CN105718822A - Anti-peep password input method - Google Patents
Anti-peep password input method Download PDFInfo
- Publication number
- CN105718822A CN105718822A CN201610043751.0A CN201610043751A CN105718822A CN 105718822 A CN105718822 A CN 105718822A CN 201610043751 A CN201610043751 A CN 201610043751A CN 105718822 A CN105718822 A CN 105718822A
- Authority
- CN
- China
- Prior art keywords
- input
- password
- user
- random number
- code characters
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
The invention discloses an anti-peep password input method which comprises the following steps: (1) generating a random digit sequence f(i) consisting of 10 nonredundant digits; (2) displaying the corresponding relation of password charterers i and the random digit sequence f(i); (3) after a user inputs a corresponding random digit of one password character, immediately eliminating the corresponding relation of the password character i and the random digit sequence f(i) displayed on a screen, detecting input of the user, and converting an input random digit into a corresponding password character; (4) repeating steps (1) and (2), regenerating the corresponding relation of one password character i and the random digit sequence f(i), inputting a random digit corresponding to a next password character by the user, detecting input of the user, converting the input random digit into a corresponding password character, and repeating the process till the random digit sequence f(i) corresponding to password characters i is completely input. By adoption of the anti-peep password input method, a password can be prevented from being peeped, and high security can be achieved.
Description
Technical field
The present invention relates to information security field, be specifically related to a kind of cipher-code input method preventing and being peeped.
Background technology
Password Input is a kind of conventional means realizing control of authority, and especially extensive in financial field application, such as the domestic deposit card that can not overdraw is both needed to password authorization at present, and the credit card is generally also given tacit consent to password transaction.Password Input process is easy to peeped by lawless person, if lawless person knows this bank card account number information simultaneously, after having cloned card, it is possible to stealing the fund of user, this brings potential safety hazard to user.
For preventing the peep of cipher of input, a lot of mechanisms adopt the way blocked to solve now, it is most commonly that all kinds of hood for protecting riders of application, Ye You mechanism adopts the only small liquid crystal touch screen in visual angle and is aided with and upsets the input code put in order to input password, its principle is also similar to that the way blocked, the person of peeping making deviation front viewing angle bigger does not see the password of user's input, also has the method inputting other interference code in the password of normal input again to protect the password of input, the password that these methods in use input is all code characters itself, it is all " What You See Is What You Get ", therefore these methods are simply reducing the probability of peep of cipher in Password Input process, but the problem that peep of cipher cannot be fully solved.
Password just can be deduced as lawless person can pass through the gesture studied when user inputs password on POS code keypad;Once there is some undesirable of media report for another example even at the keyboard of the ATM of bank covers one layer of keyboard again, the function of the password that can record user's input is had in this keyboard being covered with again, which type of mode no matter the password of user's input adopt all be fully transmitted to undesirable, criminal group is even also had to juggle things in mobile POS, the directly password of record user input, this problem also illustrating cannot thoroughly solve peep of cipher by the way blocked from another aspect.
Summary of the invention
The technical problem to be solved is, overcomes the deficiency of above-mentioned background technology, it is provided that the cipher-code input method that what a kind of safety was high prevent is peeped.
This invention address that its technical problem employed technical scheme comprise that, a kind of cipher-code input method preventing from being peeped, comprise the following steps:
(1) random number sequences f (i) for inputting password that the unduplicated numeral of generation 10 is constituted, wherein i=0,1,2 ... 9, f (i) ∈ 0,1,2 ... 9};The random number sequences obtained is expressed as: f (0), f (1), f (2), f (3), f (4), f (5), f (6), f (7), f (8), f (9);
(2) utilizing the mapping relations between f (i) and i, show the corresponding relation of code characters i that needs input and random number sequences f (i) on the screen of prompting input password, corresponding relation is as follows:
Numeral corresponding in random number sequences f (i) that prompting user's input is corresponding with code characters i;
(3) user is according to suggestion content, the random digit that one code characters of input is corresponding, removes the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;
(4) step (1), (2) are repeated, regenerate the corresponding relation of a code characters i and random number sequences f (i), user inputs, according to new corresponding relation, the random digit that next bit code characters is corresponding, removes the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between newly generated f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;Repeat this process, until random number sequences f (i) corresponding to code characters i inputs complete.
Further, in step (1), described random number sequences f (i) is produced by random function or by utilizing the disorder method in cryptography to produce arrange in order 10 numerals.
Compared with prior art, advantages of the present invention is as follows:
The character that user inputs on keyboard is not code characters itself, but it character corresponding to mapping value, even if person of peeping peeps in user's input perhaps covers one layer of keyboard on the keyboard of the ATM of bank again, obtain all full contents of input on keyboard of user, but the real password of user can not be obtained;The sequence every time produced is random alignment, it is cannot obtain real password by peeping for this cipher-code input method, the present invention can effectively prevent person of peeping from stealing real password, and safety is high, can apply to all kinds of requiring over and inputs the occasion that password is authenticated.
Accompanying drawing explanation
Fig. 1 is the hardware unit structured flowchart of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with drawings and the specific embodiments, the present invention is described in further detail.
The present embodiment comprises the following steps:
(1) random number sequences f (i) for inputting password that 10 unduplicated numerals are constituted is produced, random number sequences f (i) is produced by random function or by utilizing the disorder method in cryptography to produce arrange in order 10 numerals, wherein i=0,1,2 ... 9, f (i) ∈ { 0,1,2 ... 9};The random number sequences obtained is expressed as: f (0), f (1), f (2), f (3), f (4), f (5), f (6), f (7), f (8), f (9), the random number sequences as actually obtained is: 6,3,5,9,4,0,8,2,7,1, i.e. f (0)=6, f (1)=3, f (2)=5, f (3)=9, f (4)=4, f (5)=0, f (6)=8, f (7)=2, f (8)=7, f (9)=1;Owing to the value of each element of random number sequences f (i) does not repeat, therefore there are mapping relations one by one between f (i) and 10 code characters, namely can uniquely determine the value of f (i) for a code characters i to be entered, system can uniquely determine, according to the value of the f (i) of user's input, the true password that user inputs too;
(2) utilizing the mapping relations between f (i) and i, show the corresponding relation of code characters i that needs input and random number sequences f (i) on the screen of prompting input password, corresponding relation is as follows:
Such as f (0)=6, f (1)=3, f (2)=5, f (3)=9, f (4)=4, f (5)=0, f (6)=8, f (7)=2, f (8)=7, f (9)=1, then on screen, the corresponding relation of display is as follows:
Numeral corresponding in random number sequences f (i) that prompting user's input is corresponding with code characters i;
(3) user is according to suggestion content, the random digit that one code characters of input is corresponding, and such as user needs the code characters of input to be " 6 ", then find f (6) in the prompting of screen, and its value is " 8 ", then press character " 8 " on keyboard;Remove the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;The random digit " 8 " being about to input converts a code characters " 6 " of correspondence to;
(4) step (1), (2) are repeated, regenerate the corresponding relation of a code characters i and random number sequences f (i), user inputs, according to new corresponding relation, the random digit that next bit code characters is corresponding, removes the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between newly generated f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;Repeat this process, until random number sequences f (i) corresponding to code characters i inputs complete.
With reference to Fig. 1, the present invention prevents the hardware unit that the cipher-code input method peeped relies on from including host computer system, display screen and keyboard, host computer system is used for producing random number sequences f (i) and generating display information, and it is transferred to display screen, additionally it is additionally operable to convert the input of user to real password;Display screen is used for showing the corresponding relation of code characters i and random number sequences f (i), and points out user the method carrying out inputting;Keyboard has been used for the input of user and has been transferred to host computer system.
The character that user of the present invention inputs on keyboard is not code characters itself, but it character corresponding to mapping value, even if person of peeping peeps in user's input perhaps covers one layer of keyboard on the keyboard of the ATM of bank again, obtain all full contents of input on keyboard of user, but the real password of user can not be obtained.
Further, for preventing person of peeping after seeing the digital i that user inputs, the real password of user is derived again through the corresponding relation of f (i) in the information of the system of checking He i, system updates the random sequence of display on screen after input user being detected at once, owing to the speed of computer replacing information can reach Microsecond grade, ability is reflected far beyond the vision of the mankind, person of peeping cannot observe that system is prompted to the information of user before user inputs password again after the numeral peeping user's input, namely person of peeping is after the numeral peeping user's input, the random sequence seen on screen is the random sequence corresponding to code characters next to be entered, rather than the random sequence that the code characters that inputted is corresponding, such person of peeping just cannot peep user input after further according on screen display the anti-password releasing input of random number sequences be how many.
Person of peeping wants to go out what the real password of user is by the information inference that user inputs, the way of unique feasible is to remember the whole sequence of display on screen before button user, and user only need to remember the numeral corresponding to who password that oneself to input at once, therefore for a password, person of peeping realizes difficulty at least difficult more than 10 times of the method commonly used now of ratio that password is stolen, consider that current Password Input is all more than 6, person of peeping to realize stealing of password by peeping the information on the input of user and screen simultaneously, its difficulty at least ratio is more than 6 powers of the method difficulty 10 commonly used now times, namely 1,000,000 times are reached, it is so almost cannot completing of task for person of peeping.
Therefore, as long as the sequence produced is random alignment every time, being cannot obtain real password by peeping for this cipher-code input method, the present invention can effectively prevent person of peeping from stealing real password, safety is high, can apply to all kinds of requiring over and inputs the occasion that password is authenticated.
The embodiment of the present invention can be carried out various modifications and variations by those skilled in the art, if these amendments and modification are within the scope of the claims in the present invention and equivalent technologies thereof, then these amendments and modification are also within protection scope of the present invention.
The prior art that the content not being described in detail in description is known to the skilled person.
Claims (2)
1. the cipher-code input method preventing from being peeped, it is characterised in that comprise the following steps:
(1) random number sequences f (i) for inputting password that the unduplicated numeral of generation 10 is constituted, wherein i=0,1,2 ... 9, f (i) ∈ 0,1,2 ... 9};The random number sequences obtained is expressed as: f (0), f (1), f (2), f (3), f (4), f (5), f (6), f (7), f (8), f (9);
(2) utilizing the mapping relations between f (i) and i, show the corresponding relation of code characters i that needs input and random number sequences f (i) on the screen of prompting input password, corresponding relation is as follows:
Numeral corresponding in random number sequences f (i) that prompting user's input is corresponding with code characters i;
(3) user is according to suggestion content, the random digit that one code characters of input is corresponding, removes the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;
(4) step (1), (2) are repeated, regenerate the corresponding relation of a code characters i and random number sequences f (i), user inputs, according to new corresponding relation, the random digit that next bit code characters is corresponding, removes the code characters i of display on screen and the corresponding relation of random number sequences f (i) immediately after;The input of detection user, and according to the mapping relations between newly generated f (i) and i to, the random digit that user inputs is converted a code characters of correspondence;Repeat this process, until random number sequences f (i) corresponding to code characters i inputs complete.
2. prevent the cipher-code input method peeped as claimed in claim 1, it is characterized in that: in step (1), described random number sequences f (i) is produced by random function or by utilizing the disorder method in cryptography to produce arrange in order 10 numerals.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610043751.0A CN105718822A (en) | 2016-01-22 | 2016-01-22 | Anti-peep password input method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610043751.0A CN105718822A (en) | 2016-01-22 | 2016-01-22 | Anti-peep password input method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105718822A true CN105718822A (en) | 2016-06-29 |
Family
ID=56153738
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610043751.0A Pending CN105718822A (en) | 2016-01-22 | 2016-01-22 | Anti-peep password input method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105718822A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106934307A (en) * | 2017-02-28 | 2017-07-07 | 深圳国微技术有限公司 | A kind of cipher-code input method, device, system and terminal |
CN113849873A (en) * | 2021-09-26 | 2021-12-28 | 湖南财政经济学院 | Password input method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103186944A (en) * | 2012-01-02 | 2013-07-03 | 杜建钢 | Peeping-proof password input method |
CN103440442A (en) * | 2013-08-28 | 2013-12-11 | 苏凯 | Anti-theft password card and corresponding password management method |
-
2016
- 2016-01-22 CN CN201610043751.0A patent/CN105718822A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103186944A (en) * | 2012-01-02 | 2013-07-03 | 杜建钢 | Peeping-proof password input method |
CN103440442A (en) * | 2013-08-28 | 2013-12-11 | 苏凯 | Anti-theft password card and corresponding password management method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106934307A (en) * | 2017-02-28 | 2017-07-07 | 深圳国微技术有限公司 | A kind of cipher-code input method, device, system and terminal |
CN113849873A (en) * | 2021-09-26 | 2021-12-28 | 湖南财政经济学院 | Password input method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6209104B1 (en) | Secure data entry and visual authentication system and method | |
US20040024710A1 (en) | Secure input pad partition | |
US20160330244A1 (en) | Secure Storage of Data Among Multiple Devices | |
CN103996011A (en) | Method and device for protecting codes to be input safely | |
CN104408363B (en) | Security code system | |
GB2502773A (en) | User authentication by inputting code on a randomly generated display | |
CN108141350A (en) | The method of transaction is ensured from non-security terminal | |
JP6435342B2 (en) | Touch terminal and password generation method using touch terminal | |
CN104134032A (en) | Anti-peeping coded lock system based on visional confusion and anti-peeing unlocking method based on visional confusion | |
US20060098841A1 (en) | Method and system for enabling remote message composition | |
KR100880862B1 (en) | Security method for user input data to electronic device | |
CN105718822A (en) | Anti-peep password input method | |
KR20100095346A (en) | Method of user authentication using the virtual keyboard and computer readable storage medium storing program for executing method thereof | |
CN106656471A (en) | Method and system for protecting user sensitive information | |
KR101042227B1 (en) | A Method for Preventing from Hacking with Virtual Keyboard | |
More et al. | Secure transaction system using collective approach of steganography and visual cryptography | |
CN113849873A (en) | Password input method and device | |
CN106326703A (en) | An encryption method, a decryption method and an electronic apparatus | |
CN103294943B (en) | Ciphering signature handwriting device and method | |
CN106650416A (en) | Password setting and decrypting methods and terminal | |
KR102246446B1 (en) | Method and Device for Password and Unlocking Input using the Combination of Character and Pattern Image | |
CN111092721A (en) | Method and device for setting access password | |
KR101595098B1 (en) | Device for generating digigal signature and method for generating digigal signature using the same | |
Rani et al. | A Novel Session Password Security Technique using Textual Color and Images | |
WO2022001707A1 (en) | Method and system for receiving a secure input, using a secure input means |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160629 |