) user inputs original password by the mode of phonetic entry, or d) user inputs original password by picture or the mode of taking pictures, or combination in any a), b), c), d).
8. one as claimed in claim 5 is taken into account safety and cipher-code input method easily, it is characterized in that, described step 3) specifically comprises following mode: a) user inputs original password by input method, or b) user's track input original password that uses gesture, or c) user inputs original password by the mode of phonetic entry, or d) user inputs original password by picture or the mode of taking pictures, or combination in any a), b), c), d).
9. one as claimed in claim 6 is taken into account safety and cipher-code input method easily, it is characterized in that, described step 3) specifically comprises following mode: a) user inputs original password by input method, or b) user's track input original password that uses gesture, or c) user inputs original password by the mode of phonetic entry, or d) user inputs original password by picture or the mode of taking pictures, or combination in any a), b), c), d).
10. take into account safety and cipher-code input method easily as the one as described in arbitrary in claim 1 to 4, it is characterized in that, described step 5) specifically comprises the following steps:
51) whether the content that judges Password Input frame is empty;
52) content of Password Input frame is emptied;
53) the high strength password described step 4) being calculated is inserted in Password Input frame;
If described step 51) judge that the content of Password Input frame is empty, directly perform step 53), without performing step again 52); If described step 51) judge Password Input frame content for empty, perform step 52) after perform step again 53).
CN201410338829.2A 2014-07-16 2014-07-16 Password inputting method with combination of safety and convenience Expired - Fee Related CN104091134B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410338829.2A CN104091134B (en) 2014-07-16 2014-07-16 Password inputting method with combination of safety and convenience

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410338829.2A CN104091134B (en) 2014-07-16 2014-07-16 Password inputting method with combination of safety and convenience

Publications (2)

Publication Number Publication Date
CN104091134A true CN104091134A (en) 2014-10-08
CN104091134B CN104091134B (en) 2017-01-18

Family

ID=51638849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410338829.2A Expired - Fee Related CN104091134B (en) 2014-07-16 2014-07-16 Password inputting method with combination of safety and convenience

Country Status (1)

Country Link
CN (1) CN104091134B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279424A (en) * 2015-11-02 2016-01-27 厦门雅迅网络股份有限公司 Pattern password intensity recognition method and device
CN106888086A (en) * 2017-02-13 2017-06-23 上海瀚之友信息技术服务有限公司 A kind of system and method for managing account number cipher
CN107423615A (en) * 2016-05-24 2017-12-01 华为终端(东莞)有限公司 A kind of method for generating cipher code and user terminal
CN107864034A (en) * 2017-02-20 2018-03-30 平安科技(深圳)有限公司 Cipher management method and device
CN108197461A (en) * 2017-12-28 2018-06-22 努比亚技术有限公司 A kind of cipher code protection method, mobile terminal and computer readable storage medium
WO2020095120A1 (en) * 2019-04-03 2020-05-14 苏云 Password generation method which simultaneously satisfies security and usability
CN112089595A (en) * 2020-05-22 2020-12-18 未来穿戴技术有限公司 Login method of neck massager, neck massager and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316112A (en) * 2011-09-16 2012-01-11 李建成 Password authentication method in network application and system
CN103428699A (en) * 2013-07-16 2013-12-04 李锦风 Registration binding and identity authentication method based on mobile phone hardware feature information
CN103984904A (en) * 2014-05-27 2014-08-13 深圳市欧珀通信软件有限公司 Method and device for preventing screen locking code of mobile terminal from being cracked

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279424A (en) * 2015-11-02 2016-01-27 厦门雅迅网络股份有限公司 Pattern password intensity recognition method and device
CN105279424B (en) * 2015-11-02 2020-09-11 厦门雅迅网络股份有限公司 Method and device for identifying strength of graphic password
CN107423615A (en) * 2016-05-24 2017-12-01 华为终端(东莞)有限公司 A kind of method for generating cipher code and user terminal
CN106888086A (en) * 2017-02-13 2017-06-23 上海瀚之友信息技术服务有限公司 A kind of system and method for managing account number cipher
CN106888086B (en) * 2017-02-13 2021-09-07 上海瀚之友信息技术服务有限公司 System and method for managing account password
CN107864034A (en) * 2017-02-20 2018-03-30 平安科技(深圳)有限公司 Cipher management method and device
CN108197461A (en) * 2017-12-28 2018-06-22 努比亚技术有限公司 A kind of cipher code protection method, mobile terminal and computer readable storage medium
WO2020095120A1 (en) * 2019-04-03 2020-05-14 苏云 Password generation method which simultaneously satisfies security and usability
CN112089595A (en) * 2020-05-22 2020-12-18 未来穿戴技术有限公司 Login method of neck massager, neck massager and storage medium

Also Published As

Publication number Publication date
CN104091134B (en) 2017-01-18

Similar Documents

Publication Publication Date Title
CN104091134B (en) Password inputting method with combination of safety and convenience
Ahvanooey et al. AITSteg: An innovative text steganography technique for hidden transmission of text message via social media
ES2829916T3 (en) Procedure, apparatus and system that provides a safety check
Sreelatha et al. Authentication schemes for session passwords using color and images
EP2248298B1 (en) Secure and usable protection of a roamable credentials store
US8254571B1 (en) Cryptographic system with halting key derivation function capabilities
US10503919B2 (en) Electronic signature framework with keystroke biometric authentication
EP2756628B1 (en) Method and device for securely sharing images across untrusted channels
US9805182B1 (en) Authentication using a client device and a mobile device
US9590808B2 (en) Obfuscated passwords
CN104834839B (en) A kind of code generating method, method for authenticating and associated terminal based on bar code
US20070271465A1 (en) Method of Authentication by Challenge-Response and Picturized-Text Recognition
CN105790962B (en) Method, device and system for acquiring conference document
US9882719B2 (en) Methods and systems for multi-factor authentication
EP3264309B1 (en) Information processing method and terminal, and a computer storage medium
KR101052294B1 (en) Apparatus and method for contents security
KR101267229B1 (en) Method and system for authenticating using input pattern
CN105556893B (en) Secure access using password to mobile device
CN105590044B (en) A kind of information authentication method and device
KR20130085566A (en) Apparatus and method of authentifying password using captcha
US8910260B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
CN103825911B (en) A kind of safety and the client-side program identity method to set up conveniently taken into account
US20190109710A1 (en) System and method for randomizing hidden messages in digital files
US20180124034A1 (en) Image based method, system and computer program product to authenticate user identity
Latvala et al. " Speak, Friend, and Enter"-Secure, Spoken One-Time Password Authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170118

Termination date: 20170716

CF01 Termination of patent right due to non-payment of annual fee