CN104134032B - The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured - Google Patents

The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured Download PDF

Info

Publication number
CN104134032B
CN104134032B CN201410369582.0A CN201410369582A CN104134032B CN 104134032 B CN104134032 B CN 104134032B CN 201410369582 A CN201410369582 A CN 201410369582A CN 104134032 B CN104134032 B CN 104134032B
Authority
CN
China
Prior art keywords
icon
password
unlock
icon set
peeping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410369582.0A
Other languages
Chinese (zh)
Other versions
CN104134032A (en
Inventor
黄伟强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410369582.0A priority Critical patent/CN104134032B/en
Publication of CN104134032A publication Critical patent/CN104134032A/en
Application granted granted Critical
Publication of CN104134032B publication Critical patent/CN104134032B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses the anti-peeping coding lock system that a kind of view-based access control model is obscured, including memory module, setup module, generation module, display unit, input unit, acquisition module, judgment module and unlocked state.The invention also discloses the anti-peeping unlocking methods that a kind of view-based access control model is obscured, and comprise the following steps:Preset initial password;User is operated by activating, into unlock interface;Based on each password icon, generation one includes the password icon and multiple icon sets for obscuring icon, then carries out random alignment;User finds the icon set for including each password icon according to initial password respectively in unlock interface, and sequentially carries out man-machine interactive operation to associate corresponding icon set;Icon set is rearranged according to the execution order of man-machine interactive operation, generates icon set result sequence;Judgment module judges whether icon set result sequence matches with initial password;Perform unlocking motion.The present invention effectively increases the anti-peeping property and security of electronic equipment by visual confusion.

Description

The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured
Technical field
The present invention relates to the anti-peeping unlock sides that coded lock and unlocking technology field more particularly to a kind of view-based access control model are obscured Method.
Background technology
In daily life, people log in website, log in E-mail address, ATM withdrawals, computer Account Logon and computer Or the online payment of mobile terminal and unlocking screen and the safety command verification of the electronic equipments such as mobile phone are required for input password.
At present, when user logs in website, E-mail address, ATM withdrawals and online payment, input through keyboard word is mainly passed through Symbol realizes Password Input, if other people spy on typed character during Password Input or gesture motion, it is easy to Password is got, safeguard protection is easily then released by password, and then steals the personal information and property of user.
For mobile phone, there are mainly two types of traditional unlocking manners, and one kind is the hands such as to be clicked on or dragged on the screen Gesture action is unlocked, second is that being unlocked by inputting character.
There are following defects for above unlocking manner (i.e. password input mode):The mode of unlock is single, and password is easy Leakage, spiteful people can be operated by peeping the unlock of user, obtain the password of user so that mobile phone (waits electronics to set Standby upper safeguard protection is released from easily so that user's) private property and information stolen.
The content of the invention
The anti-peeping coding lock system and its unlocking method obscured it is an object of the invention to provide a kind of view-based access control model.
To achieve the above object, the present invention uses following technical scheme:
The anti-peeping coding lock system that a kind of view-based access control model is obscured, including:
Memory module, for storing icon material database;
Setup module, for setting initial password, the initial password is the password icon of multiple sequentials, described close Code icon is the icon chosen in icon material database;
Generation module, based on each password icon, generation one includes the password icon and multiple icons for obscuring icon Group, and multiple icon sets to obtaining carry out random alignment, generate icon set sequence, it is described to obscure icon in icon material database Icon icons extracting at random and different from password icon;
Display unit, for showing icon set sequence;
Input unit performs man-machine interactive operation to associate corresponding icon set;
Acquisition module, for obtaining the icon set associated by man-machine interactive operation, and according to the execution of man-machine interactive operation Order rearranges icon set, generates icon set result sequence;
Judgment module, judges whether icon set result sequence matches with initial password.
Unlocked state, for performing unlocking motion.
Preferably, the display unit is display screen.
Preferably, the input unit is touch-screen, and the man-machine interactive operation presses association corresponding with icon set to touch Position.
Preferably, detection module is further included, for detecting whether the relative position is pressed by tactile.
The anti-peeping unlocking method that a kind of view-based access control model is obscured, comprises the following steps:
S1, initial password is preset, the initial password is the password icon of multiple sequentials, the password icon For the icon chosen in icon material database;
S2, user are operated by activating, into unlock interface;
S3, based on each password icon, generation module generates one and includes the password icon and multiple figures for obscuring icon Then obtained multiple icon sets are carried out random alignment by mark group, generate icon set sequence and be shown in unlock interface, described It is the icon that generation module extracts at random in icon material database to obscure icon;
S4, user find the icon set for including each password icon, and base according to initial password respectively in unlock interface The ordering of password icon in initial password sequentially carries out man-machine interactive operation to associate corresponding icon set;
S5, acquisition module obtain the execution order of man-machine interactive operation and its associated icon set, and according to human-computer interaction The execution order of operation, rearranges icon set, generates icon set result sequence;
S6, judgment module judge whether icon set result sequence matches with initial password, if so, judging to unlock successfully simultaneously Step S7 is performed, if it is not, then judging unlock failure and prompting the information of unlock mistake;
S7, unlocking motion is performed.
Preferably, the step S4 specifically include it is following step by step:
S41, user find the icon set for including each password icon, and root according to initial password respectively in unlock interface According to the ordering of password icon in initial password, the ordering of icon set is determined;
S42, the ordering according to icon set sequentially carry out man-machine interactive operation to associate corresponding icon set, described Man-machine interactive operation presses relative position corresponding with icon set to touch on the touchscreen;
S43, detection module detect whether the corresponding position of each icon set is pressed by tactile, if so, step S5 is performed, if It is no, then it keeps lock-out state and prompts the information of operating mistake;
Preferably, the step S6 is specially:To each identical sequence position in icon set result sequence and initial password It puts, icon set and password icon is compared, judge whether comprising the password icon in the icon set, if so, judging solution It locks successfully and performs step S7, if it is not, then judging unlock failure and prompting the information of unlock mistake.
Preferably, the step S6 is specially:To each icon set in icon set result sequence, extract it includes it is close Code icon obtains the password icon to be verified by multiple sequentials, judges to be located at each identical as password icon to be verified Whether the password icon and password to be verified of sorting position are identical icons, if so, judging to unlock successfully and perform step S7, if it is not, then judging unlock failure and prompting the information of unlock mistake.
Preferably, the icon in the icon material database be letter, it is number, plant, animal, landscape, personage, portrait, several The one or more of what figure.
After adopting the above technical scheme, the present invention has the following advantages that compared with background technology:
1st, the present invention is by by password icon and obscuring icon and being mingled in icon set, even if other people spy on releasing process In screen message, can not also determine password icon and complete password, effectively increase the anti-peeping property and safety of electronic equipment Property.
2nd, the icon of obscuring in icon set generates at random so that and every time during unlock, icon set takes on a different character, other people Correctly unlock operation can not be carried out according to the icon set feature spied on before.
3rd, in each unlock, multiple icon set random alignments, therefore each unlock gesture is different, even if other people spy on To the user gesture action in certain or certain several times releasing process, correct password can not be also derived from, so as to further carry The high anti-peeping property and security of electronic equipment.
Description of the drawings
Fig. 1 is the structure diagram of coding lock system of the present invention.
Fig. 2 is the flow diagram of unlocking method of the present invention.
Fig. 3 is the schematic diagram of unlock interface.
Fig. 4 is the schematic diagram of another unlock interface.
Fig. 5 shows the result of the multiple icon sets generated according to password icon.
Fig. 6 is shown to the result after multiple icon set random alignments.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Embodiment
Referring to Fig. 1, the invention discloses the anti-peeping coding lock system that a kind of view-based access control model is obscured, including memory module 1st, setup module 2, generation module 3, display unit 4, input unit 5, acquisition module 6, judgment module 7, unlocked state 8 and detection Module 9, wherein:
Memory module 1 for storing icon material database, the icon in icon material database is letter, number, plant, animal, Landscape, personage, portrait, the one or more of geometric figure.
Setup module 2 is for setting initial password, and initial password is the password icon of multiple sequentials, and password icon is The icon chosen in icon material database.
Generation module 3 includes the password icon and multiple icons for obscuring icon according to each password icon, generation one Group, and multiple icon sets to obtaining carry out random alignment, generate icon set sequence, it is random in icon material database to obscure icon The extract and icon different from password icon.
Display unit 4 is used to show icon set sequence.In this example it is shown that unit 4 is display screen.
Input unit 5 can be used mouse, keyboard, touch for performing man-machine interactive operation to associate corresponding icon set Touch the man-machine interactive tools such as screen.In the present embodiment, input unit 5 is touch-screen, by touching by association corresponding with icon set Man-machine interactive operation is realized in position.
Acquisition module 6 is used to obtain the icon set associated by man-machine interactive operation, and according to the execution of man-machine interactive operation Order rearranges icon set, generates icon set result sequence.
Judgment module 7 is used to judge whether icon set result sequence matches with initial password.
For performing unlocking motion, unlocking motion mentioned herein refers to releasing password locking state simultaneously unlocked state 8 Into new program interface.By taking mobile phone as an example, unlocking motion refers to that relieving lock state of screen is gone forward side by side owner interface of starting with, again By taking ATM as an example, unlocking motion refers to releasing password locking state and into the business procedure such as inquiring about, withdraw the money, transferring accounts Interface.
Detection module 9 is pressed for whether detection relative position corresponding with icon set to be touched.
Please refer to Fig.1 and Fig. 2, the invention also discloses the anti-peeping unlocking method that a kind of view-based access control model is obscured, including with Lower step:
S1, initial password is preset, initial password is the password icon of multiple sequentials, and password icon is icon element The icon chosen in material storehouse.As a cryptographic element, multiple password icons are constituted with multidigit password each password icon The initial password of element.Icon in icon material database can be letter, number, plant, animal, landscape, personage, portrait, geometry The one or more of figure, user can like voluntarily selecting according to individual.
It will be understood by those skilled in the art that the digit of initial password is more, security level is higher, but unlocks operation Also it is more complicated;Correspondingly, the digit of initial password is fewer, security level is lower, and unlock operation is also easier.The position of initial password Number, user can be not specifically limited the digit of initial password according to personal habits and needs flexibly setting, the present invention.
S2, user are operated by activating, into unlock interface.It is mentioned herein activation operation refer to push button exciting, Screen activation or other operations that user can be made to enter unlock interface are clicked on, by taking mobile phone as an example, user presses by pressing to specify Activation operation can be completed in key, and by taking automatic drawing as an example, user is inserted into bank card, and ATM, which reads magnetic stripe, can enter solution Lock interface.Unlock interface mentioned herein refers to that user carries out the interface of Password Input.
S3, based on each password icon, generation module 3 generates one and includes the password icon and multiple figures for obscuring icon Then obtained multiple icon sets are carried out random alignment by mark group, generate icon set sequence and be shown in unlock interface, obscure Icon is the icon that generation module 3 extracts at random in icon material database.In each icon set, password icon and icon is obscured And random alignment.
Certainly, the quantity of icon set can also be more than or less than cipher code set quantity, and icon set allows to generate after being clicked New icon set, can also include in each icon set or the arbitrary element not comprising one or more cipher code sets, so can be with More fully realize anti-peeping effect during Password Input.
S4, user find the icon set for including each password icon, and base according to initial password respectively in unlock interface The ordering of password icon in initial password sequentially carries out man-machine interactive operation to associate corresponding icon set.According to The custom of people's common input password, typically once inputs since first password, therefore in the present embodiment, for the first time Icon set associated by man-machine interactive operation is considered as to contain the icon set (i.e. of first password icon in initial password The input of one password), and so on.The step is realized especially by following steps:
S41, user find the icon set for including each password icon, and root according to initial password respectively in unlock interface According to the ordering of password icon in initial password, the ordering of icon set is determined.
S42, the ordering according to icon set sequentially carry out man-machine interactive operation to associate corresponding icon set, man-machine Interactive operation presses relative position corresponding with icon set to touch on the touchscreen.
Relative position can be located at the position in unlock interface outside icon set, for the ease of user identify relative position and Man-machine interactive operation is convenient for, relative position is equipped with mark icon.For example, refering to what is shown in Fig. 3, relative position is located at respectively The underface of icon set shows finger type icon on relative position as mark icon, when user is touched by some finger type figure During mark, you can associate the icon set directly over it.
Relative position may be alternatively located in the icon set in unlock interface, and user touches any position as where icon set Finishing man-machine interaction operation (input for realizing password).
In addition, in order to increase the difficulty of decryption, relative position can be defined as to certain type of icon in icon set The position at place, so other people not only need to know initial password and the order of man-machine interactive operation, also need in decryption Know relative position, otherwise can not correctly unlock.For example, refering to what is shown in Fig. 4, assume relative position where animal icon Position, then the corresponding relative position of left first icon set of number is the position where " green turtle " icon, left second icon set of number Corresponding relative position is the position where " doggie " icon, and the 3rd corresponding relative position of icon set of left number is " elephant " figure Position where marking.
S43, detection module 9 detect whether the corresponding position of each icon set is pressed by tactile, if so, step S5 is performed, if It is no, then lock-out state is kept, i.e., does not perform the information of any operation or prompt cipher input error.
S5, acquisition module 6 obtain the execution order of man-machine interactive operation and its associated icon set, and according to human-computer interaction The execution order of operation, rearranges icon set, generates icon set result sequence.It should be noted that above-mentioned is " right Icon set is rearranged " it is not to realize to rearrange on the screen, but icon set is rearranged on Installed System Memory.
S6, judgment module 7 judge whether icon set result sequence matches with initial password, if so, judging to unlock successfully And step S7 is performed, if it is not, then judging unlock failure and prompting the information of unlock mistake.
The step can be realized especially by first method:To each identical in icon set result sequence and initial password Whether icon set and password icon are compared by sorting position, judge comprising the password icon in the icon set, if so, Judgement unlocks successfully and performs step S7, if it is not, then judging unlock failure and prompting the information of unlock mistake.
The step can also be realized by second method:To each icon set in icon set result sequence, its bag is extracted The password icon contained obtains the password icon to be verified by multiple sequentials, judges to be located at every as password icon to be verified Whether the password icon and password to be verified of a identical sorting position are identical icons, if so, judging to unlock successfully and hold Row step S7, if it is not, then judging unlock failure and prompting the information of unlock mistake.
Both the above method is for judging whether icon set result sequence matches with initial password, and difference exists In:First method is actually each password icon and its sorting position in initial password, judges identical sequence position Whether there is the icon identical with password icon in the icon set put, be password icon without removing which icon in identification icon set; The password icon in each icon set is determined in second method actually first identification, then judges the two in identical sequence position Whether the password icon put is identical.In the present embodiment, this step is realized using first method.
S7, unlocking motion is performed.After unlocking motion mentioned herein refers to that password correctly enters, electronic equipment is released Safe locking state or by instruct state to be verified and enter new program interface.By taking mobile phone as an example, what unlocking motion referred to It is that relieving lock state of screen is gone forward side by side owner interface of starting with;By taking ATM as an example, unlocking motion refers to treating by instruction Proofing state and into the business procedure interface such as inquiring about, withdraw the money, transferring accounts;By taking mobile phone e-Bank payment as an example, it is correctly defeated to perform password Action after entering, it should cause user that operating handset is allowed to complete to place an order and pass through instruction including releasing phone lock state State to be verified so that user can complete to pay the bill.
In order to be better understood from the present invention, below for touch-screen mobile phone, it is described in detail with reference to concrete operations example.Match somebody with somebody It closing shown in Fig. 5 and Fig. 6, it is assumed that icon material database contains the alphabetical icons of 10 digital icons and 26, digital icon is " 0 ", " 1 " ... " 9 ", grapheme are designated as " A ", " B " ... " Z ".
Releasing process is specially:
1. user presets initial password as " K58 ", i.e. initial password is three passwords, its cryptographic element It is followed successively by password icon " K ", " 5 ", " 8 ".
2. user is operated by the power button or Home key for pressing mobile phone into line activating, into unlock interface.
3. refering to what is shown in Fig. 5, generation module 3 generate 3 icon sets, be respectively icon set α, β, γ, wherein:
Icon set α includes password icon " K " and obscures icon " E ", " 7 ", " G ", " 3 ";
Icon set β includes password icon " 5 " and obscures icon " 9 ", " B ", " F ", " 2 ";
Icon set γ includes password icon " 8 " and obscures icon " L ", " H ", " U ", " C ".
Refering to what is shown in Fig. 6, icon set α, β, γ are shown in after random alignment in unlock interface, icon set α is located at left number Second column position, icon set β are located at left several first column positions, and icon set γ is located at left the 3rd column position of number.
4. user finds the icon set for including each password icon according to initial password respectively in unlock interface, i.e.,:First Password icon " K " is had found in left several second column positions, and then the icon set α where it is determined, is touched with finger by icon Any position (it is relative position to have preset any position in icon set) on group α, realizes the association to icon set α; Then password icon " 5 " is had found in left several first column positions, and then the icon set β where it is determined, touched and pressed with finger The association to icon set β is realized in any position on icon set β;Finally password icon is had found in left the 3rd column position of number " 8 ", and then the icon set γ where it is determined, it is touched by any position on icon set γ, is realized to icon set with finger The association of γ.
5. acquisition module 6 obtains the execution order of man-machine interactive operation and its associated icon set, and according to human-computer interaction The execution order of operation, rearranges icon set, generates icon set result sequence, i.e.,:First time human-computer interaction is grasped Make associated icon set α to place above the other things, the icon set β associated by second of man-machine interactive operation is placed on second, it will Icon set γ associated by third time man-machine interactive operation is placed on the 3rd, the arrangement time of the icon set result sequence finally obtained Sequence puts in order identical with icon set illustrated in fig. 5.
6. judgment module 7 judges whether icon set result sequence matches with initial password, if so, judging to unlock successfully simultaneously Next step is performed, if it is not, then judging unlock failure and prompting the information of unlock mistake.I.e.:Icon set result sequence in order is arranged Icon set α, β, γ are shown, initial password is arranged with password icon " K ", " 5 ", " 8 " in order, according to corresponding arrangement position, Whether judge respectively in icon set α comprising password icon " K ", whether comprising password icon " 5 " in icon set β, in icon set γ Whether comprising password icon " 8 ", if each corresponding arrangement position is satisfied by condition, judges to unlock successfully and perform next Step if there are one or more corresponding arrangement positions is unsatisfactory for condition, judges unlock failure and prompts the letter of unlock mistake Breath.
7. unlocking signal is sent to display unit 4, screen lock state is released, into mobile phone main interface.
Certainly, unlocking method of the present invention is more than to be used for the unlock of mobile phone screen, is also applicable in automatic teller machine Password Input, also can be applicable to log in website, E-mail address and online payment etc. need by electronic equipment input password Occasion.By taking online payment as an example, user can preset an initial password, and generation module can generate and initial password quantity Multiple icon sets unanimously are simultaneously shown that user is carried out corresponding man-machine based on initial password and the icon set showed Interactive operation, realizes the input of password, and payment system judges whether the password of input is correct, confirms if correct and pay successfully (process of entire releasing process and the foregoing touch-screen mobile phone unlocking screen being related to is essentially identical) can also be used as in Password Input A preceding anti-peeping cipher protection function, i.e., as mobile phone password authentication, more one layer of cryptoguard.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited thereto, Any one skilled in the art in the technical scope disclosed by the present invention, the change or replacement that can be readily occurred in, It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with scope of the claims Subject to.

Claims (3)

1. the anti-peeping unlocking method that a kind of view-based access control model is obscured, which is characterized in that comprise the following steps:
S1, initial password is preset, the initial password is the password icon of multiple sequentials, and the password icon is figure The icon chosen in mark material database, the icon in the icon material database is letter, number, plant, animal, landscape, personage, people Picture, the one or more of geometric figure, and position of the icon of a certain type in unlock interface is set as relative position;
S2, user are operated by activating, into unlock interface;
S3, based on each password icon, generation module generates one and includes the password icon and multiple icon sets for obscuring icon, Then obtained multiple icon sets are subjected to random alignment, generate icon set sequence and be shown in unlock interface, it is described to obscure Icon is the icon that generation module extracts at random in icon material database;
S4, user find the icon set for including each password icon according to initial password respectively in unlock interface, and based on just It is corresponding to associate sequentially to carry out man-machine interactive operation for the ordering of password icon and the relative position of setting in beginning password Icon set, specifically,
S41, user find the icon set for including each password icon according to initial password respectively in unlock interface, and according to first The ordering of password icon in beginning password determines the ordering of icon set;
S42, the ordering according to icon set sequentially carry out man-machine interactive operation to associate corresponding icon set, described man-machine Interactive operation presses relative position corresponding with icon set to touch on the touchscreen;
S43, detection module detect whether the corresponding position of each icon set is pressed by tactile, if so, step S5 is performed, if it is not, then Lock-out state is kept, does not perform the information of any operation or prompt cipher input error;
S5, acquisition module obtain the execution order of man-machine interactive operation and its associated icon set, and according to man-machine interactive operation Execution order, icon set is rearranged, generate icon set result sequence;
S6, judgment module judge whether icon set result sequence matches with initial password, if so, judging to unlock successfully and perform Step S7, if it is not, then judging unlock failure and prompting the information of unlock mistake;
S7, unlocking motion is performed.
2. the anti-peeping unlocking method that a kind of view-based access control model as described in claim 1 is obscured, which is characterized in that the step S6 Specially:To each identical sorting position in icon set result sequence and initial password, icon set and password icon are carried out Compare, judge whether comprising the password icon in the icon set, if so, judging to unlock successfully and perform step S7, if it is not, then Judge unlock failure and prompt the information of unlock mistake.
3. the anti-peeping unlocking method that a kind of view-based access control model as described in claim 1 is obscured, which is characterized in that the step S6 Specially:To each icon set in icon set result sequence, extract it includes password icon as password icon to be verified, It obtains the password icon to be verified by multiple sequentials, judges the password icon for being located at each identical sorting position and to be verified Whether password is identical icon, if so, judging to unlock successfully and perform step S7, if it is not, then judging unlock failure and carrying Show the information of unlock mistake.
CN201410369582.0A 2014-07-30 2014-07-30 The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured Expired - Fee Related CN104134032B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410369582.0A CN104134032B (en) 2014-07-30 2014-07-30 The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410369582.0A CN104134032B (en) 2014-07-30 2014-07-30 The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured

Publications (2)

Publication Number Publication Date
CN104134032A CN104134032A (en) 2014-11-05
CN104134032B true CN104134032B (en) 2018-05-29

Family

ID=51806707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410369582.0A Expired - Fee Related CN104134032B (en) 2014-07-30 2014-07-30 The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured

Country Status (1)

Country Link
CN (1) CN104134032B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680049B (en) * 2015-04-03 2018-04-17 于瑞清 A kind of unlocking method
CN106203010A (en) * 2015-05-05 2016-12-07 希姆通信息技术(上海)有限公司 The unlocking pin method to set up of mobile terminal
CN105095735B (en) * 2015-08-27 2017-11-24 广东欧珀移动通信有限公司 A kind of method and terminal of pattern unblock
CN105354484A (en) * 2015-10-15 2016-02-24 上海斐讯数据通信技术有限公司 Electronic equipment unlocking method and system
CN105678130A (en) * 2015-12-31 2016-06-15 北京元心科技有限公司 Mobile terminal lock screen unlocking configuration method and device
CN105892808A (en) * 2016-03-30 2016-08-24 上海斐讯数据通信技术有限公司 Mobile terminal unlocking system and method and mobile terminal
CN105893832A (en) * 2016-03-30 2016-08-24 乐视控股(北京)有限公司 Unlocking method and system based on pictures
CN107423589A (en) * 2016-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of cipher-code input method and device
JP6926823B2 (en) * 2017-08-25 2021-08-25 京セラドキュメントソリューションズ株式会社 Electronic devices and authentication methods
CN107679390B (en) * 2017-09-26 2019-11-22 维沃移动通信有限公司 A kind of screen-lock password processing method and mobile terminal
TWI684888B (en) * 2018-08-28 2020-02-11 東隆五金工業股份有限公司 Password input management and control method of password lock device
CN110033545A (en) * 2019-04-19 2019-07-19 中山市乐喜电子科技有限公司 Equipment unlocking method and intelligent door lock

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183941B (en) * 2007-08-03 2011-03-09 廖睿 Random concealed inquiry type cipher authentication technique
CN103440109A (en) * 2013-09-16 2013-12-11 王恩惠 Touch screen unlocking method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102760042A (en) * 2012-06-18 2012-10-31 惠州Tcl移动通信有限公司 Method and system for carrying out unlocking based on picture face identification, and electronic device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183941B (en) * 2007-08-03 2011-03-09 廖睿 Random concealed inquiry type cipher authentication technique
CN103440109A (en) * 2013-09-16 2013-12-11 王恩惠 Touch screen unlocking method and system

Also Published As

Publication number Publication date
CN104134032A (en) 2014-11-05

Similar Documents

Publication Publication Date Title
CN104134032B (en) The anti-peeping coding lock system and unlocking method that a kind of view-based access control model is obscured
CN104503631B (en) Cipher inputting keyboard, antitheft unlocking method and ATM
CN103870744B (en) A kind of method and electronic equipment for verifying password
CN104584086B (en) PIN is verified
JP5948498B2 (en) Method and system for securing user ID
CN107851147B (en) Authentication method and system
JP4309447B2 (en) Authentication apparatus, authentication method, authentication program, and computer-readable recording medium recording the same
US8661532B2 (en) Method and apparatus for authenticating password
CN103996011A (en) Method and device for protecting codes to be input safely
CN106407756A (en) Unlocking method and device
KR20070009457A (en) Automated teller machine using a biometrics
CN104200147A (en) Identity authentication method and system based on touch screen equipment and security and privacy encryption method
CN101676926A (en) Touch type electronic equipment and its authority control method
JP2012108796A (en) Automatic transaction system, automatic transaction method and automatic transaction machine
CN103714457B (en) Method for verifying transaction
CN105989269A (en) Unlocking method and device and multi-system terminal
JP2007087313A (en) Automatic transaction device
CN108491703A (en) A kind of double verification unlocking method and system based on comprehensive screen equipment
KR101392113B1 (en) Fingerprint locking system
GB2454459A (en) Personal identification code entry device
CN106570386A (en) Touch screen unlocking method and system
JP2005250530A (en) Character input device
KR20130117371A (en) Method to unlock screen and perform secret task by finger tapping for touch screen devices
JP2016001426A (en) Information input device and input information determination method using touch panel
CN107423644B (en) Peep-proof touch feedback password input system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180529

CF01 Termination of patent right due to non-payment of annual fee