CN105718822A - Anti-peep password input method - Google Patents

Anti-peep password input method Download PDF

Info

Publication number
CN105718822A
CN105718822A CN201610043751.0A CN201610043751A CN105718822A CN 105718822 A CN105718822 A CN 105718822A CN 201610043751 A CN201610043751 A CN 201610043751A CN 105718822 A CN105718822 A CN 105718822A
Authority
CN
China
Prior art keywords
input
password
user
random number
code characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610043751.0A
Other languages
Chinese (zh)
Inventor
谢建全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan University Of Finance And Economics
Original Assignee
Hunan University Of Finance And Economics
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan University Of Finance And Economics filed Critical Hunan University Of Finance And Economics
Priority to CN201610043751.0A priority Critical patent/CN105718822A/en
Publication of CN105718822A publication Critical patent/CN105718822A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The invention discloses an anti-peep password input method which comprises the following steps: (1) generating a random digit sequence f(i) consisting of 10 nonredundant digits; (2) displaying the corresponding relation of password charterers i and the random digit sequence f(i); (3) after a user inputs a corresponding random digit of one password character, immediately eliminating the corresponding relation of the password character i and the random digit sequence f(i) displayed on a screen, detecting input of the user, and converting an input random digit into a corresponding password character; (4) repeating steps (1) and (2), regenerating the corresponding relation of one password character i and the random digit sequence f(i), inputting a random digit corresponding to a next password character by the user, detecting input of the user, converting the input random digit into a corresponding password character, and repeating the process till the random digit sequence f(i) corresponding to password characters i is completely input. By adoption of the anti-peep password input method, a password can be prevented from being peeped, and high security can be achieved.

Description

Prevent the cipher-code input method peeped
Technical field
The present invention relates to information security field, be specifically related to a kind of cipher-code input method preventing and being peeped.
Background technology
Password Input is a kind of conventional means realizing control of authority, and especially extensive in financial field application, such as the domestic deposit card that can not overdraw is both needed to password authorization at present, and the credit card is generally also given tacit consent to password transaction.Password Input process is easy to peeped by lawless person, if lawless person knows this bank card account number information simultaneously, after having cloned card, it is possible to stealing the fund of user, this brings potential safety hazard to user.
For preventing the peep of cipher of input, a lot of mechanisms adopt the way blocked to solve now, it is most commonly that all kinds of hood for protecting riders of application, Ye You mechanism adopts the only small liquid crystal touch screen in visual angle and is aided with and upsets the input code put in order to input password, its principle is also similar to that the way blocked, the person of peeping making deviation front viewing angle bigger does not see the password of user's input, also has the method inputting other interference code in the password of normal input again to protect the password of input, the password that these methods in use input is all code characters itself, it is all " What You See Is What You Get ", therefore these methods are simply reducing the probability of peep of cipher in Password Input process, but the problem that peep of cipher cannot be fully solved.
Password just can be deduced as lawless person can pass through the gesture studied when user inputs password on POS code keypad;Once there is some undesirable of media report for another example even at the keyboard of the ATM of bank covers one layer of keyboard again, the function of the password that can record user's input is had in this keyboard being covered with again, which type of mode no matter the password of user's input adopt all be fully transmitted to undesirable, criminal group is even also had to juggle things in mobile POS, the directly password of record user input, this problem also illustrating cannot thoroughly solve peep of cipher by the way blocked from another aspect.
Summary of the invention
The technical problem to be solved is, overcomes the deficiency of above-mentioned background technology, it is provided that the cipher-code input method that what a kind of safety was high prevent is peeped.
This invention address that its technical problem employed technical scheme comprise that, a kind of cipher-code input method preventing from being peeped, comprise the following steps:
(1) random number sequences f (i) for inputting password that the unduplicated numeral of generation 10 is constituted, wherein i=0,1,2 ... 9, f (i) ∈ 0,1,2 ... 9};The random number sequences obtained is expressed as: f (0), f (1), f (2), f (3), f (4), f (5), f (6), f (7), f (8), f (9);
(2) utilizing the mapping relations between f (i) and i, show the corresponding relation of code characters i that needs input and random number sequences f (i) on the screen of prompting input password, corresponding relation is as follows:
Numeral corresponding in random number sequences f (i) that prompting user's input is corresponding with code characters i;
(3) user is according to suggestion content, the random digit that one code characters of input is corresponding, removes the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;
(4) step (1), (2) are repeated, regenerate the corresponding relation of a code characters i and random number sequences f (i), user inputs, according to new corresponding relation, the random digit that next bit code characters is corresponding, removes the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between newly generated f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;Repeat this process, until random number sequences f (i) corresponding to code characters i inputs complete.
Further, in step (1), described random number sequences f (i) is produced by random function or by utilizing the disorder method in cryptography to produce arrange in order 10 numerals.
Compared with prior art, advantages of the present invention is as follows:
The character that user inputs on keyboard is not code characters itself, but it character corresponding to mapping value, even if person of peeping peeps in user's input perhaps covers one layer of keyboard on the keyboard of the ATM of bank again, obtain all full contents of input on keyboard of user, but the real password of user can not be obtained;The sequence every time produced is random alignment, it is cannot obtain real password by peeping for this cipher-code input method, the present invention can effectively prevent person of peeping from stealing real password, and safety is high, can apply to all kinds of requiring over and inputs the occasion that password is authenticated.
Accompanying drawing explanation
Fig. 1 is the hardware unit structured flowchart of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with drawings and the specific embodiments, the present invention is described in further detail.
The present embodiment comprises the following steps:
(1) random number sequences f (i) for inputting password that 10 unduplicated numerals are constituted is produced, random number sequences f (i) is produced by random function or by utilizing the disorder method in cryptography to produce arrange in order 10 numerals, wherein i=0,1,2 ... 9, f (i) ∈ { 0,1,2 ... 9};The random number sequences obtained is expressed as: f (0), f (1), f (2), f (3), f (4), f (5), f (6), f (7), f (8), f (9), the random number sequences as actually obtained is: 6,3,5,9,4,0,8,2,7,1, i.e. f (0)=6, f (1)=3, f (2)=5, f (3)=9, f (4)=4, f (5)=0, f (6)=8, f (7)=2, f (8)=7, f (9)=1;Owing to the value of each element of random number sequences f (i) does not repeat, therefore there are mapping relations one by one between f (i) and 10 code characters, namely can uniquely determine the value of f (i) for a code characters i to be entered, system can uniquely determine, according to the value of the f (i) of user's input, the true password that user inputs too;
(2) utilizing the mapping relations between f (i) and i, show the corresponding relation of code characters i that needs input and random number sequences f (i) on the screen of prompting input password, corresponding relation is as follows:
Such as f (0)=6, f (1)=3, f (2)=5, f (3)=9, f (4)=4, f (5)=0, f (6)=8, f (7)=2, f (8)=7, f (9)=1, then on screen, the corresponding relation of display is as follows:
Numeral corresponding in random number sequences f (i) that prompting user's input is corresponding with code characters i;
(3) user is according to suggestion content, the random digit that one code characters of input is corresponding, and such as user needs the code characters of input to be " 6 ", then find f (6) in the prompting of screen, and its value is " 8 ", then press character " 8 " on keyboard;Remove the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;The random digit " 8 " being about to input converts a code characters " 6 " of correspondence to;
(4) step (1), (2) are repeated, regenerate the corresponding relation of a code characters i and random number sequences f (i), user inputs, according to new corresponding relation, the random digit that next bit code characters is corresponding, removes the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between newly generated f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;Repeat this process, until random number sequences f (i) corresponding to code characters i inputs complete.
With reference to Fig. 1, the present invention prevents the hardware unit that the cipher-code input method peeped relies on from including host computer system, display screen and keyboard, host computer system is used for producing random number sequences f (i) and generating display information, and it is transferred to display screen, additionally it is additionally operable to convert the input of user to real password;Display screen is used for showing the corresponding relation of code characters i and random number sequences f (i), and points out user the method carrying out inputting;Keyboard has been used for the input of user and has been transferred to host computer system.
The character that user of the present invention inputs on keyboard is not code characters itself, but it character corresponding to mapping value, even if person of peeping peeps in user's input perhaps covers one layer of keyboard on the keyboard of the ATM of bank again, obtain all full contents of input on keyboard of user, but the real password of user can not be obtained.
Further, for preventing person of peeping after seeing the digital i that user inputs, the real password of user is derived again through the corresponding relation of f (i) in the information of the system of checking He i, system updates the random sequence of display on screen after input user being detected at once, owing to the speed of computer replacing information can reach Microsecond grade, ability is reflected far beyond the vision of the mankind, person of peeping cannot observe that system is prompted to the information of user before user inputs password again after the numeral peeping user's input, namely person of peeping is after the numeral peeping user's input, the random sequence seen on screen is the random sequence corresponding to code characters next to be entered, rather than the random sequence that the code characters that inputted is corresponding, such person of peeping just cannot peep user input after further according on screen display the anti-password releasing input of random number sequences be how many.
Person of peeping wants to go out what the real password of user is by the information inference that user inputs, the way of unique feasible is to remember the whole sequence of display on screen before button user, and user only need to remember the numeral corresponding to who password that oneself to input at once, therefore for a password, person of peeping realizes difficulty at least difficult more than 10 times of the method commonly used now of ratio that password is stolen, consider that current Password Input is all more than 6, person of peeping to realize stealing of password by peeping the information on the input of user and screen simultaneously, its difficulty at least ratio is more than 6 powers of the method difficulty 10 commonly used now times, namely 1,000,000 times are reached, it is so almost cannot completing of task for person of peeping.
Therefore, as long as the sequence produced is random alignment every time, being cannot obtain real password by peeping for this cipher-code input method, the present invention can effectively prevent person of peeping from stealing real password, safety is high, can apply to all kinds of requiring over and inputs the occasion that password is authenticated.
The embodiment of the present invention can be carried out various modifications and variations by those skilled in the art, if these amendments and modification are within the scope of the claims in the present invention and equivalent technologies thereof, then these amendments and modification are also within protection scope of the present invention.
The prior art that the content not being described in detail in description is known to the skilled person.

Claims (2)

1. the cipher-code input method preventing from being peeped, it is characterised in that comprise the following steps:
(1) random number sequences f (i) for inputting password that the unduplicated numeral of generation 10 is constituted, wherein i=0,1,2 ... 9, f (i) ∈ 0,1,2 ... 9};The random number sequences obtained is expressed as: f (0), f (1), f (2), f (3), f (4), f (5), f (6), f (7), f (8), f (9);
(2) utilizing the mapping relations between f (i) and i, show the corresponding relation of code characters i that needs input and random number sequences f (i) on the screen of prompting input password, corresponding relation is as follows:
Numeral corresponding in random number sequences f (i) that prompting user's input is corresponding with code characters i;
(3) user is according to suggestion content, the random digit that one code characters of input is corresponding, removes the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;
(4) step (1), (2) are repeated, regenerate the corresponding relation of a code characters i and random number sequences f (i), user inputs, according to new corresponding relation, the random digit that next bit code characters is corresponding, removes the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between newly generated f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;Repeat this process, until random number sequences f (i) corresponding to code characters i inputs complete.
2. prevent the cipher-code input method peeped as claimed in claim 1, it is characterized in that: in step (1), described random number sequences f (i) is produced by random function or by utilizing the disorder method in cryptography to produce arrange in order 10 numerals.
CN201610043751.0A 2016-01-22 2016-01-22 Anti-peep password input method Pending CN105718822A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610043751.0A CN105718822A (en) 2016-01-22 2016-01-22 Anti-peep password input method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610043751.0A CN105718822A (en) 2016-01-22 2016-01-22 Anti-peep password input method

Publications (1)

Publication Number Publication Date
CN105718822A true CN105718822A (en) 2016-06-29

Family

ID=56153738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610043751.0A Pending CN105718822A (en) 2016-01-22 2016-01-22 Anti-peep password input method

Country Status (1)

Country Link
CN (1) CN105718822A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106934307A (en) * 2017-02-28 2017-07-07 深圳国微技术有限公司 A kind of cipher-code input method, device, system and terminal
CN113849873A (en) * 2021-09-26 2021-12-28 湖南财政经济学院 Password input method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186944A (en) * 2012-01-02 2013-07-03 杜建钢 Peeping-proof password input method
CN103440442A (en) * 2013-08-28 2013-12-11 苏凯 Anti-theft password card and corresponding password management method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186944A (en) * 2012-01-02 2013-07-03 杜建钢 Peeping-proof password input method
CN103440442A (en) * 2013-08-28 2013-12-11 苏凯 Anti-theft password card and corresponding password management method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106934307A (en) * 2017-02-28 2017-07-07 深圳国微技术有限公司 A kind of cipher-code input method, device, system and terminal
CN113849873A (en) * 2021-09-26 2021-12-28 湖南财政经济学院 Password input method and device

Similar Documents

Publication Publication Date Title
US6209104B1 (en) Secure data entry and visual authentication system and method
US20040024710A1 (en) Secure input pad partition
US20160330244A1 (en) Secure Storage of Data Among Multiple Devices
CN103996011A (en) Method and device for protecting codes to be input safely
CN104408363B (en) Security code system
GB2502773A (en) User authentication by inputting code on a randomly generated display
CN108141350A (en) The method of transaction is ensured from non-security terminal
JP6435342B2 (en) Touch terminal and password generation method using touch terminal
CN104134032A (en) Anti-peeping coded lock system based on visional confusion and anti-peeing unlocking method based on visional confusion
US20060098841A1 (en) Method and system for enabling remote message composition
KR100880862B1 (en) Security method for user input data to electronic device
CN105718822A (en) Anti-peep password input method
KR20100095346A (en) Method of user authentication using the virtual keyboard and computer readable storage medium storing program for executing method thereof
CN106656471A (en) Method and system for protecting user sensitive information
KR101042227B1 (en) A Method for Preventing from Hacking with Virtual Keyboard
More et al. Secure transaction system using collective approach of steganography and visual cryptography
CN113849873A (en) Password input method and device
CN106326703A (en) An encryption method, a decryption method and an electronic apparatus
CN103294943B (en) Ciphering signature handwriting device and method
CN106650416A (en) Password setting and decrypting methods and terminal
KR102246446B1 (en) Method and Device for Password and Unlocking Input using the Combination of Character and Pattern Image
CN111092721A (en) Method and device for setting access password
KR101595098B1 (en) Device for generating digigal signature and method for generating digigal signature using the same
Rani et al. A Novel Session Password Security Technique using Textual Color and Images
WO2022001707A1 (en) Method and system for receiving a secure input, using a secure input means

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160629