CN106534479B - Mobile phone password protection system based on hidden code identification and hidden transformation - Google Patents
Mobile phone password protection system based on hidden code identification and hidden transformation Download PDFInfo
- Publication number
- CN106534479B CN106534479B CN201610819200.9A CN201610819200A CN106534479B CN 106534479 B CN106534479 B CN 106534479B CN 201610819200 A CN201610819200 A CN 201610819200A CN 106534479 B CN106534479 B CN 106534479B
- Authority
- CN
- China
- Prior art keywords
- password
- hidden
- module
- key
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000009466 transformation Effects 0.000 title claims abstract description 50
- 238000012795 verification Methods 0.000 claims abstract description 18
- 238000000034 method Methods 0.000 claims description 20
- 230000008569 process Effects 0.000 claims description 14
- 239000002131 composite material Substances 0.000 claims 1
- 230000002265 prevention Effects 0.000 abstract description 16
- 238000005336 cracking Methods 0.000 abstract description 12
- 238000006243 chemical reaction Methods 0.000 abstract description 11
- 244000144985 peep Species 0.000 abstract description 5
- 208000008918 voyeurism Diseases 0.000 description 11
- 102000053602 DNA Human genes 0.000 description 5
- 108020004414 DNA Proteins 0.000 description 5
- 230000008859 change Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001680 brushing effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Environmental & Geological Engineering (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a mobile phone password protection system based on hidden code identification and hidden transformation, which specifically comprises the following steps: the key behavior information acquisition module acquires key codes and key behavior information when the password is input from the password input module, the hidden code identification module automatically forms hidden passwords according to the key behavior information and according to code values of the hidden codes defined in the hidden code definition module, the hidden conversion module automatically carries out hidden conversion on the key codes acquired from the key behavior information acquisition module according to hidden conversion strategies defined in the hidden conversion definition module, the password combination module automatically combines the hidden passwords, the passwords subjected to the hidden conversion according to the hidden code definition module and the custom strategies in the hidden conversion definition module into final passwords, and the password verification module automatically authenticates the legality of the final passwords. The invention solves the problems of peep prevention and cracking prevention safety of the mobile phone password system.
Description
Technical Field
The invention relates to a password protection system, in particular to a mobile phone password protection system based on hidden code identification and hidden transformation.
Background
The password is used as a protection spirit of information safety, and is an important guarantee for property protection and information safety. At present, the widely used cryptosystem mainly comprises a digital cipher and a biological information cipher such as fingerprint, face brushing, DNA and the like. The traditional digital password is very easy to be peeped and stolen by people, so that cases of property loss and personal information theft are frequently seen. Mobile phones have become a part of people's lives, and are often used for storing personal information, shopping online and the like. Therefore, the security of the mobile phone password system is crucial. At present, even though pattern passwords and fingerprint passwords are used for mobile phones, the problem of how to prevent others from cracking the passwords by means of shooting, peeping and the like is still not solved, and the problem that the fingerprint passwords cannot be changed once being copied by people exists. How to solve the problems of peep prevention and cracking prevention safety of the mobile phone password system is the basis of solving the mobile phone password safety.
The patent technology comprises an input terminal, a database storing basic password information preset by a user, an encryption operation unit for carrying out encryption operation on the basic password according to an encryption principle to form a verification password, and a verification unit for verifying whether an effective code in the password input by the user is consistent with an effective character code contained in the verification password formed by the encryption operation of the encryption operation unit, wherein the input terminal is provided with an input key for inputting an interference code and an effective code by the user, so that the user needs to input the interference code and the encrypted effective code according to an encryption input prompt on a display screen of the input terminal when inputting the password, and the security of password input is enhanced. The password system has the disadvantages that the input password can still be obtained through peeping, shooting and the like, and the password system can pass verification after being input, so that the purposes of peeping prevention and cracking prevention of the password system can not be achieved.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a mobile phone password protection system based on hidden code identification and hidden transformation, which can effectively solve the problems of peep prevention and decoding prevention safety of the existing mobile phone password system, can be directly applied to the existing mobile phone and realizes the protection of information safety and property safety of people.
In order to achieve the purpose, the invention is realized by the following technical scheme.
The invention relates to a mobile phone password protection system based on hidden code identification and hidden conversion, which comprises a password input module, a key behavior information acquisition module, a hidden code definition module, a hidden code identification module, a hidden conversion definition module, a hidden conversion module, a password combination module and a password verification module, wherein: the key behavior information acquisition module acquires key codes and key behavior information when the passwords are input from the password input module, the hidden code identification module automatically forms hidden passwords according to the key behavior information and according to code values of the hidden codes defined in the hidden code definition module, the hidden transformation module automatically carries out hidden transformation on the key codes acquired from the key behavior information acquisition module according to hidden transformation strategies defined in the hidden transformation definition module, the password combination module automatically combines the hidden passwords and the passwords subjected to the hidden transformation into final passwords according to user-defined strategies in the hidden code definition module and the hidden transformation definition module, and the password verification module automatically authenticates the legality of the final passwords.
Preferably, the mobile phone password protection system is further provided with a password input touch feedback module, and the user can feed back the magnitude of the key pressure and/or the duration of the key pressure and/or the magnitude of the inclination angle of the mobile phone to the fingers of the user by controlling the vibration of the mobile phone, so that the user friendliness is improved.
Preferably, the information collected by the key behavior information collection module includes a code of each key when a password is input, a time period of the key, angle information of a mobile phone level meter, and key information for implicit transformation, and the information can also be used for collecting the pressure of the key when the password is input for a mobile phone adopting a 3D-Touch screen.
Preferably, the keys for implicit transformation are 'volume +' and 'volume-' keys of the mobile phone.
Preferably, the hidden code module automatically forms hidden codes such as pressure codes and/or time codes and/or angle codes respectively by using the pressure of the key and/or the time of the key and/or the inclination angle of the mobile phone during or immediately after inputting a code, and the position of the hidden codes in the final codes and/or the code values of the hidden codes are defined in the hidden code definition module and can be customized by a user.
Preferably, the implicit transformation module performs implicit transformation on a key code value in the password input process by using the volume plus and volume minus key information, so that a user inputs a key code different from or the same as a real password from a keyboard, thereby realizing that the same password has different flexible input methods; the amount of implicit transformation is defined in the implicit transformation definition module and is customizable by the user.
Preferably, the password verification module is configured to verify the validity of the final password by: when all the numbers and the sequence thereof in the final password are correct and the recessive password is from the recessive password module, judging that the final password is correct; otherwise, the final password is judged to be wrong.
The working process and the principle of the mobile phone password protection system based on the hidden code identification and the hidden transformation are as follows:
(1) in the process of inputting the password, the key behavior information acquisition module automatically acquires the coded value of a key for inputting the password, and simultaneously acquires the key behavior information such as the pressure of the key, the time of the key, the inclination angle of the mobile phone in the process of inputting the password or just after inputting a number, and the like, and forms a hidden password through the hidden code module to encrypt the password bit defined in the hidden code definition module, and performs hidden change on the acquired key coded value through the hidden conversion module, and forms a final password through the password combination module, and the password verification module verifies the final password;
(2) the principle of realizing the peeping prevention and the cracking prevention of the password system is as follows:
A. because the pressure of the keys cannot be identified by means of human eyes, camera shooting and the like, and the time of the keys is difficult to distinguish, the hidden password is invisible in the password input process and can only be automatically generated according to the key pressure and the key time in the password input process, the hidden password is authenticated by the password authentication module, the hidden code value of the hidden password is not different from other numbers in the password, the position of the hidden password and even the hidden password value are preset by user definition, and the hidden password has personal uniqueness and confidentiality. Therefore, even if the password is seen by a person when the keyboard is input, other people cannot input the password correctly, although the inclination angle of the mobile phone is visible, the code value of the angle code and the code bit where the angle code is located cannot be known by other people, so that the other people cannot pass authentication according to the seen input password, and the anti-peeping and anti-cracking of the password are realized.
B. Because the operation of the volume key of the mobile phone is concealed, the implicit transformation amount of the directly input code can be defined by a user, so that the implicit transformation realizes that the same password has different flexible input methods, even if someone sees the key number when the password is input, the password can not pass the authentication after being input, and the peep prevention and the crack prevention of the password are further enhanced.
Compared with the prior art, the invention has the following beneficial effects:
(1) the invention realizes the anti-peeping and anti-cracking safety of the mobile phone password system, and can relieve the worry of people about the leakage of the password.
(2) Compared with the existing digital password, the intelligent password protection system can not prevent peeping and cracking, and improves the security of the password to 100%.
(3) The intelligent password protection system solves the problems that biological information passwords such as fingerprints and DNA (deoxyribonucleic acid) are copied and cannot be changed once being stolen.
(4) Through tests, the intelligent password protection system has the user identification and the user friendliness equivalent to those of the conventional password system.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
fig. 1 is a flowchart of a mobile phone password protection system based on hidden code identification and hidden transformation according to the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will assist those skilled in the art in further understanding the invention, but are not intended to limit the invention in any way. It should be noted that it would be obvious to those skilled in the art that various changes and modifications can be made without departing from the spirit of the invention. All falling within the scope of the present invention.
Example 1
As shown in fig. 1, an embodiment of the present invention provides a mobile phone password protection system based on hidden code identification and hidden transformation, including a password input module, a key behavior information acquisition module, a hidden code definition module, a hidden code identification module, a hidden transformation definition module, a hidden transformation module, a password combination module, and a password verification module, where: the key behavior information acquisition module acquires key codes and key behavior information when the passwords are input from the password input module, the hidden code identification module automatically forms hidden passwords according to the key behavior information and according to code values of the hidden codes defined in the hidden code definition module, the hidden transformation module automatically carries out hidden transformation on the key codes acquired from the key behavior information acquisition module according to hidden transformation strategies defined in the hidden transformation definition module, the password combination module automatically combines the hidden passwords and the passwords subjected to the hidden transformation into final passwords according to user-defined strategies in the hidden code definition module and the hidden transformation definition module, and the password verification module automatically authenticates the legality of the final passwords.
The mobile phone password protection system is also provided with a password input touch feedback module, and the user can feed back the key pressing time to the fingers of the user by controlling the vibration of the mobile phone, so that the user friendliness is improved.
The information collected by the key behavior information collection module comprises the code of each key when a password is input, the time length of the key, the angle information of a mobile phone level meter, and the volume plus and volume minus key information of the mobile phone for implicit transformation.
The hidden code module automatically forms hidden codes such as time codes, angle codes and the like respectively by utilizing the time length of the key and the inclination angle of the mobile phone in the process of inputting the codes or just after inputting a code, and the positions of the time codes and the angle codes in the final codes and the coding values of the time codes and the angle codes are predefined in the hidden code definition module and can be defined by a user again.
The implicit transformation module performs implicit transformation on the key coding value in the password input process by using the volume plus and volume minus key information, and after inputting a number: every time the 'volume plus' key is pressed, adding one number (for example, adding 1) or the next letter to the input key code; pressing the volume key once ignores the key code just input. Therefore, the user can directly input the key codes which are different from or the same as the real passwords, and the same passwords have different flexible input methods. Wherein the amount of implicit transformation is predefined in the implicit transformation definition module and can also be customized by a user.
The password verification module is used for verifying the validity of the final password: when all the digital codes and the sequence thereof in the final password are correct and the time codes and the angle codes are from the recessive password module, the final password is judged to be correct; otherwise, the final password is judged to be wrong.
The working process and principle of the system are as follows:
(1) in the process of inputting the password, the key behavior information acquisition module automatically acquires the coded value of a key for inputting the password, simultaneously acquires the key behavior information such as the time length of the key and the inclination angle of the mobile phone in the process of inputting the password or just after inputting a digital code, forms a hidden password through the hidden code module to encrypt the password bit defined in the hidden code definition module, performs hidden change on the acquired key coded value through the hidden conversion module, forms a final password through the password combination module, and verifies the final password through the password verification module;
(2) the principle of realizing the peeping prevention and the cracking prevention of the password system is as follows: A. because the time of the key is difficult to distinguish by means of human eyes, camera shooting and the like, the hidden password is invisible in the password input process and can only be automatically generated according to the key time in the password input process, the hidden password is authenticated by the password verification module, the hidden password value is not different from other numbers in the password, the position of the hidden password value and even the hidden password value are preset by user definition, and the hidden password has personal uniqueness and confidentiality. Therefore, even if the password is seen by a person when the keyboard is input, other people cannot input the password correctly, although the inclination angle of the mobile phone is visible, the code value of the angle code and the code bit where the angle code is located cannot be known by other people, so that the other people cannot pass authentication according to the seen input password, and the anti-peeping and anti-cracking of the password are realized. B. Because the operation of the volume key of the mobile phone is concealed, the implicit transformation amount of the directly input code can be defined by a user, so that the implicit transformation realizes that the same password has different flexible input methods, even if someone sees the key number when the password is input, the password can not pass the authentication after being input, and the peep prevention and the crack prevention of the password are further enhanced.
According to the mobile phone password protection system, through collecting key coding information when a password is input on a mobile phone, and simultaneously collecting and identifying behavior information such as key pressure, key time, angle information of a gradienter when the mobile phone is at a certain angle, three recessive passwords of pressure, angle and time are added in the input digital coding information, and through carrying out recessive transformation on keys with operation concealment such as a volume key, flexible input of the same password by different methods is realized, the anti-peeping and anti-cracking safety of the mobile phone password system is realized, and the worry that people leak the password can be relieved; compared with the existing digital password, the anti-peeping and anti-cracking safety of the password is improved to 100 percent; the problem that the biological information passwords such as fingerprints and DNA (deoxyribonucleic acid) are copied and cannot be changed once being stolen is solved; the password system has the advantages of being equivalent to the existing password system in terms of user identification and user friendliness.
Example 2
The embodiment is directed to a mobile phone adopting a 3D-touch screen. On the basis of the embodiment 1, the password input touch feedback module also feeds back the size of the key pressure to the finger of the user; the information collected by the key behavior information collection module also comprises the pressure of each key when a password is input; the hidden code module also automatically forms a hidden password of the pressure code by utilizing the pressure of the key, and the position of the pressure code in the final password and the coding value of the pressure code are predefined in the hidden code definition module and can be defined again by a user; the password verification module also verifies a pressure code: when all the digital codes and the sequence thereof in the final password are correct and the time code, the angle code and the pressure code are from the recessive password module, the final password is judged to be correct; otherwise, the final password is judged to be wrong.
Example 3
The embodiment is directed to the application requirement that the mobile phone which does not adopt the 3D-touch screen but hopes to have the pressure code. On the basis of the embodiment 2, the pressure of the key is judged by identifying the contact area of the finger and the mobile phone screen according to the principle that the larger the contact area of the finger and the mobile phone screen is, the larger the pressure is, and the implicit password of the pressure code is automatically formed.
The foregoing description of specific embodiments of the present invention has been presented. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.
Claims (6)
1. The utility model provides a cell-phone password protection system based on latent code discernment and implicit transform which characterized in that, includes password input module, button action information acquisition module, latent code definition module, latent code discernment module, implicit transform definition module, implicit transform module, password composite module, password verification module, wherein: the key behavior information acquisition module acquires key codes and key behavior information when a password is input from the password input module, the information acquired by the key behavior information acquisition module comprises volume plus and volume minus key information for implicit transformation, the hidden code identification module automatically forms a hidden password according to the key behavior information and the code value of the hidden code defined in the hidden code definition module, the hidden transformation module performs the implicit transformation on the key code value in the password input process by using the volume plus and volume minus key information, so that a user inputs the key codes from a keyboard and the actual passwords differently or identically, thereby realizing that the same password has different flexible input methods, the amount of the implicit transformation is defined in the hidden transformation definition module and can be defined by the user, and the password combination module automatically presses the hidden passwords and the passwords after the implicit transformation according to the hidden code definition module, Self-defined strategies in the implicit transformation definition module are combined into a final password, and the password verification module automatically authenticates the legality of the final password;
the mobile phone further comprises a password input touch feedback module which feeds back the magnitude of the key pressure and/or the duration and/or the magnitude of the inclination angle of the mobile phone to the fingers of a user by controlling the vibration of the mobile phone so as to improve the user friendliness;
the size of the key pressure is judged by identifying the contact area of the finger and the mobile phone screen, and a recessive password of the pressure code is automatically formed.
2. The mobile phone password protection system based on the hidden code identification and the hidden transformation as claimed in claim 1, wherein the information collected by the key behavior information collection module includes the code of each key when inputting the password, the time length of the key, and the angle information of the mobile phone level.
3. The mobile phone password protection system based on the hidden code identification and the hidden transformation as claimed in claim 1, wherein the key behavior information collection module is capable of collecting the magnitude of the key pressure when inputting the password for the mobile phone adopting the 3D-Touch screen.
4. The mobile phone password protection system based on hidden code identification and hidden transformation of claim 1, wherein the hidden code identification module automatically forms hidden passwords by using the magnitude of the key pressure and/or the duration of the key and/or the magnitude of the inclination angle of the mobile phone during or just after inputting a number, respectively, and comprises: a pressure code and/or a time code and/or an angle code.
5. The mobile phone password protection system based on the hidden code identification and the hidden transformation in claim 4, wherein the position and/or the coding value of the hidden password in the final password are defined in the hidden code definition module and can be customized by a user.
6. The mobile phone password protection system based on hidden code identification and hidden transformation as claimed in claim 1, wherein the password verification module is configured to verify the validity of the final password by: when all the codes and the sequence thereof in the final password are correct and the recessive password is from the recessive code identification module, the final password is judged to be correct; otherwise, the final password is judged to be wrong.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610819200.9A CN106534479B (en) | 2016-09-12 | 2016-09-12 | Mobile phone password protection system based on hidden code identification and hidden transformation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610819200.9A CN106534479B (en) | 2016-09-12 | 2016-09-12 | Mobile phone password protection system based on hidden code identification and hidden transformation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534479A CN106534479A (en) | 2017-03-22 |
CN106534479B true CN106534479B (en) | 2019-12-20 |
Family
ID=58343907
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610819200.9A Expired - Fee Related CN106534479B (en) | 2016-09-12 | 2016-09-12 | Mobile phone password protection system based on hidden code identification and hidden transformation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534479B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659461A (en) * | 2018-06-28 | 2020-01-07 | Oppo(重庆)智能科技有限公司 | Screen unlocking method and device, terminal and storage medium |
CN109801050B (en) * | 2019-01-22 | 2023-12-26 | 瑞银信支付技术有限公司 | Mobile payment SDK and payment method for online mall |
CN111444554A (en) * | 2020-02-28 | 2020-07-24 | 张家口浩扬科技有限公司 | Anti-peeping cipher device and cipher anti-peeping method thereof |
CN116030558A (en) * | 2023-03-27 | 2023-04-28 | 长沙鑫特科技有限公司 | Four kinds of business libraries of bank based on face identification and dynamic trick lock |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1598750A (en) * | 2004-07-27 | 2005-03-23 | 天津大学 | Gradient induction encrypted method |
CN105279405A (en) * | 2015-10-28 | 2016-01-27 | 同济大学 | Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof |
CN105354458A (en) * | 2015-11-03 | 2016-02-24 | 广东欧珀移动通信有限公司 | Password input verification method and system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8910299B2 (en) * | 2008-02-08 | 2014-12-09 | Steven Charles Michalske | Emergency information access on portable electronic devices |
CN104217142B (en) * | 2013-05-30 | 2017-12-05 | 华为终端有限公司 | The method and device of terminal is protected by startup password |
-
2016
- 2016-09-12 CN CN201610819200.9A patent/CN106534479B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1598750A (en) * | 2004-07-27 | 2005-03-23 | 天津大学 | Gradient induction encrypted method |
CN105279405A (en) * | 2015-10-28 | 2016-01-27 | 同济大学 | Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof |
CN105354458A (en) * | 2015-11-03 | 2016-02-24 | 广东欧珀移动通信有限公司 | Password input verification method and system |
Also Published As
Publication number | Publication date |
---|---|
CN106534479A (en) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2720563C2 (en) | Authentication method and system | |
CN106534479B (en) | Mobile phone password protection system based on hidden code identification and hidden transformation | |
KR20170009933A (en) | Fingerprint decryption method and device | |
CN105227439B (en) | A kind of sharing method and user terminal of associated person information | |
CN105187382B (en) | Prevent from hitting the multiple-factor identity identifying method of storehouse attack | |
EP2936277B1 (en) | Method and apparatus for information verification | |
TW201631512A (en) | Fingerprint encoding method and fingerprint authentication method and system | |
CN105354458B (en) | Password Input verification method and system | |
CN103297237A (en) | Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server | |
US11469899B2 (en) | System and a method for user authentication and/or authorization | |
US20190028470A1 (en) | Method For Verifying The Identity Of A Person | |
CN106355078A (en) | Intelligent password protecting system based on multifunctional-key behavior recognition | |
US10771970B2 (en) | Method of authenticating communication of an authentication device and at least one authentication server using local factor | |
CN203243360U (en) | Identity registration system | |
KR101860443B1 (en) | Password management system and method using wearable augmented reality device | |
CN111241531A (en) | Transaction identity authentication system based on block chain technology | |
JP2013127662A (en) | Input information authentication device, server, input information authentication system, and program for the device | |
KR100944487B1 (en) | The structure of the encrypted key and the method of strengthening security for force-guessing to a certificate | |
CN108933669B (en) | Device of secondary password based on thing allies oneself with is synchronous | |
Viswanathan | Steganopin: Two Faced Human-Machine Interface for Practical Enforcement of PIN Entry Security | |
CN103297238A (en) | Identity authentication system | |
CN116895112A (en) | Password input method and system for separating dynamic key position information from keyboard | |
CN103248629A (en) | Identify registering system | |
Demaria | RETHINKING E-AUTHENTICATION | |
JP2007079987A (en) | Authentication method, authentication system, authentication program and recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191220 |