CN104537300B - Security password setting and verification mode - Google Patents

Security password setting and verification mode Download PDF

Info

Publication number
CN104537300B
CN104537300B CN201410829454.XA CN201410829454A CN104537300B CN 104537300 B CN104537300 B CN 104537300B CN 201410829454 A CN201410829454 A CN 201410829454A CN 104537300 B CN104537300 B CN 104537300B
Authority
CN
China
Prior art keywords
password
code
input
user
fundamental cryptographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410829454.XA
Other languages
Chinese (zh)
Other versions
CN104537300A (en
Inventor
蒋艾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Financial Assets Trading Center Co ltd
Original Assignee
MIANYANG AIJIA TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MIANYANG AIJIA TECHNOLOGY Co Ltd filed Critical MIANYANG AIJIA TECHNOLOGY Co Ltd
Priority to CN201410829454.XA priority Critical patent/CN104537300B/en
Publication of CN104537300A publication Critical patent/CN104537300A/en
Application granted granted Critical
Publication of CN104537300B publication Critical patent/CN104537300B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A kind of setting of security password and verification mode, which is characterized in that, the following steps are included: A, being set by the user fundamental cryptographic, the fundamental cryptographic is made of the orderly character code of multidigit for it;B, setting encryption principle, according to encryption principle to the fundamental cryptographic carry out cryptographic calculation and formed include the valid code word and/or the valid code word location information that can be used for verifying user identity verifying password, and give the user with encryption principle it is consistent encryption input prompt;C, the composition of agreement input password makes to input password to include the interference code for being used to hide effective code position that need to carry out the effective code and an at least bit length of the verification of character code value and/or character code value position verification;D, when the character code value of the effective code in user's password currently entered and/or the character code location information consistent with the information that the verifying password is included, determine that the input of user's current password is correct, which passes through verifying.The present invention is greatly improved Password Input safety, and password is effectively prevent to be peeped surreptitiously and decoded.

Description

Security password setting and verification mode
[technical field]
The present invention relates to cryptosecurity field, in particular to a kind of novel security password setting and verification mode.
[background technique]
When people use phonecard, credit card, bank card, security door and computer equipment in exposure occasion, often Need to input the legitimacy of the identity of corresponding personal identification number user for confirmation on input terminal.However people are inputting When inputting password in terminal, password tends to be peeped or decoded by other people.For example, for bank ATM terminal, criminal's warp It often installs camera near bank ATM terminal to snatch password, when user inputs password, criminal can be drawn by video It records user and is input password in face.For another example for, equipped with the security door of Password Input, criminal can equally pass through peace in family Fill camera stealing passwords.In addition, for the password of security door, if people are when in use, replacement password infrequently, then long The input operation of phase, which will to input the high key of frequency number, to be worn, be allowed to be clearly distinguishable from be not frequently used by Key, thus the true password figure of exposure user.For another example for the digital product of touch class, if digital product screen occupies greasy dirt Or whens dust etc., it will leave a trace when inputting password, to be easy to decode user password.For computer, criminal It can be easy to crack out the used password of user by corresponding keyboard equipments of recording.To sum up, existing Password Input Mode is too simple, is easily stolen and peeps or decode, safety has to be strengthened.
For the safety for reinforcing Password Input, bank, hospital etc. provide only some simple safeguard measures at present, such as When user inputs password, it is desirable that other people stand outside one-meter line, or installation blocks box and avoids being peeped in input keyboard, or mentions For virtual random digit keyboard, allows user to be inputted by mouse and be recorded to avoid password etc..These measures Although tool has certain effect, there is no the safety issues for fundamentally solving password for it.
[summary of the invention]
To solve the above problems, the present invention provides a kind of easy to use, high safety, it is low in cost, it can prevent from peeping surreptitiously Security password setting and verification mode.
To achieve the above object, the present invention provides a kind of setting of security password and verification modes, which is characterized in that it is wrapped Include following steps:
A, it is set by the user fundamental cryptographic, the fundamental cryptographic is made of the orderly character code of multidigit;
B, setting encryption principle carries out cryptographic calculation and is formed to include available according to encryption principle to the fundamental cryptographic In the valid code word of verifying user identity and/or the verifying password of the valid code word location information, and gives the user and encrypt The consistent encryption of principle inputs prompt;
C, the composition of agreement input password makes to input password to include that need to carry out the verification of character code value and/or the character code value position The interference code for being used to hide effective code position of the effective code of verification and at least a bit length;
D, when the character code value of the effective code in user's password currently entered and/or the character code location information and the verifying When the information that password is included is consistent, determine that the input of user's current password is correct, which passes through verifying.
The encryption principle is at random using the numerical value of several character codes in fundamental cryptographic as effective word in verifying password The location information of code uses.
It is described encryption principle be at random in fundamental cryptographic several character codes carry out operation and obtain verifying password in have Imitate the numerical value of character code.
The encryption principle is to carry out operation to a certain position character code in fundamental cryptographic at random, and make what is obtained after operation to test The length for demonstrate,proving the valid code word in password is consistent with the length of the fundamental cryptographic.
The encryption principle be at random by the numerical value of a certain position character code in fundamental cryptographic plus or minus a certain numerical value and The consistent valid code word of formation length.
It further includes agreement type of alarm step, currently entered close when user is by agreement type of alarm input password Code is by password authentification, and the preset alarm system that links simultaneously is alarmed.
The type of alarm is to input preset alarm code in input nonlinearities code.
The type of alarm is to merely enter defeated interference code or elder generation after fundamental cryptographic or first defeated fundamental cryptographic when inputting password Defeated fundamental cryptographic after defeated interference code.
The type of alarm is the reverse fundamental cryptographic of input sequence in password when inputting password.
Favorable attributes of the invention are, efficiently solve the above problem.The present invention is passed through by setting encryption principle Original basis password is converted into the verifying password for needing to input by encryption principle, to thoroughly hide true fundamental cryptographic Come, so that others has no way of peeping surreptitiously.In addition, the present invention increases on the basis of fundamental cryptographic for hiding effective code position information Interference code so that the effective code for playing verifying be got mixed up, and then prevents others from peeping surreptitiously and decoding.Since interference code is to use The character code of family stochastic inputs, therefore others is difficult to seek the true rule of password.And it encrypts principle and then more makes true basis close Code is hidden.Compared with the prior art, the mode that the present invention inputs password is safer by the present invention, meanwhile, the present invention also has Have it is easy to use, it is low in cost, the features such as having a wide range of application, preferably vigorously implement.
[Detailed description of the invention]
Fig. 1 is the relational graph of fundamental cryptographic and verifying password of the invention.
Fig. 2 is the composite structural diagram of verifying password of the invention.
Fig. 3 is the composite structural diagram of input password of the invention.
[specific embodiment]
The following example is that of the invention is explained further and being supplemented, and is not limited in any way to the present invention.
It as shown in FIG. 1 to 3, is the safety for reinforcing existing password, the present invention provides a kind of novel security passwords Setting and verification mode.The password is by interference code and encryption principle, so that true fundamental cryptographic is hidden and is difficult to It is peeped surreptitiously, so as to greatly reinforce the safety of Password Input.
Specifically, security password setting of the invention and verification mode the following steps are included:
S1, it is set by the user fundamental cryptographic.The fundamental cryptographic is the character code for identity validation of user setting, i.e., often True, the character code that need to verify in rule meaning.The fundamental cryptographic by user according to related system password setting principle into Row setting.If user is when bank counter handles bank card and opens card business, bank requires the password of six digits of setting, then user sets The six digits password set is fundamental cryptographic of the present invention.When for another example user uses safe-guard door lock, initial setting up is anti- When stealing the password of door, the password of the initial setting up is then fundamental cryptographic of the present invention.To sum up, the fundamental cryptographic is It is directly set, and the character code without conversion, is stored in relevant Database Systems by user.
The composition of S2, agreement input password make to input password to include effective code and interference code.The effective code is to need to carry out The character code of the verification of character code value and/or position verification, but continuous orderly character code, can also be the several of discrete specific position A character code.The interference code is used to hide the position of effective code, plays interference effect, for preventing other people from obtaining Password Input rule It restrains and breaks a code.A interference code at least bit length.The composition of the input password can be by input terminal or with input eventually Matching used system is held to be arranged, to instruct user to unify its input behavior.The effective code and interference code can be Number can also be letter.To be used evenly the input key on input terminal, can arrange to input the total length of password with it is defeated The quantity for entering the input key in terminal is corresponding.For example, leading on most input terminal for the input password of pure digi-tal Standing to have 0-9 totally 10 digital keys, therefore, the total length that can arrange to input password is 10, to avoid part frequency of use High key is worn and makes other people that can decode out true fundamental cryptographic.
S3, setting encryption principle, form verifying password according to fundamental cryptographic and encryption principle:
Setting encryption principle can further hide fundamental cryptographic, be allowed to be more difficult to be decrypted and peep surreptitiously, to further add The safety of strong cipher input.The encryption principle refers to be carried out fundamental cryptographic operation and is formed and can verify that testing for user identity Demonstrate,prove password.According to different encryption principles, different verifying passwords can be formed.The verifying password includes at least several positions need to be into The valid code word of row character code value verification, in some cases, the verifying password may also include the location information of valid code word.
The encryption principle is to be generated valid code word based on fundamental cryptographic and/or be based on fundamental cryptographic and generate effective word The location information of code.It, which can be, carries out operations and direct to wherein one or in which several character codes in fundamental cryptographic at random Valid code word consistent in length out is also possible at random using the numerical value of the wherein character code in fundamental cryptographic as valid code word Location information.Since encryption principle is varied, for purposes of illustration only, the present embodiment citing introduces 3 kinds, it may include following add Close principle but it is not limited to following encryption principle:
Encryption principle one: by the numerical value plus or minus a numerical value of wherein a character code for fundamental cryptographic, make its result Form the valid code word in verifying password.It, can at random will be basic when being encrypted to the fundamental cryptographic if fundamental cryptographic is 123456 2nd+8 progress operation of password, then the valid code word in verifying password is just 203456.
Encrypt principle two: using the numerical value of a wherein character code for fundamental cryptographic as the preposition interference code before basic password Length, and the numerical value is removed makes in fundamental cryptographic remaining character code as the valid code word verified in password afterwards.For example, original Fundamental cryptographic be 123456, when encryption and when encryption input, can by the 3 of the third position length as preposition interference code, and by The 3 of third position remove after 12456 as verifying password in valid code word, then verify password should include 12456 effective word The location information of code value information and the effective word code value.When user inputs password, correctly inputting password should be * * * 12456 ..., the interference code ... ... that wherein * represents a stochastic inputs represents several interference codes of stochastic inputs.
Encrypt principle three:, then will be basic using the value of a wherein character code for fundamental cryptographic as preposition interference number of codes The value of wherein two character codes of password carries out operation and obtains valid code word.For example, original fundamental cryptographic is 378926, encryption When, it regard the 3rd character code " 8 " of password as preposition interference number of codes, inputs the 2nd and the 6th character code units after being added It is worth " 3 ", then regard the 1st digit " 3 " of password as preposition interference number of codes, input the 4th and the 5th character code is after being added a Bit value " 1 " then verifies character code value and location information that password should include two valid code words, and correctly inputting password should For * * * 1****3 ....The interference code ... ... that wherein * represents a stochastic inputs represents several interference codes of stochastic inputs.
Above-mentioned encryption principle can be overlapped operation, can single encryption principle carry out multiple stacking encryption, can also be A variety of encryption principles are overlapped encryption.Such as encrypt principle three can multiple stacking encryption and form more complicated verifying password.It is logical Encryption principle is crossed, fundamental cryptographic can be stashed.For encrypt principle one, for convenient for unified management, due to the length of password Degree should be fixed, so the length of the valid code word of the verifying password formed after encryption should be with original fundamental cryptographic length one It causes.For example, user preset has 6 fundamental cryptographics for bank ATM terminal, then the valid code word verified in password also should be 6 Position, in order to which user's mental arithmetic carries out Password Input.This cipher mode of principle one is encrypted to calculate simply, it is user-friendly.It is right Password authentification can be greatly simplified due to the energy length of location interference code and the position of fundamental cryptographic in encryption principle two Difficulty reduces the password probability identical with proper password arbitrarily inputted, to greatly improve the safety of password, reduces password The difficulty being decrypted.For encrypting principle three, since it is verified with the character code value and location information of valid code word, most The password inputted eventually differs greatly with original basis password, therefore is quite difficult to be broken a code by other people and encrypts principle, therefore it is pacified Full property highest, is suitable for the quite high system of security requirement, in terms of military project.
When user inputs password on input terminal, the display interface of input terminal provides encryption input prompt.It is described Encryption input prompt is that user is prompted to carry out encryption input to fundamental cryptographic according to preset encryption principle.For example, certain bank card The fundamental cryptographic of user setting is 123456, which is pre-stored in the Database Systems of bank.When user need to input password into When row banking operates, the following information of display interface prompt of input terminal: fundamental cryptographic the 2nd+8.Simultaneously, bank Database Systems the information that fundamental cryptographic corresponding to the bank card is 123456 is sent to ATM terminal, ATM terminal according to It is 203456 that the encryption principle of " fundamental cryptographic the 2nd+8 ", which calculates verifying password,.In 10 digit passwords of user's input at this time If including continuous 203456 character code, password is correct, which passes through verifying.If in 10 digit passwords of user's input not It include 203456, then password mistake, password can not pass through verifying.For another example, the fundamental cryptographic of certain Internetbank user setting is 123456, which is pre-stored in the Database Systems of corresponding system, when user, which need to input password, carries out related service operation, The display interface of input terminal can prompt following information: please using the 3rd bit digital of fundamental cryptographic as the length of preposition interference code, And remove the digital input basic password.At the same time, the effective word being transported out from the background according to encryption principle two in verifying password Code is 12456, and the initial position of the valid code word is the 4th.At this time user input 10 digit passwords in, if the 4th extremely 8th number matches with 12456, then password is correct, which passes through verifying.For another example, the fundamental cryptographic of certain user setting It is 378926, which is pre-stored in the Database Systems of corresponding system, when user need to input password, input terminal Display interface can prompt following information: 1, using 3rd character code of fundamental cryptographic as preposition interference number of codes, input the 2nd and 6th character code units value after being added;2, using the 1st digit of fundamental cryptographic as preposition interference number of codes, input the 4th and 5th character code units value after being added;At this point, backstage according to encryption principle three calculate verifying password in valid code word be 3 and 1, and the position where the valid code word is respectively the 9th and the 4th.If in the password of user's input, the 4th digit is 4, 9th digit is 3, then password is correct, which passes through verifying.
Whereby, security password setting and verification method of the invention are just formd.Using the method, it is greatly improved password The safety of input, so as to expand application range of the invention significantly.The present invention has convenient to use, highly-safe, cost It low, the features such as having a wide range of application, preferably vigorously implements.
In addition, robber requires people to input bank card password or security door password to implement to plunder when people are held as a hostage When, people can often cooperate the requirement of robber for inherently safe consideration, and bank card password or security door password etc. are carried out It correctly enters, to wish to spend to rid calamities.For prevent people to be forced to input password in abduction and by property loss, this Type of alarm has also been arranged in invention, as long as can send warning message to corresponding when so that people are by type of alarm input password Organ or equipment, to remind other people or police, to obtain effectively assistance.The type of alarm can be set as desired for Diversified forms may include following manner but be not limited to following manner:
Mode one: agreement report code, such as 110, it is when including alarm code 110 in the interference code of user's input, then ineffective It whether include correct verifying password in the password of family input, input terminal assert that Password Input is correct, and links simultaneously Warning device is alarmed.More succinct using this agreement type of alarm, especially 110 are used as alarm number to belong to people all To know, the in case of emergency reaction of user first will remember 110, thus it is user-friendly, it neither will use family leakage password, Also it can quickly alarm.
Mode two: agreement merely enters fundamental cryptographic, and input nonlinearities code is not abnormal input password, when Password Input is complete, Input terminal linkage alarm device is alarmed.Since people is in case of emergency more nervous, if input mode is too complicated, certainly It can miss an opportunity because of a delay.And user usually only remembers the fundamental cryptographic of oneself, fundamental cryptographic can be inputted quickly, therefore can also be with Make quickly to alarm in this way.
Mode three: agreement first inputs fundamental cryptographic, and rear input nonlinearities code is abnormal input password, when Password Input is complete, Input terminal linkage alarm device is alarmed.This input method seems normal input password, can blind other people and obtain letter Appoint, but is actually to alarm.Therefore this mode concealment is strong, will not both reveal fundamental cryptographic, also can quickly be reported It is alert.
Mode four: it is abnormal input password that the sequence for arranging reverse fundamental cryptographic, which carries out input, when Password Input is completed, Input terminal linkage alarm device is alarmed.This mode inputs complex, and user, which needs mental arithmetic that could input, to carry out The password of alarm is not suitable for routine use, but can be used in the various secret important systems for being not susceptible to safety accident.
Further, since other people can peep the password of user's input by devices such as cameras, to prevent other people from using use The family last time password of input is inputted again, if the password height that front and back inputs twice is similar, once inputs nothing after determining Effect, can not pass through verifying.Because the interference code in password is user's stochastic inputs, user can't deliberately go to record, thus The interference code inputted twice before and after normal users is necessarily difficult to unanimously, if the password height that front and back inputs twice is consistent, is had very much It may be that password is recorded in upper primary input process by other people, therefore can be determined that its non-user is normal close Code input, thus verifying can not be passed through.The height is similar, refers in input password, the character code value of multidigit character code and position letter Cease completely the same, and the character code value of only wherein one or few digit is not right.
The complete method formed whereby just comprehensively solve existing Password Input safety inadequate problem.
Although being disclosed by above embodiments to the present invention, the scope of the invention is not limited to this, Under conditions of present inventive concept, above each component can with technical field personnel understand similar or equivalent element come Replacement.

Claims (5)

1. a kind of setting of security password and verification mode, which is characterized in that itself the following steps are included:
A, it is set by the user fundamental cryptographic, the fundamental cryptographic is made of the orderly character code of multidigit;
B, setting encryption principle carries out cryptographic calculation and is formed to include that can be used for testing according to encryption principle to the fundamental cryptographic The valid code word of user identity and/or the verifying password of the valid code word location information are demonstrate,proved, and is given the user and encryption principle Consistent encryption inputs prompt;The encryption principle be using in fundamental cryptographic wherein the value of a character code as preposition interference code Then the value of wherein two character codes of fundamental cryptographic is carried out operation and obtains valid code word by quantity;
C, the composition of agreement input password makes to input password to include that need to carry out the verification of character code value and/or character code value position verification Effective code and an at least bit length for hiding the interference code of effective code position;
D, when the character code value of the effective code in user's password currently entered and/or the character code location information and the verifying password When the information for being included is consistent, determine that the input of user's current password is correct, which passes through verifying.
2. security password setting and verification mode as described in claim 1 any bar, which is characterized in that it further includes agreement report Police's formula step, when user is by agreement type of alarm input password, password currently entered is joined simultaneously by password authentification Preset alarm system is moved to alarm.
3. security password setting as claimed in claim 2 and verification mode, which is characterized in that the type of alarm is to input Preset alarm code is inputted when interference code.
4. security password setting as claimed in claim 2 and verification mode, which is characterized in that the type of alarm is to input When password, defeated interference code or first defeated fundamental cryptographic after defeated interference code are merely entered after fundamental cryptographic or first defeated fundamental cryptographic.
5. security password setting as claimed in claim 2 and verification mode, which is characterized in that the type of alarm is to input When password, the reverse fundamental cryptographic of input sequence in password.
CN201410829454.XA 2014-12-25 2014-12-25 Security password setting and verification mode Active CN104537300B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410829454.XA CN104537300B (en) 2014-12-25 2014-12-25 Security password setting and verification mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410829454.XA CN104537300B (en) 2014-12-25 2014-12-25 Security password setting and verification mode

Publications (2)

Publication Number Publication Date
CN104537300A CN104537300A (en) 2015-04-22
CN104537300B true CN104537300B (en) 2019-05-17

Family

ID=52852822

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410829454.XA Active CN104537300B (en) 2014-12-25 2014-12-25 Security password setting and verification mode

Country Status (1)

Country Link
CN (1) CN104537300B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105425598A (en) * 2015-11-02 2016-03-23 深圳市安恩达科技有限公司 Community management system
CN105406965A (en) * 2015-11-21 2016-03-16 徐江锋 Clear-text password encryption method
CN105488439B (en) * 2015-11-27 2018-07-06 北京京东尚科信息技术有限公司 The input method and device of enhanced trading password
CN108701183B (en) * 2016-02-16 2022-05-13 工程409株式会社 User authentication method and system using whether junk data are consistent
JP6551352B2 (en) * 2016-09-28 2019-07-31 京セラドキュメントソリューションズ株式会社 Password authentication device
CN108629176A (en) * 2017-03-19 2018-10-09 上海格尔安全科技有限公司 A kind of secured inputting method of numerical ciphers
CN107392008A (en) * 2017-07-18 2017-11-24 深圳天珑无线科技有限公司 Cipher management method, Password Management equipment and computer-readable recording medium
CN108229186A (en) * 2017-12-28 2018-06-29 深圳天珑无线科技有限公司 Verification method, verification system and electronic equipment
CN108022354A (en) * 2018-01-18 2018-05-11 北京创美时代办公家具有限公司 A kind of fingerprint authentication method and its verification system for safe cabinet
CN109636982A (en) * 2018-12-19 2019-04-16 广东工业大学 A kind of gate inhibition's open method, system and relevant apparatus
CN109636983A (en) * 2018-12-19 2019-04-16 广东工业大学 A kind of access control method, device and access control system
CN109977660A (en) * 2019-02-21 2019-07-05 广州技象科技有限公司 A kind of diastema cryptosecurity processing method and system
CN116030558A (en) * 2023-03-27 2023-04-28 长沙鑫特科技有限公司 Four kinds of business libraries of bank based on face identification and dynamic trick lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1474317A (en) * 2003-07-15 2004-02-11 �̳��� Hidden cipher coding and identifying method
CN101005357A (en) * 2006-12-28 2007-07-25 北京飞天诚信科技有限公司 Method and system for updating certification key
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
CN101872510A (en) * 2009-06-30 2010-10-27 高杰 Password burglary-preventing method for automatic teller machine (ATM) of bank
CN103268669A (en) * 2013-05-20 2013-08-28 广州广电运通金融电子股份有限公司 Password input system and input method for self-service financial device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4912772B2 (en) * 2005-09-22 2012-04-11 富士通株式会社 Encryption method, encryption / decryption method, encryption device, encryption / decryption device, transmission / reception system, and communication system
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1474317A (en) * 2003-07-15 2004-02-11 �̳��� Hidden cipher coding and identifying method
CN101005357A (en) * 2006-12-28 2007-07-25 北京飞天诚信科技有限公司 Method and system for updating certification key
CN101872510A (en) * 2009-06-30 2010-10-27 高杰 Password burglary-preventing method for automatic teller machine (ATM) of bank
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
CN103268669A (en) * 2013-05-20 2013-08-28 广州广电运通金融电子股份有限公司 Password input system and input method for self-service financial device

Also Published As

Publication number Publication date
CN104537300A (en) 2015-04-22

Similar Documents

Publication Publication Date Title
CN104537300B (en) Security password setting and verification mode
CN104408363B (en) Security code system
US8271799B2 (en) System and method for generating a disguised password based on a real password
CN103929306A (en) Intelligent secret key device and information management method of intelligent secret key device
CN104464048B (en) A kind of electronic password lock method for unlocking and device
CN106033625B (en) Lockset, mobile terminal, lockset control method and Lock control system
CN101291225A (en) Authentication method adopting complex cryptographic technique
CN102752109A (en) Secret key management method and device for encrypting data base column
CN101840478B (en) Password management method
CN103905188A (en) Method for generating dynamic password through intelligent secret key device, and intelligent secret key device
CN101877636A (en) Equation password encryption method
KR101330113B1 (en) Authentication apparatus and method based on position value
CN1877060B (en) Digital cipher lock with secure secondary authorization unlocking function
CN104363093A (en) Method for encrypting file data by dynamic authorization code
CN108512858A (en) Realize the dynamic input system and method for static password
CN106355078A (en) Intelligent password protecting system based on multifunctional-key behavior recognition
CN109299617A (en) A kind of file encryption and decryption system
CN101424142B (en) Lock, unlocking method thereof, lock administrative center and control method thereof
JP2008075419A (en) Lock control device and lock control system
KR101624394B1 (en) Device for authenticating password and operating method thereof
CN106330453A (en) Mobile phone dynamic password encryption and decryption device and method
KR100515688B1 (en) Method for controlling digital door-lock
KR101372366B1 (en) Password management system and method thereof
CN105635077B (en) A kind of imported password coding/decoding system and its recognition methods
KR101498974B1 (en) Security management server, system, and method usdion biometric informatio

Legal Events

Date Code Title Description
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190826

Address after: 610000 Chengdu high tech Zone, Sichuan Tianyi street, No. 3, building 38

Patentee after: CHENGDU HONGYI TIANCHENG TECHNOLOGY CO., LTD.

Address before: 621011 Mianyang city of Sichuan Province Branch Chong District incubator building D District No. 676

Patentee before: MIANYANG AIJIA TECHNOLOGY CO., LTD.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210401

Address after: 1-A, area a, building 13, Hengqin financial industry service base, Zhuhai, Guangdong 519000

Patentee after: Guangdong financial assets trading center Co.,Ltd.

Address before: 610000 3 Tianyi Street, Chengdu High-tech Zone, Sichuan Province

Patentee before: CHENGDU HONGYI TIANCHENG TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220424

Address after: 510000 769, room 406, No. 1, Yichuang street, Huangpu District (Zhongxin knowledge city), Guangzhou City, Guangdong Province

Patentee after: Guangdong financial assets trading center Co.,Ltd.

Address before: 1-A, area a, building 13, Hengqin financial industry service base, Zhuhai, Guangdong 519000

Patentee before: Guangdong financial assets trading center Co.,Ltd.

TR01 Transfer of patent right