CN104102872A - Password protection method and system - Google Patents
Password protection method and system Download PDFInfo
- Publication number
- CN104102872A CN104102872A CN201310127551.XA CN201310127551A CN104102872A CN 104102872 A CN104102872 A CN 104102872A CN 201310127551 A CN201310127551 A CN 201310127551A CN 104102872 A CN104102872 A CN 104102872A
- Authority
- CN
- China
- Prior art keywords
- coordinate
- characters
- password
- server
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Abstract
The invention provides a password protection method and system. The method comprises the following steps: making all characters randomly correspond to the coordinates of an X-Y coordinate system by using a server, and recording corresponding relations between all characters and the coordinates; generating a picture according to the corresponding relations between all the characters and the coordinates by using the server, and transmitting the picture to a user phone; making a reply to the server by inputting coordinates which correspond to password characters into the user phone according to the picture; converting the coordinates which correspond to the password characters into password characters according to the corresponding relations between the characters and the coordinates by using the serve to finish password verification. Compared with the prior art, the password protection method and system have the advantages that password login is finished through a short message without inputting a password on a page; all characters of a keyboard are shown in the form of a coordinate graph, and the password input by a user is coordinate position information, so that high confidentiality is realized; safe, convenient and rapid password protection is realized.
Description
Technical field
The present invention relates to data service technical field, relate in particular to a kind of cipher code protection method and system.
Background technology
Along with the development of data service, active user accesses online business hall or other system interface (as WLAN interface etc.) by desktop computer, carry out business handling as operations such as login, inquiry tickets, all need to input password and carry out register, input at present password and mainly undertaken by keyboard or soft keyboard.
In prior art; in the scheme by checking account number cipher protection log-on message; there is a kind of method of utilizing mouse to complete password logon operation; the encrypted message of storing in output information by mouse action processing module and described storage unit compares; if identical; output password correct signal, otherwise output password rub-out signal.
A kind of method of utilizing user action information to carry out cryptoguard is provided in other scheme, has responded to user's sequence by action sensing module to produce action message, and action message is offered to described identification module.Identification module is for during detecting that record controls module produces control signal, produce movement locus data according to action message, during detecting that record controls module stops producing control signal, according to the character in movement locus Data Matching character database to generate character password information.Password authentication module is for comparing character password information and preset password information, to carry out password authentification.
In other scheme, a kind of system of utilizing picture that cryptoguard is set is provided, be applied in the electronic installation that comprises touch-screen, this system comprises: picture is selected module, for select a width picture from this electronic installation; Password arranges module, for construction two-dimensional coordinate system on described touch-screen, reads and the coordinate of the touch point that recording user is clicked on this picture step-up error scope according to click order; Determine touch area, wherein, this click order is considered as the input sequence of password; Picture insmods, for being written into the picture that carries out password setting; And authentication module, the touch point coordinate of clicking on the picture of this setting for reading user, whether the touch point clicked of checking is within the scope of described touch area and whether meet the input sequence of password, thus whether authentication password input is correct.
In other scheme, a kind of method for network authorization based on cryptoguard is provided, server is first using the character random number as password, then its corresponding relation is stored in the database of server; The corresponding relation between character and numbering is generated as picture by server, and this picture is sent to client, shows by client; User is according to the information on Showing Picture, and the numbering that input is corresponding with the password arranging, sends authentication information by user end to server; Finally, service end, according to the corresponding relation of the character of storing in database and numbering thereof, is reduced into the authentication information receiving in the password of representative, then by the password of reduction and the authentication information comparison of the former setting of user, if consistent, certification is passed through.
Realizing in process of the present invention, inventor finds that existing scheme exists following shortcoming:
The cryptoguard scheme of prior art all need to be inputted password in the WEB page, and this mode exists the risk of being obtained password by means such as wooden horses, thereby has reduced the degree of safety of overall cryptoguard.In addition, it is high that existing scheme realizes secret method difficulty, can not meet the demand for efficient cryptoguard scheme in real work.
Summary of the invention
The object of the invention is to overcome the shortcoming and defect of prior art, a kind of cipher code protection method and system are provided.
A kind of cipher code protection method, described method comprises:
Server by all characters at random corresponding to X, the coordinate place of Y coordinate system, and record the corresponding relation of each described character and coordinate;
Described server, by the corresponding relation generating pictures of all described characters and coordinate, sends to user mobile phone;
According to described picture, on described user mobile phone, input coordinate corresponding to code characters, reply to described server;
Described server, according to the corresponding relation of described character and coordinate, is described code characters by coordinate conversion corresponding described code characters, completes password authentification.
Before described method, also comprise:
Password is set on the registration terminal WEB page and generates encryption button;
User clicks described password and generates and encrypt after button, server by all characters at random corresponding to X, the coordinate place of Y coordinate system.
Described method also comprises:
The every click of user once described password generates and encrypts button, server all again by all characters at random corresponding to X, the coordinate place of Y coordinate system is once.
Described by all characters at random corresponding to X, the coordinate place of Y coordinate system, comprising:
By the character in all actual keyboard at random corresponding to X, the coordinate place of Y coordinate system, the coordinate that each described character is corresponding different.
Described user mobile phone is registered on server in advance for user.
Described server, by the mode of note or multimedia message, sends to described user mobile phone by described picture;
Described user mobile phone, by coordinate corresponding described code characters, sends to described server by short message mode.
A kind of cipher protection system, described system comprises server and user mobile phone, wherein,
Described server, for by all characters at random corresponding to X, the coordinate place of Y coordinate system, and record the corresponding relation of each described character and coordinate; By the corresponding relation generating pictures of all described characters and coordinate, send to described user mobile phone; And be described code characters by the coordinate conversion corresponding to code characters of described user mobile phone reply, complete password authentification;
Described user mobile phone, for receiving all described character of described server transmission and the corresponding relation generating pictures of coordinate, coordinate corresponding to input code characters, replies to described server.
Described system also comprises registration terminal, generates and encrypts button for password is set on the WEB page affiliated, and user clicks described password and generates and encrypt after button, notify described server by all characters at random corresponding to X, the coordinate place of Y coordinate system.
Described server comprises coordinate corresponding unit, picture generation unit, Transmit-Receive Unit and authentication unit, wherein,
Described coordinate corresponding unit, for by all characters at random corresponding to X, the coordinate place of Y coordinate system, and record the corresponding relation of each described character and coordinate;
Described picture generation unit, for by the corresponding relation generating pictures of all described characters and coordinate;
Described Transmit-Receive Unit, for described picture is sent to described user mobile phone, and receives coordinate corresponding to code characters that described user mobile phone is replied;
Described authentication unit, is described code characters for coordinate conversion corresponding to code characters that described user mobile phone is replied, and completes password authentification.
Described server also comprises encryption trigger element, generates enciphered message, and notify described coordinate corresponding unit for receiving described password.
The present invention, by when user carries out password login, all corresponds to characters all on keyboard in a coordinate system, the coordinate that each character is corresponding different.Then, the corresponding relation of character and coordinate is sent to user mobile phone by the form of picture, user, according to the corresponding relation in these pictures, inputs coordinate corresponding to code characters, and returns to server.Server is reduced into code characters by these coordinates again, completes password authentification.Compared with prior art, the present invention completes password by note and logs in, without inputting password at the page; The all characters of keyboard are represented in the mode of coordinate diagram, and the password of user's input is co-ordinate position information, strong security; Realize safety, cryptoguard easily and efficiently, can integrate as a kind of and move new function to the high mobile subscriber of security requirements is promoted, improved client's viscosity.
Brief description of the drawings
The cipher code protection method principle flow chart that Fig. 1 provides for the embodiment of the present invention 1;
The cipher protection apparatus structural representation that Fig. 2 provides for the embodiment of the present invention 2;
The cipher protection apparatus application flow schematic diagram that Fig. 3 provides for the embodiment of the present invention 3;
The cipher protection system structural representation that Fig. 4 provides for the embodiment of the present invention 4;
Server architecture schematic diagram in the cipher protection system that Fig. 5 provides for the embodiment of the present invention 5.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in detail.But embodiments of the present invention are not limited to this.
In prior art, user accesses online business hall or other system interface (as WLAN) by desktop computer, carry out business handling as operations such as login, inquiry tickets, all need to input password and carry out register, input password is mainly undertaken by keyboard or soft keyboard at present, but as long as input password in the page, all may there is the possibility being snatched password by bogusware.The embodiment of the present invention proposes a kind of method that completes password login by SMS, solves user's login problem from communication network channel, thoroughly solves the safety problem existing at desktop computer input password.First user clicks password and generates encryption button on the WEB page, and server is placed on all characters on keyboard certain intersection point place of coordinate system (X, Y) at random.As character A, can be placed on the intersection point place of coordinate (1,3).On backstage, the corresponding relation of each character and coordinate is given to record.Server sends to all characters on the mobile phone of user's registration in advance at the position of coordinate system generating pictures, end user inputs the corresponding coordinate of own code characters on mobile phone, the reply server of sending short messages, server, according to the corresponding relation of character before and after the encryption of record, completes page register automatically.
In the embodiment of the present invention, the page of user login can with server communication, server can be communicated by letter with the note/MMS gateway of common carrier, thereby realizes by the process of the mode authentication password of SMS/multimedia message.The embodiment of the present invention does not limit concrete applied environment.
As shown in Figure 1, be the cipher code protection method principle flow chart that the embodiment of the present invention 1 provides, specific as follows:
Step 10, server by all characters at random corresponding to X, the coordinate place of Y coordinate system, and record the corresponding relation of each character and coordinate.
Here the process that in fact also needs a business to trigger.Namely, only have user to trigger after the business of password encryption, just carry out relevant cryptoguard.The process triggering is generally password to be set on the registration terminal WEB page generate encryption button; User clicks password and generates and encrypt after button, server by all characters at random corresponding to X, the coordinate place of Y coordinate system.This password generates and encrypts button is exactly the button that business triggers.
Simultaneously, this password generates and encrypts button is also to trigger the button that refreshes password encryption, password of the every click of user generates encrypts button, server all again by all characters at random corresponding to X, the coordinate place of Y coordinate system once, ensures that with this corresponding relation between each character and coordinate system is all random.
Corresponding between character and coordinate system, in fact be exactly by the X that the corresponds to random character in all actual keyboard, in Y coordinate system, the coordinate that each character is corresponding different, and each corresponding result is all random, ensure like this randomness of corresponding relation.The character namely actual capabilities used is the random X that corresponds to all, and in Y coordinate system, the corresponding coordinate of each character, sets up relation one to one.And this corresponding relation is random, each all different corresponding results.
Step 20, server, by the corresponding relation generating pictures of all characters and coordinate, sends to user mobile phone.
The user mobile phone is here to register in advance server, thereby server can know information is sent to which mobile phone by this.Server normally sends these pictures by the mode of multimedia message, also can send to user mobile phone by note or alternate manner.
These picture records the corresponding relation between all character and coordinates, can be all information that records in a pictures, also can be divided into plurality of pictures record.For example, the intersection point (1,3) in the corresponding one-tenth of character A coordinate system, is just presented in picture in the mode of this correspondence.User can be known the corresponding relation of character and coordinate very intuitively from picture.
In concrete implementation, the information of the unlikely registered user's mobile phone of server or send note/multimedia message with user mobile phone, thereby actual is to complete by the note/MMS gateway of common carrier.Server connects the note/MMS gateway of common carrier, and the relevant information content is sent to gateway, and the note/multimedia message being completed between user mobile phone by gateway is communicated by letter.
Step 30 according to picture, is inputted coordinate corresponding to code characters on user mobile phone, replies to server.
User mobile phone receives after these pictures, and user can be according to the content on picture, knows the corresponding relation between character and the coordinate system on keyboard, thereby can know coordinate corresponding to password of oneself.User need to input coordinate corresponding to these code characters on user mobile phone, then replies to server.
Reply, conventionally by the mode of note, can certainly be passed through other any effective communication mode.Conventionally user mobile phone sends to these information the note/MMS gateway of common carrier, is transmitted to server by note/MMS gateway.
Step 40, server, according to the corresponding relation of character and coordinate, is code characters by coordinate conversion corresponding code characters, completes password authentification.
Server, receiving after the information of user mobile phone reply, can be known the coordinate information that user cipher character is corresponding, according to these coordinate informations, can obtain the code characters that coordinate information is corresponding, thereby know user's password.Carry out password authentification according to this password, just can complete the checking work to password in practical application.
So far, the overall plan of cryptoguard can complete.Its core concept is that user is in the time that login system (or business handling) need carry out password authentification, the all characters on keyboard are placed at random coordinate (X by application system, Y) certain coordinate place, and after the corresponding relation of each character and coordinate is recorded on backstage, all characters are sent to MMS gateway at the position of coordinate generating pictures, and sending to user mobile phone by MMS gateway, user can reply coordinate that own password is corresponding to MMS gateway.Application system is obtained short message content from MMS gateway, to the coordinate information in content and before the character corresponding relation of record compare, verify after being converted to code characters, evaded front page layout Password Input and operated the disclosure risk that may exist.
As shown in Figure 2, the embodiment of the present invention 2 provides a kind of cipher protection apparatus, comprising application system door, application system authentication management device, MMS gateway, customer mobile terminal (mobile phone), specifically, application system user (asu), i.e. system login account.
Application system authentication management device, has comprised password encryption generation module and password automated validation module.This system is the operation system of communication user access, as operation systems such as online business hall, WLAN, group customer VPN, Web banks.
Password encryption generation module, the all characters on keyboard are placed at random coordinate (X by application system, Y) certain intersection point place is (as character A, be placed on (1,3) intersection point place), and after the corresponding relation of each character and coordinate is recorded on backstage, all characters are sent to MMS gateway at the position of coordinate generating pictures.
Password automated validation module, the information that reception need provide the user mobile phone of password to reply, automated validation password login system.
Short Message Service Gateway is used to provide multimedia message access code, realizes the platform of the descending transmission of multimedia message and up reply management.
Customer mobile terminal (mobile phone) comprises receiver module and replys module.Receiver module, receives the identifying code note that operation system sends by MMS gateway.Reply module, reply coordinate corresponding to code characters (as, user's original code is A, replys (1,3) according to coordinate position) note is to MMS gateway, and by MMS gateway, submits to application system.
The device that the present embodiment provides is actually the device of the concrete application of above-described embodiment, be exactly concrete user for system user, application system authentication management device is exactly server, and MMS gateway is the medium contacting between server and user mobile phone, and customer mobile terminal is exactly user mobile phone.The device providing by the present embodiment, can well realize the concrete scheme of above-described embodiment.
As shown in Figure 3, the schematic flow sheet of the device specific implementation cryptoguard providing for above-described embodiment, specific as follows:
1, user's access application system page is submitted login or transacting business application to.
2, user clicks and generates Crypted password button, the all characters on keyboard are placed at random coordinate (X by application system, Y) certain intersection point place is (as character A, be placed on (1,3) intersection point place), and after the corresponding relation of each character and coordinate is recorded on backstage, all characters are sent to MMS gateway at the position of coordinate generating pictures.
3, the multimedia message that MMS gateway reception application system is submitted to sends request, and this multimedia message is sent on mobile terminal (mobile phone).
4, user is on mobile phone, replys coordinate information that password is corresponding to MMS gateway.
5, password automated validation module is obtained the content of this user's note from multimedia message platform according to phone number, and coordinate information is changed into character information, and compares with the password in system, by logging in;
6, return and log in successfully the page in user interface.
So far, wholely carry out by direct answer short message identifying code the flow process that rapid authentication realizes the method for cryptoguard and finish.
Furthermore, when user has submitted the application of generation Crypted password to, system is by the corresponding one-tenth of all characters coordinate content on keyboard, and as character A, correspondence becomes (1,3).System is preserved the character corresponding relation before and after encrypting, and prepares against after user inputs correct password and verifies.System is by the coordinate information of all characters on keyboard, by the patterned coordinate picture of JAVA supervisor language generation.System sends program by multimedia message, and the multimedia message service number providing by MMS gateway, sends to MMS gateway.This coordinate picture is sent to user mobile phone by MMS gateway.User mobile phone receives multimedia message picture.User checks coordinate corresponding to character on picture, replys the coordinate information that password is corresponding on mobile phone, if user cipher is A, on mobile phone, replys (1,3) to MMS gateway.MMS gateway receives this user's short message content.Not broken link MMS gateway of password automated validation module, receives this user's short message content by phone number, obtain the password content of this note.The coordinate information of system verification user input, changes coordinate information by character corresponding relation before and after the encryption of preserving before, then compares with the real password that system is preserved, by login automatically, not by returning to login failure.
As shown in Figure 4, the embodiment of the present invention 4 provides a kind of cipher protection system, and this system comprises server and user mobile phone, wherein,
Server, for by all characters at random corresponding to X, the coordinate place of Y coordinate system, and record the corresponding relation of each character and coordinate; By the corresponding relation generating pictures of all characters and coordinate, send to user mobile phone; And be code characters by the coordinate conversion corresponding to code characters of user mobile phone reply, complete password authentification;
User mobile phone, all characters that send for reception server and the corresponding relation generating pictures of coordinate, coordinate corresponding to input code characters, replies to server.
This system also comprises registration terminal, generates and encrypts button for password is set on the WEB page affiliated, and user clicks password and generates and encrypt after button, announcement server by all characters at random corresponding to X, the coordinate place of Y coordinate system.
As shown in Figure 5, the server that the embodiment of the present invention 5 provides comprises coordinate corresponding unit 501, picture generation unit 502, Transmit-Receive Unit 503 and authentication unit 504, wherein,
Coordinate corresponding unit 501, for by all characters at random corresponding to X, the coordinate place of Y coordinate system, and record the corresponding relation of each character and coordinate;
Picture generation unit 502, for by the corresponding relation generating pictures of all characters and coordinate;
Transmit-Receive Unit 503, for picture is sent to user mobile phone, and receives coordinate corresponding to code characters that user mobile phone is replied;
Authentication unit 504, is code characters for coordinate conversion corresponding to code characters that user mobile phone is replied, and completes password authentification.
Further, this server also comprises encrypts trigger element 505, generates enciphered message for receiving password, and notification coordinates corresponding unit 501.
It should be noted that: the cipher protection system that above-described embodiment provides is in the time of cryptoguard; only be illustrated with the division of above-mentioned each functional module; in practical application; can above-mentioned functions be distributed and completed by different functional modules as required; be divided into different functional modules by the inner structure of system, to complete all or part of function described above.In addition, cipher code protection method, device and cipher protection system embodiment that above-described embodiment provides belong to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
To sum up, the present invention, by when user carries out password login, all corresponds to characters all on keyboard in a coordinate system, the coordinate that each character is corresponding different.Then, the corresponding relation of character and coordinate is sent to user mobile phone by the form of picture, user, according to the corresponding relation in these pictures, inputs coordinate corresponding to code characters, and returns to server.Server is reduced into code characters by these coordinates again, completes password authentification.Compared with prior art, the present invention completes password by note and logs in, without inputting password at the page; The all characters of keyboard are represented in the mode of coordinate diagram, and the password of user's input is co-ordinate position information, strong security; Realize safety, cryptoguard easily and efficiently, can integrate as a kind of and move new function to the high mobile subscriber of security requirements is promoted, improved client's viscosity.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
Above-described embodiment is preferably embodiment of the present invention; but embodiments of the present invention are not restricted to the described embodiments; other any do not deviate from change, the modification done under Spirit Essence of the present invention and principle, substitutes, combination, simplify; all should be equivalent substitute mode, within being included in protection scope of the present invention.
Claims (10)
1. a cipher code protection method, is characterized in that, described method comprises:
Server by all characters at random corresponding to X, the coordinate place of Y coordinate system, and record the corresponding relation of each described character and coordinate;
Described server, by the corresponding relation generating pictures of all described characters and coordinate, sends to user mobile phone;
According to described picture, on described user mobile phone, input coordinate corresponding to code characters, reply to described server;
Described server, according to the corresponding relation of described character and coordinate, is described code characters by coordinate conversion corresponding described code characters, completes password authentification.
2. the method for claim 1, is characterized in that, before described method, also comprises:
Password is set on the registration terminal WEB page and generates encryption button;
User clicks described password and generates and encrypt after button, server by all characters at random corresponding to X, the coordinate place of Y coordinate system.
3. method as claimed in claim 2, is characterized in that, described method also comprises:
The every click of user once described password generates and encrypts button, server all again by all characters at random corresponding to X, the coordinate place of Y coordinate system is once.
4. the method for claim 1, is characterized in that, described by all characters at random corresponding to X, the coordinate place of Y coordinate system, comprising:
By the character in all actual keyboard at random corresponding to X, the coordinate place of Y coordinate system, the coordinate that each described character is corresponding different.
5. the method for claim 1, is characterized in that, described user mobile phone is registered on server in advance for user.
6. the method for claim 1, is characterized in that, described server, by the mode of note or multimedia message, sends to described user mobile phone by described picture;
Described user mobile phone, by coordinate corresponding described code characters, sends to described server by short message mode.
7. a cipher protection system, is characterized in that, described system comprises server and user mobile phone, wherein,
Described server, for by all characters at random corresponding to X, the coordinate place of Y coordinate system, and record the corresponding relation of each described character and coordinate; By the corresponding relation generating pictures of all described characters and coordinate, send to described user mobile phone; And be described code characters by the coordinate conversion corresponding to code characters of described user mobile phone reply, complete password authentification;
Described user mobile phone, for receiving all described character of described server transmission and the corresponding relation generating pictures of coordinate, coordinate corresponding to input code characters, replies to described server.
8. system as claimed in claim 7, it is characterized in that, described system also comprises registration terminal, for being set on the affiliated WEB page, password generates encryption button, user clicks described password and generates after encryption button, notify described server by all characters at random corresponding to X, the coordinate place of Y coordinate system.
9. system as claimed in claim 7, is characterized in that, described server comprises coordinate corresponding unit, picture generation unit, Transmit-Receive Unit and authentication unit, wherein,
Described coordinate corresponding unit, for by all characters at random corresponding to X, the coordinate place of Y coordinate system, and record the corresponding relation of each described character and coordinate;
Described picture generation unit, for by the corresponding relation generating pictures of all described characters and coordinate;
Described Transmit-Receive Unit, for described picture is sent to described user mobile phone, and receives coordinate corresponding to code characters that described user mobile phone is replied;
Described authentication unit, is described code characters for coordinate conversion corresponding to code characters that described user mobile phone is replied, and completes password authentification.
10. system as claimed in claim 9, is characterized in that, described server also comprises encryption trigger element, generates enciphered message, and notify described coordinate corresponding unit for receiving described password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310127551.XA CN104102872A (en) | 2013-04-12 | 2013-04-12 | Password protection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310127551.XA CN104102872A (en) | 2013-04-12 | 2013-04-12 | Password protection method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104102872A true CN104102872A (en) | 2014-10-15 |
Family
ID=51671015
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310127551.XA Pending CN104102872A (en) | 2013-04-12 | 2013-04-12 | Password protection method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104102872A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015184783A1 (en) * | 2014-10-21 | 2015-12-10 | 中兴通讯股份有限公司 | Password generation method, device, and system |
CN105991519A (en) * | 2015-01-29 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Method, device and system of verifying identifying codes |
CN109257379A (en) * | 2018-11-07 | 2019-01-22 | 郑州云海信息技术有限公司 | A kind of detection method of trojan horse program, device, equipment and storage medium |
CN111847533A (en) * | 2020-05-25 | 2020-10-30 | 安徽普偌森环保科技有限公司 | Integrated domestic sewage treatment engineering management system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101162489A (en) * | 2007-11-26 | 2008-04-16 | 唐荣华 | Personate photograph producing method used for keep input secret and method of use thereof |
US20090172810A1 (en) * | 2007-12-28 | 2009-07-02 | Sungkyunkwan University Foundation For Corporate Collaboration | Apparatus and method for inputting graphical password using wheel interface in embedded system |
CN101645121A (en) * | 2008-08-06 | 2010-02-10 | 深圳富泰宏精密工业有限公司 | System and method for setting password protection by utilizing picture |
CN101695107A (en) * | 2009-10-09 | 2010-04-14 | 北京数码视讯科技股份有限公司 | Method of soft keyboard for safely inputting code of set top box of digital television |
CN101813992A (en) * | 2010-05-07 | 2010-08-25 | 深圳视融达科技有限公司 | Touch screen and password-inputting method thereof |
CN101827360A (en) * | 2010-04-09 | 2010-09-08 | 中兴通讯股份有限公司 | Method and device for setting communication terminal graphical passwords |
-
2013
- 2013-04-12 CN CN201310127551.XA patent/CN104102872A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101162489A (en) * | 2007-11-26 | 2008-04-16 | 唐荣华 | Personate photograph producing method used for keep input secret and method of use thereof |
US20090172810A1 (en) * | 2007-12-28 | 2009-07-02 | Sungkyunkwan University Foundation For Corporate Collaboration | Apparatus and method for inputting graphical password using wheel interface in embedded system |
CN101645121A (en) * | 2008-08-06 | 2010-02-10 | 深圳富泰宏精密工业有限公司 | System and method for setting password protection by utilizing picture |
CN101695107A (en) * | 2009-10-09 | 2010-04-14 | 北京数码视讯科技股份有限公司 | Method of soft keyboard for safely inputting code of set top box of digital television |
CN101827360A (en) * | 2010-04-09 | 2010-09-08 | 中兴通讯股份有限公司 | Method and device for setting communication terminal graphical passwords |
CN101813992A (en) * | 2010-05-07 | 2010-08-25 | 深圳视融达科技有限公司 | Touch screen and password-inputting method thereof |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015184783A1 (en) * | 2014-10-21 | 2015-12-10 | 中兴通讯股份有限公司 | Password generation method, device, and system |
CN105592450A (en) * | 2014-10-21 | 2016-05-18 | 中兴通讯股份有限公司 | Password generation method, password generation device and password generation system |
CN105991519A (en) * | 2015-01-29 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Method, device and system of verifying identifying codes |
CN109257379A (en) * | 2018-11-07 | 2019-01-22 | 郑州云海信息技术有限公司 | A kind of detection method of trojan horse program, device, equipment and storage medium |
CN111847533A (en) * | 2020-05-25 | 2020-10-30 | 安徽普偌森环保科技有限公司 | Integrated domestic sewage treatment engineering management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108551437B (en) | Method and apparatus for authenticating information | |
CN103986688B (en) | Method of authenticating a user of a peripheral apparatus, a peripheral apparatus, and a system for authenticating a user of a peripheral apparatus | |
CN104144419B (en) | Identity authentication method, device and system | |
CN108989346B (en) | Third-party valid identity escrow agile authentication access method based on account hiding | |
CN108256340B (en) | Data acquisition method and device, terminal equipment and storage medium | |
CN103825734A (en) | Sensitive operation verification method, terminal equipment, server and verification system | |
CN103929402A (en) | Sensitive operation verification method, terminal device, servers and verification system | |
CN104253784A (en) | Logging and authorization method and system | |
CN103986584A (en) | Double-factor identity verification method based on intelligent equipment | |
KR101532109B1 (en) | Signature method and device | |
CN104021333A (en) | Mobile security fob | |
CN104270338A (en) | A method and system of electronic identity registration and authentication login | |
CN106796708B (en) | Electronic voting system and method | |
US11184352B2 (en) | Systems and methods for activating an authentication token within a communication platform | |
CN101305375A (en) | System and method for controlling distribution of electronic information | |
CN103618717A (en) | Multi-account client information dynamic authentication method, device and system | |
CN103607416A (en) | Method and application system for authenticating identity of network terminal machine | |
CN103840944A (en) | Short message authentication method, server and system | |
CN104350722A (en) | Method and devices for managing user accounts across multiple electronic devices | |
CN105723373A (en) | Method for encoding an access to a computer resource | |
CN112434334A (en) | Data processing method, device, equipment and storage medium | |
CN101951385B (en) | Service switching method for electronic transaction platform | |
TW201640409A (en) | System and method for communicating credentials | |
CN108463970A (en) | The method and system of protection and retrieval secret information | |
CN112016075B (en) | Travel information verification method based on block chain, electronic device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141015 |
|
RJ01 | Rejection of invention patent application after publication |