CN106534479B - Mobile phone password protection system based on hidden code identification and hidden transformation - Google Patents

Mobile phone password protection system based on hidden code identification and hidden transformation Download PDF

Info

Publication number
CN106534479B
CN106534479B CN201610819200.9A CN201610819200A CN106534479B CN 106534479 B CN106534479 B CN 106534479B CN 201610819200 A CN201610819200 A CN 201610819200A CN 106534479 B CN106534479 B CN 106534479B
Authority
CN
China
Prior art keywords
password
hidden
module
key
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610819200.9A
Other languages
Chinese (zh)
Other versions
CN106534479A (en
Inventor
杨熠欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI 01 POWER TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI 01 POWER TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI 01 POWER TECHNOLOGY Co Ltd filed Critical SHANGHAI 01 POWER TECHNOLOGY Co Ltd
Priority to CN201610819200.9A priority Critical patent/CN106534479B/en
Publication of CN106534479A publication Critical patent/CN106534479A/en
Application granted granted Critical
Publication of CN106534479B publication Critical patent/CN106534479B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a mobile phone password protection system based on hidden code identification and hidden transformation, which specifically comprises the following steps: the key behavior information acquisition module acquires key codes and key behavior information when the password is input from the password input module, the hidden code identification module automatically forms hidden passwords according to the key behavior information and according to code values of the hidden codes defined in the hidden code definition module, the hidden conversion module automatically carries out hidden conversion on the key codes acquired from the key behavior information acquisition module according to hidden conversion strategies defined in the hidden conversion definition module, the password combination module automatically combines the hidden passwords, the passwords subjected to the hidden conversion according to the hidden code definition module and the custom strategies in the hidden conversion definition module into final passwords, and the password verification module automatically authenticates the legality of the final passwords. The invention solves the problems of peep prevention and cracking prevention safety of the mobile phone password system.

Description

Mobile phone password protection system based on hidden code identification and hidden transformation
Technical Field
The invention relates to a password protection system, in particular to a mobile phone password protection system based on hidden code identification and hidden transformation.
Background
The password is used as a protection spirit of information safety, and is an important guarantee for property protection and information safety. At present, the widely used cryptosystem mainly comprises a digital cipher and a biological information cipher such as fingerprint, face brushing, DNA and the like. The traditional digital password is very easy to be peeped and stolen by people, so that cases of property loss and personal information theft are frequently seen. Mobile phones have become a part of people's lives, and are often used for storing personal information, shopping online and the like. Therefore, the security of the mobile phone password system is crucial. At present, even though pattern passwords and fingerprint passwords are used for mobile phones, the problem of how to prevent others from cracking the passwords by means of shooting, peeping and the like is still not solved, and the problem that the fingerprint passwords cannot be changed once being copied by people exists. How to solve the problems of peep prevention and cracking prevention safety of the mobile phone password system is the basis of solving the mobile phone password safety.
The patent technology comprises an input terminal, a database storing basic password information preset by a user, an encryption operation unit for carrying out encryption operation on the basic password according to an encryption principle to form a verification password, and a verification unit for verifying whether an effective code in the password input by the user is consistent with an effective character code contained in the verification password formed by the encryption operation of the encryption operation unit, wherein the input terminal is provided with an input key for inputting an interference code and an effective code by the user, so that the user needs to input the interference code and the encrypted effective code according to an encryption input prompt on a display screen of the input terminal when inputting the password, and the security of password input is enhanced. The password system has the disadvantages that the input password can still be obtained through peeping, shooting and the like, and the password system can pass verification after being input, so that the purposes of peeping prevention and cracking prevention of the password system can not be achieved.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a mobile phone password protection system based on hidden code identification and hidden transformation, which can effectively solve the problems of peep prevention and decoding prevention safety of the existing mobile phone password system, can be directly applied to the existing mobile phone and realizes the protection of information safety and property safety of people.
In order to achieve the purpose, the invention is realized by the following technical scheme.
The invention relates to a mobile phone password protection system based on hidden code identification and hidden conversion, which comprises a password input module, a key behavior information acquisition module, a hidden code definition module, a hidden code identification module, a hidden conversion definition module, a hidden conversion module, a password combination module and a password verification module, wherein: the key behavior information acquisition module acquires key codes and key behavior information when the passwords are input from the password input module, the hidden code identification module automatically forms hidden passwords according to the key behavior information and according to code values of the hidden codes defined in the hidden code definition module, the hidden transformation module automatically carries out hidden transformation on the key codes acquired from the key behavior information acquisition module according to hidden transformation strategies defined in the hidden transformation definition module, the password combination module automatically combines the hidden passwords and the passwords subjected to the hidden transformation into final passwords according to user-defined strategies in the hidden code definition module and the hidden transformation definition module, and the password verification module automatically authenticates the legality of the final passwords.
Preferably, the mobile phone password protection system is further provided with a password input touch feedback module, and the user can feed back the magnitude of the key pressure and/or the duration of the key pressure and/or the magnitude of the inclination angle of the mobile phone to the fingers of the user by controlling the vibration of the mobile phone, so that the user friendliness is improved.
Preferably, the information collected by the key behavior information collection module includes a code of each key when a password is input, a time period of the key, angle information of a mobile phone level meter, and key information for implicit transformation, and the information can also be used for collecting the pressure of the key when the password is input for a mobile phone adopting a 3D-Touch screen.
Preferably, the keys for implicit transformation are 'volume +' and 'volume-' keys of the mobile phone.
Preferably, the hidden code module automatically forms hidden codes such as pressure codes and/or time codes and/or angle codes respectively by using the pressure of the key and/or the time of the key and/or the inclination angle of the mobile phone during or immediately after inputting a code, and the position of the hidden codes in the final codes and/or the code values of the hidden codes are defined in the hidden code definition module and can be customized by a user.
Preferably, the implicit transformation module performs implicit transformation on a key code value in the password input process by using the volume plus and volume minus key information, so that a user inputs a key code different from or the same as a real password from a keyboard, thereby realizing that the same password has different flexible input methods; the amount of implicit transformation is defined in the implicit transformation definition module and is customizable by the user.
Preferably, the password verification module is configured to verify the validity of the final password by: when all the numbers and the sequence thereof in the final password are correct and the recessive password is from the recessive password module, judging that the final password is correct; otherwise, the final password is judged to be wrong.
The working process and the principle of the mobile phone password protection system based on the hidden code identification and the hidden transformation are as follows:
(1) in the process of inputting the password, the key behavior information acquisition module automatically acquires the coded value of a key for inputting the password, and simultaneously acquires the key behavior information such as the pressure of the key, the time of the key, the inclination angle of the mobile phone in the process of inputting the password or just after inputting a number, and the like, and forms a hidden password through the hidden code module to encrypt the password bit defined in the hidden code definition module, and performs hidden change on the acquired key coded value through the hidden conversion module, and forms a final password through the password combination module, and the password verification module verifies the final password;
(2) the principle of realizing the peeping prevention and the cracking prevention of the password system is as follows:
A. because the pressure of the keys cannot be identified by means of human eyes, camera shooting and the like, and the time of the keys is difficult to distinguish, the hidden password is invisible in the password input process and can only be automatically generated according to the key pressure and the key time in the password input process, the hidden password is authenticated by the password authentication module, the hidden code value of the hidden password is not different from other numbers in the password, the position of the hidden password and even the hidden password value are preset by user definition, and the hidden password has personal uniqueness and confidentiality. Therefore, even if the password is seen by a person when the keyboard is input, other people cannot input the password correctly, although the inclination angle of the mobile phone is visible, the code value of the angle code and the code bit where the angle code is located cannot be known by other people, so that the other people cannot pass authentication according to the seen input password, and the anti-peeping and anti-cracking of the password are realized.
B. Because the operation of the volume key of the mobile phone is concealed, the implicit transformation amount of the directly input code can be defined by a user, so that the implicit transformation realizes that the same password has different flexible input methods, even if someone sees the key number when the password is input, the password can not pass the authentication after being input, and the peep prevention and the crack prevention of the password are further enhanced.
Compared with the prior art, the invention has the following beneficial effects:
(1) the invention realizes the anti-peeping and anti-cracking safety of the mobile phone password system, and can relieve the worry of people about the leakage of the password.
(2) Compared with the existing digital password, the intelligent password protection system can not prevent peeping and cracking, and improves the security of the password to 100%.
(3) The intelligent password protection system solves the problems that biological information passwords such as fingerprints and DNA (deoxyribonucleic acid) are copied and cannot be changed once being stolen.
(4) Through tests, the intelligent password protection system has the user identification and the user friendliness equivalent to those of the conventional password system.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
fig. 1 is a flowchart of a mobile phone password protection system based on hidden code identification and hidden transformation according to the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will assist those skilled in the art in further understanding the invention, but are not intended to limit the invention in any way. It should be noted that it would be obvious to those skilled in the art that various changes and modifications can be made without departing from the spirit of the invention. All falling within the scope of the present invention.
Example 1
As shown in fig. 1, an embodiment of the present invention provides a mobile phone password protection system based on hidden code identification and hidden transformation, including a password input module, a key behavior information acquisition module, a hidden code definition module, a hidden code identification module, a hidden transformation definition module, a hidden transformation module, a password combination module, and a password verification module, where: the key behavior information acquisition module acquires key codes and key behavior information when the passwords are input from the password input module, the hidden code identification module automatically forms hidden passwords according to the key behavior information and according to code values of the hidden codes defined in the hidden code definition module, the hidden transformation module automatically carries out hidden transformation on the key codes acquired from the key behavior information acquisition module according to hidden transformation strategies defined in the hidden transformation definition module, the password combination module automatically combines the hidden passwords and the passwords subjected to the hidden transformation into final passwords according to user-defined strategies in the hidden code definition module and the hidden transformation definition module, and the password verification module automatically authenticates the legality of the final passwords.
The mobile phone password protection system is also provided with a password input touch feedback module, and the user can feed back the key pressing time to the fingers of the user by controlling the vibration of the mobile phone, so that the user friendliness is improved.
The information collected by the key behavior information collection module comprises the code of each key when a password is input, the time length of the key, the angle information of a mobile phone level meter, and the volume plus and volume minus key information of the mobile phone for implicit transformation.
The hidden code module automatically forms hidden codes such as time codes, angle codes and the like respectively by utilizing the time length of the key and the inclination angle of the mobile phone in the process of inputting the codes or just after inputting a code, and the positions of the time codes and the angle codes in the final codes and the coding values of the time codes and the angle codes are predefined in the hidden code definition module and can be defined by a user again.
The implicit transformation module performs implicit transformation on the key coding value in the password input process by using the volume plus and volume minus key information, and after inputting a number: every time the 'volume plus' key is pressed, adding one number (for example, adding 1) or the next letter to the input key code; pressing the volume key once ignores the key code just input. Therefore, the user can directly input the key codes which are different from or the same as the real passwords, and the same passwords have different flexible input methods. Wherein the amount of implicit transformation is predefined in the implicit transformation definition module and can also be customized by a user.
The password verification module is used for verifying the validity of the final password: when all the digital codes and the sequence thereof in the final password are correct and the time codes and the angle codes are from the recessive password module, the final password is judged to be correct; otherwise, the final password is judged to be wrong.
The working process and principle of the system are as follows:
(1) in the process of inputting the password, the key behavior information acquisition module automatically acquires the coded value of a key for inputting the password, simultaneously acquires the key behavior information such as the time length of the key and the inclination angle of the mobile phone in the process of inputting the password or just after inputting a digital code, forms a hidden password through the hidden code module to encrypt the password bit defined in the hidden code definition module, performs hidden change on the acquired key coded value through the hidden conversion module, forms a final password through the password combination module, and verifies the final password through the password verification module;
(2) the principle of realizing the peeping prevention and the cracking prevention of the password system is as follows: A. because the time of the key is difficult to distinguish by means of human eyes, camera shooting and the like, the hidden password is invisible in the password input process and can only be automatically generated according to the key time in the password input process, the hidden password is authenticated by the password verification module, the hidden password value is not different from other numbers in the password, the position of the hidden password value and even the hidden password value are preset by user definition, and the hidden password has personal uniqueness and confidentiality. Therefore, even if the password is seen by a person when the keyboard is input, other people cannot input the password correctly, although the inclination angle of the mobile phone is visible, the code value of the angle code and the code bit where the angle code is located cannot be known by other people, so that the other people cannot pass authentication according to the seen input password, and the anti-peeping and anti-cracking of the password are realized. B. Because the operation of the volume key of the mobile phone is concealed, the implicit transformation amount of the directly input code can be defined by a user, so that the implicit transformation realizes that the same password has different flexible input methods, even if someone sees the key number when the password is input, the password can not pass the authentication after being input, and the peep prevention and the crack prevention of the password are further enhanced.
According to the mobile phone password protection system, through collecting key coding information when a password is input on a mobile phone, and simultaneously collecting and identifying behavior information such as key pressure, key time, angle information of a gradienter when the mobile phone is at a certain angle, three recessive passwords of pressure, angle and time are added in the input digital coding information, and through carrying out recessive transformation on keys with operation concealment such as a volume key, flexible input of the same password by different methods is realized, the anti-peeping and anti-cracking safety of the mobile phone password system is realized, and the worry that people leak the password can be relieved; compared with the existing digital password, the anti-peeping and anti-cracking safety of the password is improved to 100 percent; the problem that the biological information passwords such as fingerprints and DNA (deoxyribonucleic acid) are copied and cannot be changed once being stolen is solved; the password system has the advantages of being equivalent to the existing password system in terms of user identification and user friendliness.
Example 2
The embodiment is directed to a mobile phone adopting a 3D-touch screen. On the basis of the embodiment 1, the password input touch feedback module also feeds back the size of the key pressure to the finger of the user; the information collected by the key behavior information collection module also comprises the pressure of each key when a password is input; the hidden code module also automatically forms a hidden password of the pressure code by utilizing the pressure of the key, and the position of the pressure code in the final password and the coding value of the pressure code are predefined in the hidden code definition module and can be defined again by a user; the password verification module also verifies a pressure code: when all the digital codes and the sequence thereof in the final password are correct and the time code, the angle code and the pressure code are from the recessive password module, the final password is judged to be correct; otherwise, the final password is judged to be wrong.
Example 3
The embodiment is directed to the application requirement that the mobile phone which does not adopt the 3D-touch screen but hopes to have the pressure code. On the basis of the embodiment 2, the pressure of the key is judged by identifying the contact area of the finger and the mobile phone screen according to the principle that the larger the contact area of the finger and the mobile phone screen is, the larger the pressure is, and the implicit password of the pressure code is automatically formed.
The foregoing description of specific embodiments of the present invention has been presented. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.

Claims (6)

1. The utility model provides a cell-phone password protection system based on latent code discernment and implicit transform which characterized in that, includes password input module, button action information acquisition module, latent code definition module, latent code discernment module, implicit transform definition module, implicit transform module, password composite module, password verification module, wherein: the key behavior information acquisition module acquires key codes and key behavior information when a password is input from the password input module, the information acquired by the key behavior information acquisition module comprises volume plus and volume minus key information for implicit transformation, the hidden code identification module automatically forms a hidden password according to the key behavior information and the code value of the hidden code defined in the hidden code definition module, the hidden transformation module performs the implicit transformation on the key code value in the password input process by using the volume plus and volume minus key information, so that a user inputs the key codes from a keyboard and the actual passwords differently or identically, thereby realizing that the same password has different flexible input methods, the amount of the implicit transformation is defined in the hidden transformation definition module and can be defined by the user, and the password combination module automatically presses the hidden passwords and the passwords after the implicit transformation according to the hidden code definition module, Self-defined strategies in the implicit transformation definition module are combined into a final password, and the password verification module automatically authenticates the legality of the final password;
the mobile phone further comprises a password input touch feedback module which feeds back the magnitude of the key pressure and/or the duration and/or the magnitude of the inclination angle of the mobile phone to the fingers of a user by controlling the vibration of the mobile phone so as to improve the user friendliness;
the size of the key pressure is judged by identifying the contact area of the finger and the mobile phone screen, and a recessive password of the pressure code is automatically formed.
2. The mobile phone password protection system based on the hidden code identification and the hidden transformation as claimed in claim 1, wherein the information collected by the key behavior information collection module includes the code of each key when inputting the password, the time length of the key, and the angle information of the mobile phone level.
3. The mobile phone password protection system based on the hidden code identification and the hidden transformation as claimed in claim 1, wherein the key behavior information collection module is capable of collecting the magnitude of the key pressure when inputting the password for the mobile phone adopting the 3D-Touch screen.
4. The mobile phone password protection system based on hidden code identification and hidden transformation of claim 1, wherein the hidden code identification module automatically forms hidden passwords by using the magnitude of the key pressure and/or the duration of the key and/or the magnitude of the inclination angle of the mobile phone during or just after inputting a number, respectively, and comprises: a pressure code and/or a time code and/or an angle code.
5. The mobile phone password protection system based on the hidden code identification and the hidden transformation in claim 4, wherein the position and/or the coding value of the hidden password in the final password are defined in the hidden code definition module and can be customized by a user.
6. The mobile phone password protection system based on hidden code identification and hidden transformation as claimed in claim 1, wherein the password verification module is configured to verify the validity of the final password by: when all the codes and the sequence thereof in the final password are correct and the recessive password is from the recessive code identification module, the final password is judged to be correct; otherwise, the final password is judged to be wrong.
CN201610819200.9A 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation Expired - Fee Related CN106534479B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610819200.9A CN106534479B (en) 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610819200.9A CN106534479B (en) 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation

Publications (2)

Publication Number Publication Date
CN106534479A CN106534479A (en) 2017-03-22
CN106534479B true CN106534479B (en) 2019-12-20

Family

ID=58343907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610819200.9A Expired - Fee Related CN106534479B (en) 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation

Country Status (1)

Country Link
CN (1) CN106534479B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659461A (en) * 2018-06-28 2020-01-07 Oppo(重庆)智能科技有限公司 Screen unlocking method and device, terminal and storage medium
CN109801050B (en) * 2019-01-22 2023-12-26 瑞银信支付技术有限公司 Mobile payment SDK and payment method for online mall
CN111444554A (en) * 2020-02-28 2020-07-24 张家口浩扬科技有限公司 Anti-peeping cipher device and cipher anti-peeping method thereof
CN116030558A (en) * 2023-03-27 2023-04-28 长沙鑫特科技有限公司 Four kinds of business libraries of bank based on face identification and dynamic trick lock

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598750A (en) * 2004-07-27 2005-03-23 天津大学 Gradient induction encrypted method
CN105279405A (en) * 2015-10-28 2016-01-27 同济大学 Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof
CN105354458A (en) * 2015-11-03 2016-02-24 广东欧珀移动通信有限公司 Password input verification method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8910299B2 (en) * 2008-02-08 2014-12-09 Steven Charles Michalske Emergency information access on portable electronic devices
CN104217142B (en) * 2013-05-30 2017-12-05 华为终端有限公司 The method and device of terminal is protected by startup password

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598750A (en) * 2004-07-27 2005-03-23 天津大学 Gradient induction encrypted method
CN105279405A (en) * 2015-10-28 2016-01-27 同济大学 Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof
CN105354458A (en) * 2015-11-03 2016-02-24 广东欧珀移动通信有限公司 Password input verification method and system

Also Published As

Publication number Publication date
CN106534479A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
RU2720563C2 (en) Authentication method and system
CN106534479B (en) Mobile phone password protection system based on hidden code identification and hidden transformation
KR20170009933A (en) Fingerprint decryption method and device
CN105227439B (en) A kind of sharing method and user terminal of associated person information
CN105187382B (en) Prevent from hitting the multiple-factor identity identifying method of storehouse attack
EP2936277B1 (en) Method and apparatus for information verification
TW201631512A (en) Fingerprint encoding method and fingerprint authentication method and system
CN105354458B (en) Password Input verification method and system
CN103297237A (en) Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server
US11469899B2 (en) System and a method for user authentication and/or authorization
US20190028470A1 (en) Method For Verifying The Identity Of A Person
CN106355078A (en) Intelligent password protecting system based on multifunctional-key behavior recognition
US10771970B2 (en) Method of authenticating communication of an authentication device and at least one authentication server using local factor
CN203243360U (en) Identity registration system
KR101860443B1 (en) Password management system and method using wearable augmented reality device
CN111241531A (en) Transaction identity authentication system based on block chain technology
JP2013127662A (en) Input information authentication device, server, input information authentication system, and program for the device
KR100944487B1 (en) The structure of the encrypted key and the method of strengthening security for force-guessing to a certificate
CN108933669B (en) Device of secondary password based on thing allies oneself with is synchronous
Viswanathan Steganopin: Two Faced Human-Machine Interface for Practical Enforcement of PIN Entry Security
CN103297238A (en) Identity authentication system
CN116895112A (en) Password input method and system for separating dynamic key position information from keyboard
CN103248629A (en) Identify registering system
Demaria RETHINKING E-AUTHENTICATION
JP2007079987A (en) Authentication method, authentication system, authentication program and recording medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191220