CN104134032A - Anti-peeping coded lock system based on visional confusion and anti-peeing unlocking method based on visional confusion - Google Patents

Anti-peeping coded lock system based on visional confusion and anti-peeing unlocking method based on visional confusion Download PDF

Info

Publication number
CN104134032A
CN104134032A CN201410369582.0A CN201410369582A CN104134032A CN 104134032 A CN104134032 A CN 104134032A CN 201410369582 A CN201410369582 A CN 201410369582A CN 104134032 A CN104134032 A CN 104134032A
Authority
CN
China
Prior art keywords
icon
password
icon set
peeping
release
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410369582.0A
Other languages
Chinese (zh)
Other versions
CN104134032B (en
Inventor
黄伟强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410369582.0A priority Critical patent/CN104134032B/en
Publication of CN104134032A publication Critical patent/CN104134032A/en
Application granted granted Critical
Publication of CN104134032B publication Critical patent/CN104134032B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an anti-peeping coded lock system based on visional confusion. The anti-peeping coded lock system based on visional confusion comprises a storing module, a setting module, a generating module, a displaying unit, an inputting unit, an obtaining module, a judging module and an unlocking module. The invention further discloses an anti-peeping unlocking method based on visional confusion. The unlocking method based on visional confusion comprises the following steps that an initial password is preset; a user enters an unlocking interface through activation operation; based on each password icon, an icon group comprising the password icon and multiple confusing icons is generated, and then random arrangement is conducted; the user finds all the icon groups comprising all the password icons on the unlocking interface through the initial password and conducts human-machine interactive operations in sequence so that the corresponding icon groups can relate; according to the execution sequence of the human-machine interactive operations, the icon groups are rearranged, and an icon group result sequence is generated; whether the icon group result sequence is matched with the initial password or not is judged through the judging module; unlocking action is executed. By the adoption of the anti-peeping coded lock system based on visional confusion, through visional confusion, the peeping resistance and the safety of an electronic device are effectively improved.

Description

A kind of anti-peeping coding lock system and unlock method of obscuring based on vision
Technical field
The present invention relates to coded lock and release technical field, relate in particular to a kind of anti-peeping unlock method of obscuring based on vision.
Background technology
In daily life, people log in website, log in E-mail address, ATM withdraws the money, the login of computer account, and the online payment of computer or mobile terminal, and unlocking screen and the safety command checking of the electronic equipment such as mobile phone all need to input password.
At present; user logs in website, E-mail address, ATM withdraws the money and during online payment; mainly to realize Password Input by keyboard input character; if other people spy on character or the gesture motion of keying in Password Input process; be easy to get password; then by password, remove safeguard protection easily, and then steal user's personal information and property.
For mobile phone, traditional unlocking manner mainly contains two kinds, and a kind of is the gesture motion such as on screen, to click or drag to carry out release, and the 2nd, by input character, carry out release.
All there is following defect in above unlocking manner (being password input mode): the mode of release is single; password is easily revealed; spiteful people can be by peeping user's unlocking operation; obtain user's password; mobile phone (wait the safeguard protection on electronic equipment to be disengaged easily, make user's) private property and information are stolen.
Summary of the invention
The object of the present invention is to provide a kind of anti-peeping coding lock system and unlock method thereof of obscuring based on vision.
For achieving the above object, the present invention is by the following technical solutions:
An anti-peeping coding lock system of obscuring based on vision, comprising:
Memory module, for storing icon material database;
Module is set, and for setting initial password, described initial password is a plurality of password icons of sequentially arranging, and described password icon is the icon of choosing in icon material database;
Generation module, based on each password icon, generate one and comprise this password icon and a plurality of icon set of obscuring icon, and a plurality of icon set that obtain are carried out to random alignment, generate icon set sequence, described in to obscure icon be random extract and the icon icon different from password icon in icon material database;
Display unit, for display icon group sequence;
Input block, carries out man-machine interactive operation with the corresponding icon set of association;
Acquisition module, for obtaining the associated icon set of man-machine interactive operation, and according to the execution order of man-machine interactive operation, rearranges icon set, generates icon set result sequence;
Judge module, judges whether icon set result sequence mates with initial password.
Separate lock module, for carrying out release action.
Preferably, described display unit is display screen.
Preferably, described input block is touch-screen, and described man-machine interactive operation is for touching by the relative position corresponding with icon set.
Whether preferably, it also comprises detection module, for detection of described relative position, touched and press.
An anti-peeping unlock method of obscuring based on vision, comprises the following steps:
S1, preset initial password, described initial password is a plurality of password icons of sequentially arranging, and described password icon is the icon of choosing in icon material database;
S2, user, by activation manipulation, enter release interface;
S3, based on each password icon, generation module generates one and comprises this password icon and a plurality of icon set of obscuring icon, then a plurality of icon set that obtain are carried out to random alignment, generate icon set sequence and be also presented on release interface, described in to obscure icon be generation module random icon extracting in icon material database;
S4, user find respectively the icon set that comprises each password icon on release interface according to initial password, and the ordering of the password icon based in initial password, sequentially carry out man-machine interactive operation with the corresponding icon set of association;
S5, acquisition module obtain execution order and the associated icon set thereof of man-machine interactive operation, and according to the execution order of man-machine interactive operation, icon set are rearranged, and generate icon set result sequence;
S6, judge module judge whether icon set result sequence mates with initial password, if so, judges release success and performs step S7, if not, judge release failure and point out the information of release mistake;
S7, execution release action.
Preferably, described step S4 specifically comprises step by step following:
S41, user find respectively the icon set that comprises each password icon on release interface according to initial password, and according to the ordering of password icon in initial password, determine the ordering of icon set;
S42, according to the ordering of icon set, sequentially carry out man-machine interactive operation with the corresponding icon set of association, described man-machine interactive operation is on touch-screen, to touch by the relative position corresponding with icon set;
Whether S43, detection module detect position corresponding to each icon set and by tactile, are pressed, and if so, perform step S5, if not, keep the information of lock-out state prompting operation mistake;
Preferably, described step S6 is specially: to each the identical sorting position in icon set result sequence and initial password, icon set and password icon are compared, judge and in this icon set, whether comprise this password icon, if, judge release success and perform step S7, if not, judging release failure and point out the information of release mistake.
Preferably, described step S6 is specially: to each icon set in icon set result sequence, extract its password icon comprising as password icon to be verified, obtain the password icon to be verified of sequentially being arranged by a plurality of, whether password icon and password to be verified that judgement is positioned at each identical sorting position are identical icons, if so, judge release success and perform step S7, if not, judge release failure and point out the information of release mistake.
Preferably, the icon in described icon material database be letter, numeral, plant, animal, landscape, personage, portrait, geometric one or more.
Adopt after technique scheme, the present invention compares with background technology, and tool has the following advantages:
1, the present invention, by by password icon with obscure icon and be mingled in icon set, even if other people spy on the screen message in releasing process, also cannot determine password icon and complete password, has effectively improved anti-peeping property and the security of electronic equipment.
2, the icon of obscuring in icon set generates at random, and while making each release, icon set takes on a different character, and other people cannot carry out correct unlocking operation according to the icon set feature of spying on before.
3, when each release, a plurality of icon set random alignment, therefore each release gesture is different, even if other people spy on certain or certain user's gesture motion in releasing process several times, also correct password be cannot obtain thus, thereby anti-peeping property and the security of electronic equipment further improved.
Accompanying drawing explanation
Fig. 1 is the structural representation of coding lock system of the present invention.
Fig. 2 is the schematic flow sheet of unlock method of the present invention.
Fig. 3 is the schematic diagram at release interface.
Fig. 4 is the schematic diagram at another release interface.
Fig. 5 has shown the result of a plurality of icon set that generate according to password icon.
Fig. 6 has shown the result after a plurality of icon set random alignment.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
Embodiment
Refer to Fig. 1, the invention discloses a kind of anti-peeping coding lock system of obscuring based on vision, comprise memory module 1, module 2 is set, generation module 3, display unit 4, input block 5, acquisition module 6, judge module 7, separate lock module 8 and detection module 9, wherein:
Memory module 1 is for storing icon material database, the icon in icon material database be letter, numeral, plant, animal, landscape, personage, portrait, geometric one or more.
Module 2 is set for setting initial password, initial password is a plurality of password icons of sequentially arranging, and password icon is the icon of choosing in icon material database.
Generation module 3 is according to each password icon, generate one and comprise this password icon and a plurality of icon set of obscuring icon, and a plurality of icon set that obtain are carried out to random alignment, and generate icon set sequence, obscuring icon is random extract and the icon different from password icon in icon material database.
Display unit 4 is for display icon group sequence.In the present embodiment, display unit 4 is display screen.
Input block 5 is for carrying out man-machine interactive operation with the corresponding icon set of association, and it can adopt the man-machine interaction instruments such as mouse, keyboard, touch-screen.In the present embodiment, input block 5 is touch-screen, by touching, by the relative position corresponding with icon set, realizes man-machine interactive operation.
Acquisition module 6 is for obtaining the associated icon set of man-machine interactive operation, and according to the execution order of man-machine interactive operation, icon set rearranged, and generates icon set result sequence.
Judge module 7 is for judging whether icon set result sequence mates with initial password.
Separate lock module 8 for carrying out release action, the release of mentioning here action refers to be removed password locking state and enters new program interface.Take mobile phone as example, and release action refers to the relieving lock state of screen owner interface of starting with of going forward side by side, and take again ATM (automatic teller machine) as example, release action refer to remove password locking state and enter inquiry, the business procedure interface such as withdraw the money, transfer accounts.
Whether detection module 9 is touched and is pressed for detection of the relative position corresponding with icon set.
Refer to Fig. 1 and Fig. 2, the invention also discloses a kind of anti-peeping unlock method of obscuring based on vision, comprise the following steps:
S1, preset initial password, initial password is a plurality of password icons of sequentially arranging, and password icon is the icon of choosing in icon material database.Each password icon is as a cryptographic element, and a plurality of password icons have formed the initial password with multidigit cryptographic element.Icon in icon material database can be letter, numeral, plant, animal, landscape, personage, portrait, geometric one or more, user can like selecting voluntarily according to individual.
The figure place that it will be understood by those skilled in the art that initial password is more, and level of security is higher, but unlocking operation is also more complicated; Accordingly, the figure place of initial password is fewer, and level of security is lower, and unlocking operation is also easier.The figure place of initial password, user can and need according to personal habits to set flexibly, and the present invention is not specifically limited the figure place of initial password.
S2, user, by activation manipulation, enter release interface.Here the activation manipulation of mentioning refer to be push button exciting, click that screen activates or other can make user enter the operation at release interface, take mobile phone as example, user can complete activation manipulation by pressing specified button, take automatic drawing as example, user inserts bank card, and ATM (automatic teller machine) reads magnetic stripe can enter release interface.Here the release interface of mentioning refers to the interface that user carries out Password Input.
S3, based on each password icon, generation module 3 generates one and comprises this password icon and a plurality of icon set of obscuring icon, then a plurality of icon set that obtain are carried out to random alignment, generate icon set sequence and be presented on release interface, obscuring icon is generation module 3 random icon extracting in icon material database.In each icon set, password icon is also random alignment with obscuring icon.
Certainly, the quantity of icon set also can be greater than or less than cipher code set quantity, after icon set is clicked, allows to generate new icon set, in each icon set, also can comprise, or do not comprise the arbitrary element of one or more cipher code set, the anti-peeping effect in the time of can more fully realizing Password Input like this.
S4, user find respectively the icon set that comprises each password icon on release interface according to initial password, and the ordering of the password icon based in initial password, sequentially carry out man-machine interactive operation with the corresponding icon set of association.According to the custom of people's common input password, normally since first password, once input, therefore in the present embodiment, the associated icon set of man-machine interactive operation has been considered to comprise the icon set of first password icon in initial password (i.e. the input of first password) for the first time, the like.This step specifically realizes by following steps:
S41, user find respectively the icon set that comprises each password icon on release interface according to initial password, and according to the ordering of password icon in initial password, determine the ordering of icon set.
S42, according to the ordering of icon set, sequentially carry out man-machine interactive operation with the corresponding icon set of association, man-machine interactive operation is on touch-screen, to touch by the relative position corresponding with icon set.
Relative position can be positioned at the position of icon set outside on release interface, for the ease of user, identifies relative position and is convenient to carry out man-machine interactive operation, and relative position is provided with sign icon.For example, shown in figure 3, relative position lay respectively at icon set under, on relative position, show finger type icon as sign icon, when user touches by certain finger type icon, can be associated icon set directly over it.
Relative position also can be positioned in the icon set on release interface, and user touches can finishing man-machine interaction operation (realizing the input of password) by the optional position at icon set place.
In addition, in order to increase the difficulty of decryption, relative position can be defined as in icon set to the position at the icon place of certain type, other people are when decryption like this, not only need to know the order of initial password and man-machine interactive operation, also need to know relative position, otherwise correctly release.For example, shown in figure 4, suppose that relative position is the position at animal icon place, relative position corresponding to first icon set of left number is the position at " green turtle " icon place, relative position corresponding to left several second icon set is the position at " doggie " icon place, left several the 3rd positions that the relative position that icon set is corresponding is " elephant " icon place.
Whether S43, detection module 9 detect position corresponding to each icon set and by tactile, are pressed, and if so, perform step S5, if not, keep lock-out state, do not carry out the information of any operation or prompt cipher input error.
S5, acquisition module 6 obtain execution order and the associated icon set thereof of man-machine interactive operation, and according to the execution order of man-machine interactive operation, icon set are rearranged, and generate icon set result sequence.It should be noted that, above-mentioned " icon set is rearranged " is not to realize and rearranging on screen, but rearranges icon set on Installed System Memory.
S6, judge module 7 judge whether icon set result sequence mates with initial password, if so, judges release success and performs step S7, if not, judge release failure and point out the information of release mistake.
This step can specifically realize by first method: to each the identical sorting position in icon set result sequence and initial password, icon set and password icon are compared, judge and in this icon set, whether comprise this password icon, if, judge release success and perform step S7, if not, judge release failure and point out the information of release mistake.
This step also can realize by second method: to each icon set in icon set result sequence, extract its password icon comprising as password icon to be verified, obtain the password icon to be verified of sequentially being arranged by a plurality of, whether password icon and password to be verified that judgement is positioned at each identical sorting position are identical icons, if, judge release success and perform step S7, if not, judging release failure and point out the information of release mistake.
Above two kinds of methods are all in order to judge whether icon set result sequence mates with initial password, difference is: first method is actually according to each password icon and sorting position thereof in initial password, judging in the icon set of identical sorting position whether have the icon identical with password icon, is password icon without removing to identify which icon in icon set; Second method is actually first identification and determines the password icon in each icon set, then judges that whether the two is identical at the password icon of identical sorting position.In the present embodiment, adopt first method to realize this step.
S7, execution release action.Here the release action of mentioning refers to, and after the correct input of password, removes electronic equipments safety lock-out state or by instruction state to be verified and enter new program interface.Take mobile phone as example, and release action refers to the relieving lock state of screen owner interface of starting with of going forward side by side; Take ATM (automatic teller machine) as example, release action refer to by instruction state to be verified and enter inquiry, the business procedure interface such as withdraw the money, transfer accounts; Take mobile phone e-Bank payment as example, carry out the action after the correct input of password, should comprise that releasing mobile phone lock-out state makes user allow operating handset to complete and places an order, and by the state to be verified of instruction, make user can complete payment.
For a better understanding of the present invention, below for touch-screen mobile phone, in conjunction with concrete operations example, be elaborated.Coordinate shown in Fig. 5 and Fig. 6, suppose that icon material database has comprised 10 digital icons and 26 alphabetical icons, digital icon is " 0 ", " 1 " ... " 9 ", and grapheme is designated as " A ", " B " ... " Z ".
Releasing process is specially:
1. user presets initial password for " K58 ", and initial password is three passwords, and its cryptographic element having is followed successively by password icon " K ", " 5 ", " 8 ".
2. user carries out activation manipulation by pressing key or the Home key of mobile phone, enters release interface.
3. with reference to shown in figure 5, generation module 3 generates 3 icon set, is respectively icon set α, β, γ, wherein:
Icon set α comprises password icon " K " and obscures icon " E ", " 7 ", " G ", " 3 ";
Icon set β comprises password icon " 5 " and obscures icon " 9 ", " B ", " F ", " 2 ";
Icon set γ comprises password icon " 8 " and obscures icon " L ", " H ", " U ", " C ".
Shown in figure 6, icon set α, β, γ are presented on release interface after random alignment, and icon set α is positioned at left several secondary series position, and icon set β is positioned at left several first rows position, and icon set γ is positioned at left several the 3rd column position.
4. user finds respectively the icon set that comprises each password icon on release interface according to initial password, that is: first in left several secondary series position, found password icon " K ", and then determined its place icon set α, with finger, touch by the optional position on icon set α (having preset the optional position in icon set is relative position), realize the association to icon set α; Then in left several first rows position, found password icon " 5 ", so determined its place icon set β, with finger, touch by the optional position on icon set β, realize the association to icon set β; Finally at left several the 3rd column positions, found password icon " 8 ", so determined its place icon set γ, with finger, touch by the optional position on icon set γ, realize the association to icon set γ.
5. acquisition module 6 obtains execution order and the associated icon set thereof of man-machine interactive operation, and according to the execution order of man-machine interactive operation, icon set is rearranged, generate icon set result sequence, that is: the associated icon set α of man-machine interactive operation is for the first time placed above the other things, the associated icon set β of man-machine interactive operation is for the second time placed on to second, the associated icon set γ of man-machine interactive operation is for the third time placed on to the 3rd, and the ordering of the icon set result sequence finally obtaining puts in order identical with icon set illustrated in fig. 5.
6. judge module 7 judges whether icon set result sequence mates with initial password, if so, judges release success and carries out next step, if not, judges release failure and points out the information of release mistake.That is: icon set result sequence is arranged with icon set α in order, β, γ, initial password is arranged with password icon " K " in order, " 5 ", " 8 ", according to corresponding arrangement position, judge respectively and in icon set α, whether comprise password icon " K ", in icon set β, whether comprise password icon " 5 ", in icon set γ, whether comprise password icon " 8 ", if each corresponding arrangement position all satisfies condition, judge release success and carry out next step, if exist the arrangement position of one or more correspondences not satisfy condition, judge release failure and point out the information of release mistake.
7. unlocking signal is sent to display unit 4, remove screen lock state, enter the main interface of mobile phone.
Certainly, unlock method of the present invention just can not be used for the release of mobile phone screen, also not can be applicable to the Password Input of automatic teller machine, also can be applicable to log in website, E-mail address and online payment etc. and need to input by electronic equipment the occasion of password.Take online payment as example, user can preset an initial password, generation module can generate a plurality of icon set consistent with initial password quantity and show, user is based on initial password and the icon set presenting, carry out corresponding man-machine interactive operation, realize the input of password, whether the password of payment system judgement input is correct, if correctly confirm, pay successfully (process of whole releasing process and the aforementioned touch-screen mobile phone unlocking screen relating to is basic identical) and also can be used as an anti-peeping cipher protection function before Password Input, as mobile phone password authentication, the cryptoguard of many one decks.
The above; be only the present invention's embodiment preferably, but protection scope of the present invention is not limited to this, is anyly familiar with in technical scope that those skilled in the art disclose in the present invention; the variation that can expect easily or replacement, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.

Claims (9)

1. an anti-peeping coding lock system of obscuring based on vision, is characterized in that: comprising:
Memory module, for storing icon material database;
Module is set, and for setting initial password, described initial password is a plurality of password icons of sequentially arranging, and described password icon is the icon of choosing in icon material database;
Generation module, based on each password icon, generate one and comprise this password icon and a plurality of icon set of obscuring icon, and a plurality of icon set that obtain are carried out to random alignment, generate icon set sequence, described in to obscure icon be random extract and the icon icon different from password icon in icon material database;
Display unit, for display icon group sequence;
Input block, carries out man-machine interactive operation with the corresponding icon set of association;
Acquisition module, for obtaining the associated icon set of man-machine interactive operation, and according to the execution order of man-machine interactive operation, rearranges icon set, generates icon set result sequence;
Judge module, judges whether icon set result sequence mates with initial password.
Separate lock module, for carrying out release action.
2. a kind of anti-peeping coding lock system of obscuring based on vision as claimed in claim 1, is characterized in that: described display unit is display screen.
3. a kind of anti-peeping coding lock system of obscuring based on vision as claimed in claim 2, is characterized in that: described input block is touch-screen, and described man-machine interactive operation is for touching by the relative position corresponding with icon set.
4. whether a kind of anti-peeping coding lock system of obscuring based on vision as claimed in claim 3, is characterized in that: it also comprises detection module, for detection of described relative position, touched and press.
5. an anti-peeping unlock method of obscuring based on vision, is characterized in that, comprises the following steps:
S1, preset initial password, described initial password is a plurality of password icons of sequentially arranging, and described password icon is the icon of choosing in icon material database;
S2, user, by activation manipulation, enter release interface;
S3, based on each password icon, generation module generates one and comprises this password icon and a plurality of icon set of obscuring icon, then a plurality of icon set that obtain are carried out to random alignment, generate icon set sequence and be also presented on release interface, described in to obscure icon be generation module random icon extracting in icon material database;
S4, user find respectively the icon set that comprises each password icon on release interface according to initial password, and the ordering of the password icon based in initial password, sequentially carry out man-machine interactive operation with the corresponding icon set of association;
S5, acquisition module obtain execution order and the associated icon set thereof of man-machine interactive operation, and according to the execution order of man-machine interactive operation, icon set are rearranged, and generate icon set result sequence;
S6, judge module judge whether icon set result sequence mates with initial password, if so, judges release success and performs step S7, if not, judge release failure and point out the information of release mistake;
S7, execution release action.
6. a kind of anti-peeping unlock method of obscuring based on vision as claimed in claim 5, is characterized in that, described step S4 specifically comprises step by step following:
S41, user find respectively the icon set that comprises each password icon on release interface according to initial password, and according to the ordering of password icon in initial password, determine the ordering of icon set;
S42, according to the ordering of icon set, sequentially carry out man-machine interactive operation with the corresponding icon set of association, described man-machine interactive operation is on touch-screen, to touch by the relative position corresponding with icon set;
Whether S43, detection module detect position corresponding to each icon set and by tactile, are pressed, and if so, perform step S5, if not, keep the information of lock-out state prompting operation mistake;
7. a kind of anti-peeping unlock method of obscuring based on vision as described in claim 5 or 6, it is characterized in that, described step S6 is specially: to each the identical sorting position in icon set result sequence and initial password, icon set and password icon are compared, judge in this icon set whether comprise this password icon, if so, judge release success and perform step S7, if not, judge release failure and point out the information of release mistake.
8. a kind of anti-peeping unlock method of obscuring based on vision as described in claim 5 or 6, it is characterized in that, described step S6 is specially: to each icon set in icon set result sequence, extract its password icon comprising as password icon to be verified, obtain the password icon to be verified of sequentially being arranged by a plurality of, whether password icon and password to be verified that judgement is positioned at each identical sorting position are identical icons, if, judge release success and perform step S7, if not, judge release failure and point out the information of release mistake.
9. a kind of anti-peeping unlock method of obscuring based on vision as claimed in claim 5, is characterized in that: the icon in described icon material database for letter, numeral, plant, animal, landscape, personage, portrait, geometric one or more.
CN201410369582.0A 2014-07-30 2014-07-30 The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured Active CN104134032B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410369582.0A CN104134032B (en) 2014-07-30 2014-07-30 The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410369582.0A CN104134032B (en) 2014-07-30 2014-07-30 The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured

Publications (2)

Publication Number Publication Date
CN104134032A true CN104134032A (en) 2014-11-05
CN104134032B CN104134032B (en) 2018-05-29

Family

ID=51806707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410369582.0A Active CN104134032B (en) 2014-07-30 2014-07-30 The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured

Country Status (1)

Country Link
CN (1) CN104134032B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680049A (en) * 2015-04-03 2015-06-03 于瑞清 Unlocking method
CN105354484A (en) * 2015-10-15 2016-02-24 上海斐讯数据通信技术有限公司 Electronic equipment unlocking method and system
CN105678130A (en) * 2015-12-31 2016-06-15 北京元心科技有限公司 Mobile terminal lock screen unlocking configuration method and device
CN105892808A (en) * 2016-03-30 2016-08-24 上海斐讯数据通信技术有限公司 Mobile terminal unlocking system and method and mobile terminal
CN105893832A (en) * 2016-03-30 2016-08-24 乐视控股(北京)有限公司 Unlocking method and system based on pictures
CN106203010A (en) * 2015-05-05 2016-12-07 希姆通信息技术(上海)有限公司 The unlocking pin method to set up of mobile terminal
WO2017032127A1 (en) * 2015-08-27 2017-03-02 广东欧珀移动通信有限公司 Pattern unlocking method and terminal
CN107423589A (en) * 2016-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of cipher-code input method and device
CN107679390A (en) * 2017-09-26 2018-02-09 维沃移动通信有限公司 A kind of screen-lock password processing method and mobile terminal
CN109426707A (en) * 2017-08-25 2019-03-05 京瓷办公信息系统株式会社 Electronic equipment and verification method
CN110033545A (en) * 2019-04-19 2019-07-19 中山市乐喜电子科技有限公司 Equipment unlocking method and intelligent door lock
TWI684888B (en) * 2018-08-28 2020-02-11 東隆五金工業股份有限公司 Password input management and control method of password lock device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183941B (en) * 2007-08-03 2011-03-09 廖睿 Random concealed inquiry type cipher authentication technique
CN103440109A (en) * 2013-09-16 2013-12-11 王恩惠 Touch screen unlocking method and system
WO2013189231A1 (en) * 2012-06-18 2013-12-27 惠州Tcl移动通信有限公司 Image-based face recognition unlocking method, system and electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183941B (en) * 2007-08-03 2011-03-09 廖睿 Random concealed inquiry type cipher authentication technique
WO2013189231A1 (en) * 2012-06-18 2013-12-27 惠州Tcl移动通信有限公司 Image-based face recognition unlocking method, system and electronic device
CN103440109A (en) * 2013-09-16 2013-12-11 王恩惠 Touch screen unlocking method and system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680049B (en) * 2015-04-03 2018-04-17 于瑞清 A kind of unlocking method
CN104680049A (en) * 2015-04-03 2015-06-03 于瑞清 Unlocking method
CN106203010A (en) * 2015-05-05 2016-12-07 希姆通信息技术(上海)有限公司 The unlocking pin method to set up of mobile terminal
WO2017032127A1 (en) * 2015-08-27 2017-03-02 广东欧珀移动通信有限公司 Pattern unlocking method and terminal
CN105354484A (en) * 2015-10-15 2016-02-24 上海斐讯数据通信技术有限公司 Electronic equipment unlocking method and system
CN105678130A (en) * 2015-12-31 2016-06-15 北京元心科技有限公司 Mobile terminal lock screen unlocking configuration method and device
CN105893832A (en) * 2016-03-30 2016-08-24 乐视控股(北京)有限公司 Unlocking method and system based on pictures
CN105892808A (en) * 2016-03-30 2016-08-24 上海斐讯数据通信技术有限公司 Mobile terminal unlocking system and method and mobile terminal
CN107423589A (en) * 2016-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of cipher-code input method and device
CN109426707A (en) * 2017-08-25 2019-03-05 京瓷办公信息系统株式会社 Electronic equipment and verification method
CN107679390A (en) * 2017-09-26 2018-02-09 维沃移动通信有限公司 A kind of screen-lock password processing method and mobile terminal
CN107679390B (en) * 2017-09-26 2019-11-22 维沃移动通信有限公司 A kind of screen-lock password processing method and mobile terminal
TWI684888B (en) * 2018-08-28 2020-02-11 東隆五金工業股份有限公司 Password input management and control method of password lock device
CN110033545A (en) * 2019-04-19 2019-07-19 中山市乐喜电子科技有限公司 Equipment unlocking method and intelligent door lock

Also Published As

Publication number Publication date
CN104134032B (en) 2018-05-29

Similar Documents

Publication Publication Date Title
CN104134032A (en) Anti-peeping coded lock system based on visional confusion and anti-peeing unlocking method based on visional confusion
RU2711351C2 (en) Device and method of password checking
CN107742362B (en) PIN verification
EP2856380B1 (en) Method and system for secure user identification
US8661532B2 (en) Method and apparatus for authenticating password
CN103677644A (en) Unlocking method and system for smart mobile terminal
WO2013082260A1 (en) Secure authorization
CN103795868A (en) Mobile terminal screen unlocking method and device and mobile terminal
CN103996011A (en) Method and device for protecting codes to be input safely
WO2010078827A1 (en) Security key inputting system for touch screen device
CN103838499A (en) Touch screen terminal unlocking method and touch screen terminal
JP2012108796A (en) Automatic transaction system, automatic transaction method and automatic transaction machine
US8117652B1 (en) Password input using mouse clicking
CN105354455B (en) State switching method and electronic equipment
CN102915199A (en) Method for executing program of electronic device with touch control function
JP2007087313A (en) Automatic transaction device
JP5471706B2 (en) Password input system, input method, and input program
JP6177729B2 (en) Electronics
JP2005250530A (en) Character input device
JP2013097730A (en) Information processing system and computer program
KR20130117371A (en) Method to unlock screen and perform secret task by finger tapping for touch screen devices
CN107423644B (en) Peep-proof touch feedback password input system and method
JP2005025284A (en) Password input information display device and method
JP5181726B2 (en) Automatic transaction equipment
CN204215402U (en) A kind of touch-screen mobile phone tripper

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant