CN106534479B - Mobile phone password protection system based on hidden code identification and hidden transformation - Google Patents

Mobile phone password protection system based on hidden code identification and hidden transformation Download PDF

Info

Publication number
CN106534479B
CN106534479B CN201610819200.9A CN201610819200A CN106534479B CN 106534479 B CN106534479 B CN 106534479B CN 201610819200 A CN201610819200 A CN 201610819200A CN 106534479 B CN106534479 B CN 106534479B
Authority
CN
China
Prior art keywords
password
hidden
module
code
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610819200.9A
Other languages
Chinese (zh)
Other versions
CN106534479A (en
Inventor
杨熠欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai 01 Power Technology Co ltd
Original Assignee
Shanghai 01 Power Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai 01 Power Technology Co ltd filed Critical Shanghai 01 Power Technology Co ltd
Priority to CN201610819200.9A priority Critical patent/CN106534479B/en
Publication of CN106534479A publication Critical patent/CN106534479A/en
Application granted granted Critical
Publication of CN106534479B publication Critical patent/CN106534479B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a mobile phone password protection system based on hidden code identification and hidden transformation, which specifically comprises the following steps: the key behavior information acquisition module acquires key codes and key behavior information when the password is input from the password input module, the hidden code identification module automatically forms hidden passwords according to the key behavior information and according to code values of the hidden codes defined in the hidden code definition module, the hidden conversion module automatically carries out hidden conversion on the key codes acquired from the key behavior information acquisition module according to hidden conversion strategies defined in the hidden conversion definition module, the password combination module automatically combines the hidden passwords, the passwords subjected to the hidden conversion according to the hidden code definition module and the custom strategies in the hidden conversion definition module into final passwords, and the password verification module automatically authenticates the legality of the final passwords. The invention solves the problems of peep prevention and cracking prevention safety of the mobile phone password system.

Description

基于隐码识别与隐式变换的手机密码保护系统Mobile phone password protection system based on hidden code identification and implicit transformation

技术领域technical field

本发明涉及一种密码保护系统,具体地,涉及一种基于隐码识别与隐式变换的手机密码保护系统。The invention relates to a password protection system, in particular to a mobile phone password protection system based on hidden code identification and implicit transformation.

背景技术Background technique

密码,作为信息安全的保护神,是财产保护和信息安全的重要保障。目前,广泛使用的密码系统主要有数字密码和指纹、刷脸、DNA等生物信息密码。传统的数字密码极易被人偷窥、偷用,由此造成财产损失、个人信息被盗的案件屡见不鲜。手机,已成为人们生活中的一部分,经常利用手机保存个人信息、网上购物等。因此,手机密码系统的安全性至关重要。目前,即使图案密码、指纹密码已用于手机,但仍然未能解决如何防止他人利用摄像、偷窥等破解密码的问题,对于指纹密码还存在一旦被人复制就无法更改的问题。如何解决手机密码系统本身的防偷窥、防破解安全性问题,是解决手机密码安全的根本。Password, as the patron saint of information security, is an important guarantee for property protection and information security. At present, the widely used password systems mainly include digital passwords and biological information passwords such as fingerprints, facial recognition, and DNA. Traditional digital passwords are very easy to be peeped and used by others, resulting in property loss and personal information theft cases are not uncommon. Mobile phones have become a part of people's lives, and they are often used to store personal information, shop online, etc. Therefore, the security of the mobile phone password system is very important. At present, even though pattern passwords and fingerprint passwords have been used in mobile phones, they still have not solved the problem of how to prevent others from cracking the passwords by using cameras, peeping, etc., and there is still a problem that fingerprint passwords cannot be changed once they are copied. How to solve the anti-peeping and anti-cracking security problems of the mobile phone password system itself is the root of solving the security of mobile phone passwords.

经对现有技术的文献检索发现一篇公告号为CN 104408363A、公告日为2015年03月11日、专利名称为“安全密码系统”的中国专利,该专利技术包括输入终端、储存有用户预设的基础密码信息的数据库、用于将基础密码按照加密原则进行加密运算而形成验证密码的加密运算单元及用于验证用户输入的密码中的有效码是否与加密运算单元经加密运算形成的验证密码所包含的有效字码相一致的验证单元,输入终端设有用于用户输入干扰码和有效码的输入按键,使用户在输入密码时需按照输入终端显示屏上的加密输入提示输入干扰码和经加密后的有效码,加强密码输入的安全性。其不足之处在于,通过窥视、摄像等,依然可以获得输入的密码,而且输入后均能通过验证,从而达不到密码系统本身的防偷窥、防破解的目的。A Chinese patent with the announcement number CN 104408363A, the announcement date is March 11, 2015, and the patent name is "Security Cryptography System" is found through the literature search of the prior art. The database of the basic password information, the encryption operation unit used to encrypt the basic password according to the encryption principle to form the verification password, and the verification code formed by the encryption operation unit to verify whether the valid code in the password entered by the user is consistent with the encryption operation unit. The valid code contained in the password is consistent with the verification unit. The input terminal is provided with input buttons for the user to input the interference code and the effective code, so that the user needs to input the interference code and the password according to the encrypted input prompt on the display screen of the input terminal when entering the password. The encrypted valid code strengthens the security of password input. Its disadvantage is that the input password can still be obtained through peeping, taking pictures, etc., and all can pass verification after inputting, thereby failing to achieve the purpose of anti-peeping and anti-cracking of the password system itself.

发明内容Contents of the invention

针对现有技术中的缺陷,本发明的目的是提供一种基于隐码识别与隐式变换的手机密码保护系统,其能有效解决目前手机密码系统本身的防偷窥、防破解安全性问题,并可直接应用于现有手机上,实现对人们信息安全和财产安全的保护。In view of the defects in the prior art, the purpose of the present invention is to provide a mobile phone password protection system based on hidden code identification and implicit transformation, which can effectively solve the security problems of anti-peeping and anti-cracking of the current mobile phone password system itself, and It can be directly applied to existing mobile phones to realize the protection of people's information security and property security.

为实现上述目的,本发明是通过以下技术方案实现的。In order to achieve the above object, the present invention is achieved through the following technical solutions.

本发明的基于隐码识别与隐式变换的手机密码保护系统,包括密码输入模块、按键行为信息采集模块、隐码定义模块、隐码识别模块、隐式变换定义模块、隐式变换模块、密码组合模块、密码验证模块,其中:所述按键行为信息采集模块从所述密码输入模块获得输入密码时的按键编码与按键行为信息,所述隐码识别模块根据按键行为信息按隐码定义模块中定义的隐码的编码值自动形成隐性密码,所述隐式变换模块自动按隐式变换定义模块中定义的隐式变换策略对来自所述按键行为信息采集模块采集到的按键编码进行隐式变换,所述密码组合模块自动将所述隐性密码、所述隐式变换后的密码按所述隐码定义模块、隐式变换定义模块中的自定义策略组合成最终密码,所述密码验证模块自动认证所述最终密码的合法性。The mobile phone password protection system based on hidden code identification and implicit transformation of the present invention includes a password input module, a button behavior information collection module, a hidden code definition module, a hidden code identification module, an implicit transformation definition module, an implicit transformation module, a password Combination module and password verification module, wherein: the button behavior information collection module obtains the button code and button behavior information when entering the password from the password input module, and the hidden code identification module is defined according to the hidden code according to the button behavior information. The coding value of the defined hidden code automatically forms a hidden password, and the implicit conversion module automatically performs implicit conversion from the key codes collected by the key behavior information collection module according to the implicit conversion strategy defined in the implicit conversion definition module. transformation, the password combination module automatically combines the hidden password and the password after the implicit transformation into a final password according to the self-defined strategy in the hidden code definition module and the implicit transformation definition module, and the password verification The module automatically verifies the validity of the final password.

优选地,所述手机密码保护系统还设置有密码输入触感反馈模块,通过控制手机的震动,向用户手指反馈按键压力的大小和/或时间的长短和/或手机倾斜角度的大小,以提高用户友好性。Preferably, the mobile phone password protection system is also provided with a password input tactile feedback module. By controlling the vibration of the mobile phone, the size of the key pressure and/or the length of time and/or the size of the tilt angle of the mobile phone are fed back to the user's fingers to improve the user's friendliness.

优选地,所述按键行为信息采集模块采集的信息包括输入密码时每个按键的编码以及按键的时间长短、手机水平仪的角度信息、用于隐式变换的按键信息,还可对采用3D-Touch屏幕的手机采集输入密码时按键的压力大小。Preferably, the information collected by the button behavior information collection module includes the code of each button when entering the password, the time length of the button, the angle information of the mobile phone level, and the button information for implicit transformation. It is also possible to use 3D-Touch The mobile phone on the screen collects the pressure of the keys when entering the password.

优选地,所述用于隐式变换的按键为手机的“音量+”和“音量-”按键。Preferably, the keys used for implicit conversion are "volume +" and "volume -" keys of the mobile phone.

优选地,所述隐码模块利用所述按键的压力大小和/或按键的时间长短和/或输入密码过程中或刚输入一个数码后的手机倾斜角度的大小,分别自动形成压力码和/或时间码和/或角度码等隐性密码,所述隐性密码在所述最终密码中的位置和/或这些隐性密码的编码值在所述隐码定义模块中定义并可由用户自定义。Preferably, the hidden code module automatically forms the pressure code and/or Hidden passwords such as time codes and/or angle codes, the positions of the hidden passwords in the final password and/or the coded values of these hidden passwords are defined in the hidden code definition module and can be customized by users.

优选地,所述隐式变换模块利用所述“音量+”和“音量-”按键信息对密码输入过程中的按键编码值进行隐式变换,使用户从键盘输入按键编码与真实密码不同或相同,从而实现同一密码具有不同的灵活输入方法;隐式变换的量在所述隐式变换定义模块中定义并可由用户自定义。Preferably, the implicit transformation module uses the "volume +" and "volume -" key information to implicitly transform the key code value during the password input process, so that the key code input by the user from the keyboard is different from or the same as the real password , so that the same password has different flexible input methods; the amount of implicit transformation is defined in the implicit transformation definition module and can be customized by the user.

优选地,所述密码验证模块用于对所述最终密码的合法性验证:在该最终密码中的全部数码及其顺序均正确,而且其中的隐性密码都是来自隐性密码模块时,判断最终密码为正确;否则,判断最终密码为错误。Preferably, the password verification module is used to verify the validity of the final password: when all the numbers and their sequences in the final password are correct, and the hidden passwords therein are all from the hidden password module, it is judged The final password is correct; otherwise, it is judged that the final password is wrong.

本发明的基于隐码识别与隐式变换的手机密码保护系统的工作过程及原理如下:The working process and principle of the mobile phone password protection system based on hidden code identification and implicit transformation of the present invention are as follows:

(1)在输入密码过程中,按键行为信息采集模块自动采集输入密码的按键的编码值,同时采集按键的压力大小、按键的时间长短和输入密码过程中或刚输入一个数码后的手机倾斜角度的大小等按键行为信息,并经隐码模块形成隐性密码来加密在述隐码定义模块中所定义的密码位,经隐式变换模块对采集的按键编码值进行隐式变化,经密码组合模块形成最终密码,由密码验证模块对最终密码进行验证;(1) During the password input process, the button behavior information collection module automatically collects the coded value of the button that enters the password, and at the same time collects the pressure of the button, the duration of the button, and the tilt angle of the mobile phone during the password input process or just after entering a number The key behavior information such as the size of the button, and form a hidden password through the hidden code module to encrypt the password bits defined in the hidden code definition module, and implicitly change the coded value of the key collected through the implicit transformation module. The module forms the final password, and the password verification module verifies the final password;

(2)实现密码系统本身防偷窥、防破解的原理为:(2) The principle of realizing the anti-peeping and anti-cracking of the password system itself is:

A.由于人眼、摄像等手段无法识别按键的压力大小、难于区分按键的时间长短,使得所述隐性密码在输入密码的过程中“不可见”,只能在密码输入过程中根据按键压力、按键时间自动产生,经所述密码验证模块认证,而且其隐码值与密码中的其它数码看起来没什么区别,所在位甚至隐性密码值也由用户自定义预设,具有个人独特性和保密性。因此,即使键盘输入时密码被人看到,他人也将因无法正确输入,手机倾斜角度虽可见,但由于角度码的编码值及其所在的密码位,他人无法知道,因此他人按看到的输入密码将无法通过认证,从而实现密码的防偷窥、防破解。A. Since the human eye, camera and other means cannot recognize the pressure of the key, and it is difficult to distinguish the duration of the key, the hidden password is "invisible" in the process of entering the password. 1. The key-press time is automatically generated, authenticated by the password verification module, and its hidden code value looks no different from other numbers in the password. The position and even the hidden password value are also preset by the user, which has personal uniqueness and confidentiality. Therefore, even if the password is seen by others when the keyboard is entered, others will not be able to input it correctly. Although the tilt angle of the mobile phone is visible, others cannot know because of the encoded value of the angle code and the password bit where it is located. Entering the password will not pass the authentication, so as to realize the anti-peeping and anti-cracking of the password.

B.由于手机音量键的操作具有隐蔽性,对直接输入的编码的隐式变换的量可由用户自定义,因此所述隐式变换实现同一密码具有不同的灵活输入方法,别人即使看到输入密码时的按键数码,同样输入后亦无法通过认证,进一步增强密码的防偷窥、防破解。B. Due to the concealment of the operation of the mobile phone volume key, the amount of implicit transformation of the directly input code can be customized by the user, so the implicit transformation realizes that the same password has different flexible input methods, even if others see the input password When the button number is also entered, it cannot pass the authentication, which further enhances the anti-peeping and anti-cracking of the password.

与现有技术相比,本发明具有如下的有益效果:Compared with the prior art, the present invention has the following beneficial effects:

(1)本发明实现了手机密码系统本身的防偷窥和防破解安全性,可解除人们对自己密码泄露的担心。(1) The present invention realizes the anti-peeping and anti-cracking security of the mobile phone password system itself, and can relieve people's worries about their own password leakage.

(2)本发明的智能密码保护系统,较现有数字密码本身的不能防偷窥、防破解,将密码的防偷窥、防破解安全性提升到了100%。(2) The intelligent password protection system of the present invention improves the anti-peeping and anti-cracking security of the password to 100% compared with the existing digital password itself which cannot prevent peeping and cracking.

(3)本发明的智能密码保护系统,解除指纹、DNA等生物信息密码已被复制,而且一旦被盗将无法更改的问题。(3) The intelligent password protection system of the present invention removes the problem that biological information passwords such as fingerprints and DNA have been copied and cannot be changed once stolen.

(4)经测试,本发明的智能密码保护系统具有与现有密码系统相当的用户辨识性和用户友好性。(4) After testing, the intelligent password protection system of the present invention has user identification and user friendliness equivalent to the existing password system.

附图说明Description of drawings

通过阅读参照以下附图对非限制性实施例所作的详细描述,本发明的其它特征、目的和优点将会变得更明显:Other characteristics, objects and advantages of the present invention will become more apparent by reading the detailed description of non-limiting embodiments made with reference to the following drawings:

图1为本发明基于隐码识别与隐式变换的手机密码保护系统的流程图。Fig. 1 is the flowchart of the mobile phone password protection system based on hidden code identification and implicit conversion in the present invention.

具体实施方式Detailed ways

下面结合具体实施例对本发明进行详细说明。以下实施例将有助于本领域的技术人员进一步理解本发明,但不以任何形式限制本发明。应当指出的是,对本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变化和改进。这些都属于本发明的保护范围。The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

实施例1Example 1

图1所示,本发明实施例提供了一种基于隐码识别与隐式变换的手机密码保护系统,包括密码输入模块、按键行为信息采集模块、隐码定义模块、隐码识别模块、隐式变换定义模块、隐式变换模块、密码组合模块、密码验证模块,其中:所述按键行为信息采集模块从所述密码输入模块获得输入密码时的按键编码与按键行为信息,所述隐码识别模块根据按键行为信息按隐码定义模块中定义的隐码的编码值自动形成隐性密码,所述隐式变换模块自动按隐式变换定义模块中定义的隐式变换策略对来自所述按键行为信息采集模块采集到的按键编码进行隐式变换,所述密码组合模块自动将所述隐性密码、所述隐式变换后的密码按所述隐码定义模块、隐式变换定义模块中的自定义策略组合成最终密码,所述密码验证模块自动认证所述最终密码的合法性。As shown in Figure 1, the embodiment of the present invention provides a mobile phone password protection system based on hidden code identification and implicit conversion, including a password input module, a button behavior information collection module, a hidden code definition module, a hidden code identification module, an implicit transformation definition module, implicit transformation module, password combination module, and password verification module, wherein: the button behavior information collection module obtains the button code and button behavior information when entering a password from the password input module, and the hidden code identification module According to the key behavior information, the coded value of the hidden code defined in the hidden code definition module automatically forms a hidden password, and the implicit transformation module automatically presses the implicit transformation strategy defined in the implicit transformation definition module from the key behavior information. The key codes collected by the acquisition module are implicitly converted, and the password combination module automatically converts the hidden password and the password after the implicit conversion according to the definition in the hidden code definition module and the implicit transformation definition module. The policies are combined into a final password, and the password verification module automatically verifies the validity of the final password.

所述手机密码保护系统还设置有密码输入触感反馈模块,通过控制手机的震动,向用户手指反馈按键时间的长短,以提高用户友好性。The mobile phone password protection system is also provided with a password input tactile feedback module, through controlling the vibration of the mobile phone, giving feedback to the user's fingers about the length of the key press time, so as to improve user friendliness.

所述按键行为信息采集模块采集的信息包括输入密码时每个按键的编码以及按键的时间长短、手机水平仪的角度信息、用于隐式变换的手机的“音量+”和“音量-”按键信息。The information collected by the button behavior information collection module includes the code of each button when entering the password and the duration of the button, the angle information of the mobile phone level, the "volume+" and "volume-" button information of the mobile phone used for implicit transformation .

所述隐码模块利用所述按键的时间长短和输入密码过程中或刚输入一个数码后的手机倾斜角度的大小,分别自动形成时间码和角度码等隐性密码,所述时间码、角度码在所述最终密码中的位置及其编码值在所述隐码定义模块中预定义,也可由用户重新自定义。Described hidden code module utilizes the length of time of described button and the size of mobile phone inclination angle in the process of inputting password or just after inputting a number, automatically forms hidden passwords such as time code and angle code respectively, and described time code, angle code The position in the final password and its encoding value are predefined in the hidden code definition module, and can also be re-defined by the user.

所述隐式变换模块利用所述“音量+”和“音量-”按键信息对密码输入过程中的按键编码值进行隐式变换,输入数码后:每按一次“音量+”按键,则将输入的按键编码加一个数(如,加1)或下一个字母;按一次“音量-”按键,则将刚输入的按键编码忽略。从而,使用户直接输入按键编码与真实密码不同或相同,实现同一密码具有不同的灵活输入方法。其中,隐式变换的量在所述隐式变换定义模块中预定义,也可由用户自定义。The implicit conversion module uses the "volume +" and "volume -" button information to implicitly convert the key code value during the password input process. After inputting the number: each time the "volume +" button is pressed, the input Add a number (for example, add 1) or the next letter to the key code; press the "volume-" key once, then ignore the key code just input. Therefore, the key code directly input by the user is different from or the same as the real password, so that the same password has different flexible input methods. Wherein, the amount of implicit transformation is predefined in the implicit transformation definition module, and can also be defined by the user.

所述密码验证模块用于对所述最终密码的合法性验证:在该最终密码中的全部数码及其顺序均正确,而且其中的时间码、角度码都是来自隐性密码模块时,判断最终密码为正确;否则,判断最终密码为错误。Described password verification module is used for the legitimacy verification to described final password: in this final password all digitals and order thereof are all correct, and wherein time code, angle code are all from recessive password module, when judging the final The password is correct; otherwise, the final password is determined to be wrong.

本系统的工作过程及原理如下:The working process and principle of this system are as follows:

(1)在输入密码过程中,按键行为信息采集模块自动采集输入密码的按键的编码值,同时采集按键的按键的时间长短和输入密码过程中或刚输入一个数码后的手机倾斜角度的大小等按键行为信息,并经隐码模块形成隐性密码来加密在述隐码定义模块中所定义的密码位,经隐式变换模块对采集的按键编码值进行隐式变化,经密码组合模块形成最终密码,由密码验证模块对最终密码进行验证;(1) During the password input process, the button behavior information collection module automatically collects the coded value of the key that is input into the password, and at the same time collects the length of time the key is pressed and the tilt angle of the mobile phone during the process of entering the password or just after entering a number, etc. Key behavior information, and form a hidden password through the hidden code module to encrypt the password bits defined in the hidden code definition module, carry out implicit changes to the collected key code values through the implicit transformation module, and form the final code value through the password combination module Password, the final password is verified by the password verification module;

(2)实现密码系统本身防偷窥、防破解的原理为:A.由于人眼、摄像等手段难于区分按键的时间长短,使得所述隐性密码在输入密码的过程中“不可见”,只能在密码输入过程中根据按键时间自动产生,经所述密码验证模块认证,而且其隐码值与密码中的其它数码看起来没什么区别,所在位甚至隐性密码值也由用户自定义预设,具有个人独特性和保密性。因此,即使键盘输入时密码被人看到,他人也将因无法正确输入,手机倾斜角度虽可见,但由于角度码的编码值及其所在的密码位,他人无法知道,因此他人按看到的输入密码将无法通过认证,从而实现密码的防偷窥、防破解。B.由于手机音量键的操作具有隐蔽性,对直接输入的编码的隐式变换的量可由用户自定义,因此所述隐式变换实现同一密码具有不同的灵活输入方法,别人即使看到输入密码时的按键数码,同样输入后亦无法通过认证,进一步增强密码的防偷窥、防破解。(2) The principle of realizing the anti-peeping and anti-cracking of the password system itself is: A. Because it is difficult to distinguish the time length of the key by means such as human eyes and cameras, the hidden password is "invisible" in the process of inputting the password, only It can be automatically generated according to the key-press time during the password input process, authenticated by the password verification module, and its hidden code value looks no different from other numbers in the password, and the location and even the hidden password value are also preset by the user , with personal uniqueness and confidentiality. Therefore, even if the password is seen by others when the keyboard is entered, others will not be able to input it correctly. Although the tilt angle of the mobile phone is visible, others cannot know because of the encoded value of the angle code and the password bit where it is located. Entering the password will not pass the authentication, so as to realize the anti-peeping and anti-cracking of the password. B. Due to the concealment of the operation of the mobile phone volume key, the amount of implicit transformation of the directly input code can be customized by the user, so the implicit transformation realizes that the same password has different flexible input methods, even if others see the input password When the button number is also entered, it cannot pass the authentication, which further enhances the anti-peeping and anti-cracking of the password.

本实施例的手机密码保护系统,通过采集在手机上输入密码时的按键编码信息,同时采集与识别按键压力、按键时间、将手机至于某种角度时的水平仪的角度信息等行为信息,在输入的数字编码信息中增加压力、角度、时间三种隐性密码,并通过音量键等具有操作隐蔽性的按键进行隐式变换实现对同一密码的不同方法的灵活输入,实现了手机密码系统本身的防偷窥和防破解安全性,可解除人们对自己密码泄露的担心;较现有数字密码本身的不能防偷窥、防破解,将密码的防偷窥、防破解安全性提升到了100%;解除指纹、DNA等生物信息密码已被复制,而且一旦被盗将无法更改的问题;经测试,具有与现有密码系统相当的用户辨识性和用户友好性。The mobile phone password protection system of this embodiment collects and identifies behavior information such as key pressure, key time, and angle information of the level meter when the mobile phone is placed at a certain angle by collecting key code information when entering a password on the mobile phone. Three hidden passwords of pressure, angle and time are added to the digital coded information of the mobile phone, and the implicit conversion is carried out through the buttons with hidden operation such as volume keys to realize the flexible input of different methods of the same password, and realize the uniqueness of the mobile phone password system itself. Anti-peeping and anti-cracking security, which can relieve people's worries about their own password leakage; compared with the existing digital password itself, which cannot prevent peeping and anti-cracking, the security of anti-peeping and anti-cracking of passwords has been improved to 100%; DNA and other biological information passwords have been copied, and once stolen, they cannot be changed; after testing, they have user identification and user-friendliness comparable to existing password systems.

实施例2Example 2

本实施例针对采用3D-touch屏幕的手机。在实施例1的基础上,所述密码输入触感反馈模块,还向用户手指反馈按键压力的大小;所述按键行为信息采集模块采集的信息还包括输入密码时每个按键的压力大小;所述隐码模块还利用所述按键的压力大小自动形成压力码的隐性密码,所述压力码在所述最终密码中的位置及其编码值也在所述隐码定义模块中预定义,也可由用户重新自定义;所述密码验证模块还验证压力码:在该最终密码中的全部数码及其顺序均正确,而且其中的时间码、角度码、压力码都是来自隐性密码模块时,判断最终密码为正确;否则,判断最终密码为错误。This embodiment is aimed at a mobile phone with a 3D-touch screen. On the basis of embodiment 1, the password input tactile feedback module also feeds back the size of the button pressure to the user's finger; the information collected by the button behavior information collection module also includes the pressure of each button when entering the password; The hidden code module also utilizes the pressure of the key to automatically form the hidden password of the pressure code, and the position of the pressure code in the final password and its encoded value are also predefined in the hidden code definition module, and can also be determined by The user re-customizes; the password verification module also verifies the pressure code: all numbers and their order in the final password are correct, and when the time code, angle code, and pressure code are all from the hidden password module, judge The final password is correct; otherwise, it is judged that the final password is wrong.

实施例3Example 3

本实施例针对未采用3D-touch屏幕的手机而又希望有压力码的应用需求。在实施例2的基础上,所述按键的压力大小,根据手指与手机屏幕接触面积越大则压力越大的原理,通过识别手指与手机屏的接触面积来判断,并自动形成压力码的隐性密码。This embodiment is aimed at the application requirements of a mobile phone without a 3D-touch screen but wishing to have a pressure code. On the basis of Embodiment 2, the pressure of the button is judged by identifying the contact area between the finger and the screen of the mobile phone based on the principle that the larger the contact area between the finger and the screen of the mobile phone is, the hidden pressure code is automatically formed. sex code.

以上对本发明的具体实施例进行了描述。需要理解的是,本发明并不局限于上述特定实施方式,本领域技术人员可以在权利要求的范围内做出各种变化或修改,这并不影响本发明的实质内容。在不冲突的情况下,本申请的实施例和实施例中的特征可以任意相互组合。Specific embodiments of the present invention have been described above. It should be understood that the present invention is not limited to the specific embodiments described above, and those skilled in the art may make various changes or modifications within the scope of the claims, which do not affect the essence of the present invention. In the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other arbitrarily.

Claims (6)

1. The utility model provides a cell-phone password protection system based on latent code discernment and implicit transform which characterized in that, includes password input module, button action information acquisition module, latent code definition module, latent code discernment module, implicit transform definition module, implicit transform module, password composite module, password verification module, wherein: the key behavior information acquisition module acquires key codes and key behavior information when a password is input from the password input module, the information acquired by the key behavior information acquisition module comprises volume plus and volume minus key information for implicit transformation, the hidden code identification module automatically forms a hidden password according to the key behavior information and the code value of the hidden code defined in the hidden code definition module, the hidden transformation module performs the implicit transformation on the key code value in the password input process by using the volume plus and volume minus key information, so that a user inputs the key codes from a keyboard and the actual passwords differently or identically, thereby realizing that the same password has different flexible input methods, the amount of the implicit transformation is defined in the hidden transformation definition module and can be defined by the user, and the password combination module automatically presses the hidden passwords and the passwords after the implicit transformation according to the hidden code definition module, Self-defined strategies in the implicit transformation definition module are combined into a final password, and the password verification module automatically authenticates the legality of the final password;
the mobile phone further comprises a password input touch feedback module which feeds back the magnitude of the key pressure and/or the duration and/or the magnitude of the inclination angle of the mobile phone to the fingers of a user by controlling the vibration of the mobile phone so as to improve the user friendliness;
the size of the key pressure is judged by identifying the contact area of the finger and the mobile phone screen, and a recessive password of the pressure code is automatically formed.
2. The mobile phone password protection system based on the hidden code identification and the hidden transformation as claimed in claim 1, wherein the information collected by the key behavior information collection module includes the code of each key when inputting the password, the time length of the key, and the angle information of the mobile phone level.
3. The mobile phone password protection system based on the hidden code identification and the hidden transformation as claimed in claim 1, wherein the key behavior information collection module is capable of collecting the magnitude of the key pressure when inputting the password for the mobile phone adopting the 3D-Touch screen.
4. The mobile phone password protection system based on hidden code identification and hidden transformation of claim 1, wherein the hidden code identification module automatically forms hidden passwords by using the magnitude of the key pressure and/or the duration of the key and/or the magnitude of the inclination angle of the mobile phone during or just after inputting a number, respectively, and comprises: a pressure code and/or a time code and/or an angle code.
5. The mobile phone password protection system based on the hidden code identification and the hidden transformation in claim 4, wherein the position and/or the coding value of the hidden password in the final password are defined in the hidden code definition module and can be customized by a user.
6. The mobile phone password protection system based on hidden code identification and hidden transformation as claimed in claim 1, wherein the password verification module is configured to verify the validity of the final password by: when all the codes and the sequence thereof in the final password are correct and the recessive password is from the recessive code identification module, the final password is judged to be correct; otherwise, the final password is judged to be wrong.
CN201610819200.9A 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation Expired - Fee Related CN106534479B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610819200.9A CN106534479B (en) 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610819200.9A CN106534479B (en) 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation

Publications (2)

Publication Number Publication Date
CN106534479A CN106534479A (en) 2017-03-22
CN106534479B true CN106534479B (en) 2019-12-20

Family

ID=58343907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610819200.9A Expired - Fee Related CN106534479B (en) 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation

Country Status (1)

Country Link
CN (1) CN106534479B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659461A (en) * 2018-06-28 2020-01-07 Oppo(重庆)智能科技有限公司 Screen unlocking method and device, terminal and storage medium
CN109801050B (en) * 2019-01-22 2023-12-26 瑞银信支付技术有限公司 Mobile payment SDK and payment method for online mall
CN111444554A (en) * 2020-02-28 2020-07-24 张家口浩扬科技有限公司 Anti-peeping cipher device and cipher anti-peeping method thereof
CN116030558A (en) * 2023-03-27 2023-04-28 长沙鑫特科技有限公司 Four kinds of business libraries of bank based on face identification and dynamic trick lock

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598750A (en) * 2004-07-27 2005-03-23 天津大学 Gradient induction encrypted method
CN105279405A (en) * 2015-10-28 2016-01-27 同济大学 Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof
CN105354458A (en) * 2015-11-03 2016-02-24 广东欧珀移动通信有限公司 Password input verification method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8910299B2 (en) * 2008-02-08 2014-12-09 Steven Charles Michalske Emergency information access on portable electronic devices
CN104217142B (en) * 2013-05-30 2017-12-05 华为终端有限公司 The method and device of terminal is protected by startup password

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598750A (en) * 2004-07-27 2005-03-23 天津大学 Gradient induction encrypted method
CN105279405A (en) * 2015-10-28 2016-01-27 同济大学 Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof
CN105354458A (en) * 2015-11-03 2016-02-24 广东欧珀移动通信有限公司 Password input verification method and system

Also Published As

Publication number Publication date
CN106534479A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
JP6444500B2 (en) User authentication method and system using variable keypad and biometric authentication
RU2720563C2 (en) Authentication method and system
WO2012042775A1 (en) Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method
CN106534479B (en) Mobile phone password protection system based on hidden code identification and hidden transformation
CN101626417A (en) Method for mobile terminal authentication
WO2016061899A1 (en) Fingerprint decryption method and device
CN107113175A (en) Multi-user's strong authentication token
WO2012097362A2 (en) Protecting codes, keys and user credentials with identity and patterns
CN110807624A (en) Digital currency hardware cold wallet system and transaction method thereof
CN105227439B (en) A kind of sharing method and user terminal of associated person information
CN106407756A (en) Unlocking method and device
KR101052294B1 (en) Content Security Devices and Content Security Methods
JP6399605B2 (en) Authentication apparatus, authentication method, and program
CN106921655A (en) A kind of business authorization method and device
CN103297237A (en) Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server
KR101392113B1 (en) Fingerprint locking system
CN106355078A (en) Intelligent Password Protection System Based on Multi-function Key Behavior Recognition
JP2016184374A (en) Authentication device
US20190028470A1 (en) Method For Verifying The Identity Of A Person
CN105447353B (en) Password Input verification method and system
CN104636653A (en) System method for realizing user identity authentication based on non-contact mode by intelligent terminal equipment
KR101277198B1 (en) Secret key of password generating system and method using 2 dimensional barcode
JP2004310202A (en) Individual identification system and method
WO2007108397A1 (en) Communication system, server, client terminal device and communicating method
JP4382615B2 (en) Electronic signature device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191220

CF01 Termination of patent right due to non-payment of annual fee