CN106570362A - Password input method and device - Google Patents

Password input method and device Download PDF

Info

Publication number
CN106570362A
CN106570362A CN201610939811.7A CN201610939811A CN106570362A CN 106570362 A CN106570362 A CN 106570362A CN 201610939811 A CN201610939811 A CN 201610939811A CN 106570362 A CN106570362 A CN 106570362A
Authority
CN
China
Prior art keywords
time interval
value
interval value
password
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610939811.7A
Other languages
Chinese (zh)
Other versions
CN106570362B (en
Inventor
刘德建
江龙强
陈艺伟
邓君
陈鹏
钟良德
郭玉湖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianquan Educational Technology Ltd
Original Assignee
Fujian Tianquan Educational Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianquan Educational Technology Ltd filed Critical Fujian Tianquan Educational Technology Ltd
Priority to CN201610939811.7A priority Critical patent/CN106570362B/en
Publication of CN106570362A publication Critical patent/CN106570362A/en
Application granted granted Critical
Publication of CN106570362B publication Critical patent/CN106570362B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Abstract

The invention provides a password input method and device. The password input method comprises the following steps: acquiring two or more characters and obtaining a first password; recording and storing a time point of acquiring the characters; calculating time intervals between adjacent characters of the first password according to the time point, and obtaining a time interval set; and according to the first password and the time interval set, obtaining a second password. The method improves the password strength, so that passwords are not easy to crack, and thus the password input method is secured and reliable.

Description

A kind of cipher-code input method and device
Technical field
The present invention relates to field of computer technology, more particularly to a kind of cipher-code input method and device.
Background technology
Password is all, with numeral, letter and special symbol composition, to be considered based on convenience in prior art, typically will not be set Long password is put, the length of password is shorter, and safety is lower;And user input password during easily by people Peep and remember password, also reduce further the safety of password.
The Chinese invention patent of Application No. 201510767006.6 disclose enhancement mode trading password input method and Device, comprises the following steps:According to, by the difference of screen dynamics, producing corresponding pressure signal during user input trading password;Will The pressure signal is converted to character;By the character adding on the trading password of input;Repeat the above steps, to be input into increasing Strong type trading password.Pressure signal is converted into into character in the invention, then by the character adding on the trading password of input, The intensity of trading password is enhanced on certain procedures.But weak point using pressure transducer it is clear that increased use The use cost at family, while pressure transducer only produces three kinds of pressure signals, password is also relatively easy on certain procedures It is cracked.
The content of the invention
The technical problem to be solved is:A kind of safe and reliable Password Input side for being not easy to be cracked by people is provided Method and device.
In order to solve above-mentioned technical problem, the present invention provides a kind of cipher-code input method and device, can be in user input During trading password, the time point for being input into each character is obtained, the time interval value of adjacent character is calculated by the time point, by The time interval value is combined with password, so as to increased the intensity of password;And cause input close by this kind of mode The process of code is difficult to be peeped by people, and then enhances the safety of transaction.
In order to solve above-mentioned technical problem, the technical solution used in the present invention is:
The present invention provides a kind of cipher-code input method, comprises the following steps:
S1:More than 2 characters are obtained, first password is obtained;Record and preserve the time point for obtaining the character;
S2:The time interval value of the first password adjacent character is calculated according to the time point, time interval value is obtained Set;
S3:According to the first password and the time interval value set, the second password is obtained.
The present invention also provides a kind of cipher input, including Password Input module, and secret generation module and password merge Module.
The beneficial effects of the present invention is:More than 2 characters are obtained, first password is obtained, acquisition is recorded and preserve described The time point of character, by the time point time interval value of the first password adjacent character is calculated, and obtains time interval Value set, by the first password and the time interval value set, obtains the second password, so as to reach the mesh for strengthening password , and be difficult to be peeped in the process for being input into password so that the safety of password is further enhanced.
Description of the drawings
Fig. 1 is the schematic diagram of the key step of the cipher-code input method according to the embodiment of the present invention;
Fig. 2 is the schematic diagram of the main modular of the cipher input according to the embodiment of the present invention.
Label declaration:
1- cipher inputs;11- Password Input modules;12- secret generation modules;13- password merging modules.
Specific embodiment
To describe the technology contents of the present invention in detail, being realized purpose and effect, below in conjunction with embodiment and coordinate attached Figure is explained in detail.
The design of most critical of the present invention is:By the time point for obtaining character, by the time point described first is calculated The time interval value of password adjacent character, obtains time interval value set, arranges the character and the time interval value set Time interval value, obtain the second password, so as to reach strengthen password purpose.
Fig. 1 is refer to, a kind of cipher-code input method is comprised the following steps:
S1:More than 2 characters are obtained, first password is obtained;Record and preserve the time point for obtaining the character;
S2:The time interval value of the first password adjacent character is calculated according to the time point, time interval value is obtained Set;
S3:According to the first password and the time interval value set, the second password is obtained.
Knowable to foregoing description, the beneficial effects of the present invention is:More than 2 characters are obtained, first password is obtained, is recorded And the time point for obtaining the character is preserved, the time interval of the first password adjacent character is calculated by the time point Value, obtains time interval value set, by the first password and the time interval value set, the second password is obtained, so as to reach To the purpose for strengthening password, and the process in input password is difficult to be peeped so that the safety of password is further carried It is high.
Further, obtain " time interval value set " to be specially:
S21:Default first value and second value;First value and the second value are different natural numbers;
S22:Time interval value described in obtaining one successively, obtains very first time spacing value;
S23:If the very first time spacing value arranges second less than the arithmetic mean of instantaneous value of all time interval values Time interval value is the described first value;
S24:If arithmetic mean of instantaneous value of the very first time spacing value not less than all time interval values, arranges the Two time interval values are the second value;
Repeat S22, S23, S24, according to second time interval value corresponding with the very first time spacing value, obtain Time interval value set.
Seen from the above description, the beneficial effects of the present invention is:The very first time spacing value and all times The arithmetic mean of instantaneous value of spacing value is compared, and it is the described first value or the second value to arrange the second time interval value, and user is defeated When entering password, will not cause to be input into password bad because of key scroll difference.
Further, obtain " time interval value set " to be specially:
S25:Two time interval values are obtained successively, obtain the 3rd time interval value and the 4th time interval value;
S26:If the 3rd time interval value less than all time interval values arithmetic mean of instantaneous value, the described 3rd Time interval value and the 4th time interval value carry out with or operation, obtain the 5th time interval value;
S27:If the 3rd time interval value is not less than the arithmetic mean of instantaneous value of all time interval values, described the Three time interval values and the 4th time interval value carry out xor operation, obtain the 5th time interval value;
Repeat S25, S26, S27, according to the 5th time interval value, obtain time interval value set.
Seen from the above description, the beneficial effects of the present invention is:Entered by the 3rd time interval and the 4th time interval Row with or, xor operation, further increase the complexity of password so that the safety of password is further enhanced.
Further, obtain " time interval value set " to be specially:
The time interval value is converted into into default system number, time interval value set is obtained.
Seen from the above description, the beneficial effects of the present invention is:The time interval value is converted into into default system number, The safety of password is further increased, just password is difficult to be cracked.
Further, obtain " time interval value set " to be specially:
S28:Default mapping table, the mapping table includes the corresponding relation of pressure value and the first character set;
S29:Obtain the pressure value that the input character is produced;
S210:The pressure value is changed into the first character according to the mapping table;
Repeat S29, S210, according to the time interval value and first character, obtain time interval value set.
Seen from the above description, the beneficial effects of the present invention is:Pressure value is converted to into corresponding first character, By the time interval value and first character, time interval value set is obtained, further enhancing the safety of password, just Password is difficult to be cracked.
Further, obtain " time interval value set " to be specially:
The difference of the adjacent time interval value is calculated, the first difference is obtained;
According to first difference, time interval value set is obtained.
Seen from the above description, the beneficial effects of the present invention is:The difference for calculating the adjacent time interval value can be crossed, According to first difference, time interval value set is obtained, it is ensured that during user input password, will not lead because of key scroll difference Cause input password bad.
Further, the cipher-code input method, also includes:
By the second password described in md5 encryption algorithm for encryption, the 3rd password is obtained.
Seen from the above description, the beneficial effects of the present invention is:Using the second password described in md5 encryption algorithm for encryption, The 3rd password is obtained, the complexity of password is enhanced, the safety of password is further improved.
Fig. 2, a kind of cipher input, including Password Input module are refer to, secret generation module, password merges mould Block.
Knowable to foregoing description, the beneficial effects of the present invention is:More than 2 characters are obtained, first password is obtained, is recorded And the time point for obtaining the character is preserved, the time interval of the first password adjacent character is calculated by the time point Value, obtains time interval value set, by the first password and the time interval value set, the second password is obtained, so as to reach To the purpose for strengthening password, and the process in input password is difficult to be peeped so that the safety of password is further carried It is high;By the arithmetic mean of instantaneous value for calculating all time interval values, the time interval value is compared with the arithmetic mean of instantaneous value After give different value, it is ensured that again be input into password when, will not because key scroll difference cause be input into password bad; By by the 3rd time interval and the 4th time interval carry out with or, xor operation, further increase the complexity of password, So that the safety of password is further enhanced;By the way that the time interval value is converted to into default hex value, enhance close The safety of code.
Fig. 1 is refer to, embodiments of the invention one are:
A kind of cipher-code input method, comprises the following steps:
S1:More than 2 characters are obtained, first password is obtained;Record and preserve the time point for obtaining the character;
S2:The time interval value of the first password adjacent character is calculated according to the time point, time interval value is obtained Set;
S3:According to the first password and the time interval value set, the second password is obtained;
Embodiments of the invention two are:
A kind of cipher-code input method, comprises the following steps:
S1:More than 2 characters are obtained, first password is obtained;Record and preserve the time point for obtaining the character;
S2:The time interval value of the first password adjacent character is calculated according to the time point;
S21:Time interval value described in obtaining one successively, obtains very first time spacing value;
S22:If the very first time spacing value arranges second less than the arithmetic mean of instantaneous value of all time interval values Time interval value is 0;
S23:If arithmetic mean of instantaneous value of the very first time spacing value not less than all time interval values, arranges the Two time interval values are 1;
S24:Repeat S21, S22, S23, obtain second time interval value corresponding with the very first time spacing value;
S25:Continuous four second time interval values are taken, a tetrad is constituted, described four two are entered Number processed is converted to hexadecimal number;
S26:Repetition takes continuous four second time interval values, a tetrad is constituted, by described four Binary number is converted to hexadecimal number, by the hexadecimal number, obtains time interval value set;
S3:According to the first password and the time interval value set, the second password is obtained;
S4:By the second password described in md5 encryption algorithm for encryption, the 3rd password is obtained.
Embodiments of the invention three are:
A kind of cipher-code input method, comprises the following steps:
User input password abc123, the time interval value for being input into adjacent character in password is respectively 2s, 3s, 3s, 1s, 3s;
The time interval value is compared with all time interval value meansigma methodss 2.4s, if the time interval Value then arranges the time interval value for 0 less than the arithmetic mean of instantaneous value of all time interval values;If the time interval value Not less than the arithmetic mean of instantaneous value of all time interval values, then the time interval value is set for 1;Thus can obtain 0,1,1,0, 1, it is combined into five bits 01101;
The method that five bit 01101 is converted to into hexadecimal number is as follows:From left to right successively will be each The tetrad of bit and three two arrays Cheng Xin processed below, cannot constitute tetrad due to last three Number, therefore mend 000 in its mantissa, obtains eight-digit binary number 01101000, and 01101000 each and three below are constituted into five Tetrad 0110,1101,1010,0100,1000, is converted into hexadecimal, obtains 6, D, A, 4,8, arrangement a, b, C, 1,2,3,6, D, A, 4,8, rank results have 39916800 kinds, take one of which, and thus such as a6bDcA14283 is increased The password of strong type;
Five bit 01101 can also be converted to octal number, its method is as follows:Successively will from left to right The triad number of each bit and two two arrays Cheng Xin processed below, cannot constitute three two due to last two System number, therefore mend 00 in its mantissa, obtains seven bits 0110100, by 0110100 each and two below compositions five Individual triad 011,110,101,010,100, is converted into hexadecimal, obtains 3,6,5,2,4, arrangement a, b, c, 1, 2nd, 3,3,6,5,2,4, rank results have 39916800 kinds, take one of which, and thus such as a3b6c512243 obtains enhancement mode Password.
Fig. 2 is refer to, embodiments of the invention four are:
A kind of cipher input 1, including:
Password Input module 11, record user input password and user input password every character when time point, And send it to secret generation module;
Secret generation module 12, according to the time point of every character obtained by Password Input module, calculates adjacent character Time interval value, obtain time interval value set;
Secret generation module includes:
First module includes the first default unit, first acquisition unit, second acquisition unit, the 3rd acquiring unit and first Repetitives, for calculating the time interval value set;
Second unit includes the 4th acquiring unit, the 5th acquiring unit, the 6th acquiring unit and the second repetitives, is used for Calculate the time interval value set;
Unit the 3rd includes the 7th acquiring unit, for calculating the time interval value set;
Unit the 4th includes the second default unit, the 8th acquiring unit, the 9th acquiring unit and the third repeating unit, is used for Calculate the time interval value set;
Unit the 5th includes the tenth acquiring unit and the 11st acquiring unit, for calculating the time interval value set;
Password merging module 13, the password recorded in Password Input module is arranged with time interval value set, Obtain enhancement mode password;
Cryptographic module, the enhancement mode password that password merging module is obtained is encrypted, and further enhancing password Intensity.
In sum, the present invention is provided cipher-code input method and device, by obtaining more than 2 characters, obtain first Password, records and preserves the time point for obtaining the character, and by the time point first password adjacent character is calculated Time interval value, obtains time interval value set, by the first password and the time interval value set, obtains second close Code, so as to reach the purpose for strengthening password, and the process in input password is difficult to be peeped so that the safety of password enters one Step is improved;By the arithmetic mean of instantaneous value for calculating all time interval values, by the time interval value and the arithmetic average Value gives different value after being compared, it is ensured that when being input into password again, because of key scroll difference input will not be caused close Code is incorrect;By by the 3rd time interval and the 4th time interval carry out with or, xor operation, further increase password Complexity so that the safety of password is further enhanced;By the way that the time interval value is converted to into default hex value, Enhance the safety of password.
Embodiments of the invention are the foregoing is only, the scope of the claims of the present invention is not thereby limited, it is every using this The equivalents that bright description and accompanying drawing content are made, or other related technical fields are directly or indirectly used in, in the same manner It is included within the scope of the present invention.

Claims (10)

1. a kind of cipher-code input method, it is characterised in that comprise the following steps:
S1:More than 2 characters are obtained, first password is obtained;Record and preserve the time point for obtaining the character;
S2:The time interval value of the first password adjacent character is calculated according to the time point, time interval value set is obtained;
S3:According to the first password and the time interval value set, the second password is obtained.
2. cipher-code input method according to claim 1, it is characterised in that obtain " time interval value set " and be specially:
S21:Default first value and second value;First value and the second value are different natural numbers;
S22:Time interval value described in obtaining one successively, obtains very first time spacing value;
S23:If the very first time spacing value arranged for the second time less than the arithmetic mean of instantaneous value of all time interval values Spacing value is the described first value;
S24:If the very first time spacing value is not less than the arithmetic mean of instantaneous value of all time interval values, when arranging second Between spacing value be the second value;
Repeat S22, S23, S24, according to second time interval value corresponding with the very first time spacing value, obtain the time Interval value set.
3. cipher-code input method according to claim 1, it is characterised in that obtain " time interval value set " and be specially:
S25:Two time interval values are obtained successively, obtain the 3rd time interval value and the 4th time interval value;
S26:If the 3rd time interval value is less than the arithmetic mean of instantaneous value of all time interval values, the 3rd time Spacing value and the 4th time interval value carry out with or operation, obtain the 5th time interval value;
S27:If the 3rd time interval value is not less than the arithmetic mean of instantaneous value of all time interval values, when the described 3rd Between spacing value and the 4th time interval value carry out xor operation, obtain the 5th time interval value;
Repeat S25, S26, S27, according to the 5th time interval value, obtain time interval value set.
4. cipher-code input method according to claim 1, it is characterised in that obtain " time interval value set " and be specially:
The time interval value is converted into into default system number, time interval value set is obtained.
5. cipher-code input method according to claim 1, it is characterised in that obtain " time interval value set " and be specially:
S28:Default mapping table, the mapping table includes the corresponding relation of pressure value and the first character set;
S29:Obtain the pressure value that the input character is produced;
S210:The pressure value is changed into the first character according to the mapping table;
Repeat S29, S210, according to the time interval value and first character, obtain time interval value set.
6. cipher-code input method according to claim 1, it is characterised in that obtain " time interval value set " and be specially:
The difference of the adjacent time interval value is calculated, the first difference is obtained;
According to first difference, time interval value set is obtained.
7. cipher-code input method according to claim 1, it is characterised in that also include:
By the second password described in md5 encryption algorithm for encryption, the 3rd password is obtained.
8. a kind of cipher input, it is characterised in that include:
Password Input module, for obtaining more than 2 characters, obtains first password;Record and preserve obtain the character when Between point;
Secret generation module, for calculating the time interval value of the first password adjacent character according to the time point, obtains Time interval value set;
Password merging module, for according to the first password and the time interval value set, obtaining the second password.
9. cipher input according to claim 8, it is characterised in that the secret generation module, also includes:
First module, for calculating the time interval value set, specially:
First default unit, for presetting the first value and second value;First value and the second value are different natural numbers;
First acquisition unit, for obtaining time interval value described in successively, obtains very first time spacing value;
Second acquisition unit, if the arithmetic mean of instantaneous value for being less than all time interval values for the very first time spacing value, Second time interval value is then set for first value;
3rd acquiring unit, if the arithmetic average for being not less than all time interval values for the very first time spacing value Value, then arrange the second time interval value for the second value;
First repetitives, for repeating first acquisition unit, second acquisition unit, the 3rd acquiring unit, according to institute Corresponding second time interval value of very first time spacing value is stated, time interval value set is obtained;
Second unit, for calculating the time interval value set, specially:
4th acquiring unit, for obtaining two time interval values successively, obtains the 3rd time interval value and the 4th time Spacing value;
5th acquiring unit, if the arithmetic mean of instantaneous value for being less than all time interval values for the 3rd time interval value, Then the 3rd time interval value and the 4th time interval value carry out with or operation, obtain the 5th time interval value;
6th acquiring unit, if the arithmetic average for being not less than all time interval values for the 3rd time interval value Value, then the 3rd time interval value and the 4th time interval value carry out xor operation, obtain the 5th time interval value;
Second repetitives, for repeating the 4th acquiring unit, the 5th acquiring unit, the 6th acquiring unit, according to institute Corresponding 5th time interval value of the 3rd time interval value is stated, time interval value set is obtained;
Unit the 3rd, for calculating the time interval value set, specially:
7th acquiring unit, for the time interval value to be converted into into default system number, obtains time interval value set;
Unit the 4th, for calculating the time interval value set, specially:
Second default unit, for presetting mapping table, the mapping table includes the corresponding relation of pressure value and the first character set;
8th acquiring unit, for obtaining the pressure value that the input character is produced;
9th acquiring unit, for changing the pressure value into the first character according to the mapping table;
The third repeating unit, for repeating the 8th acquiring unit, the 9th acquiring unit, according to the time interval value and institute The first character is stated, time interval value set is obtained;
Unit the 5th:For calculating the time interval value set, specially:
Tenth acquiring unit, for calculating the difference of the adjacent time interval value, obtains the first difference;
11st acquiring unit, for according to first difference, obtaining time interval value set.
10. cipher input according to claim 8, it is characterised in that also include:
Cryptographic module, for by the second password described in md5 encryption algorithm for encryption, obtaining the 3rd password.
CN201610939811.7A 2016-10-25 2016-10-25 Password input method and device Active CN106570362B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610939811.7A CN106570362B (en) 2016-10-25 2016-10-25 Password input method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610939811.7A CN106570362B (en) 2016-10-25 2016-10-25 Password input method and device

Publications (2)

Publication Number Publication Date
CN106570362A true CN106570362A (en) 2017-04-19
CN106570362B CN106570362B (en) 2020-04-21

Family

ID=58534780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610939811.7A Active CN106570362B (en) 2016-10-25 2016-10-25 Password input method and device

Country Status (1)

Country Link
CN (1) CN106570362B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112329003A (en) * 2020-11-06 2021-02-05 上海湖顶大数据科技有限公司 Method and system for generating safe and easy-to-remember password

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090069964A (en) * 2007-12-26 2009-07-01 주식회사 비원플러스 Method and system for analyzing keystroke pattern of authentication information inputted from user
CN103455752A (en) * 2013-09-10 2013-12-18 百度在线网络技术(北京)有限公司 Password setting method, password verification method, device and system using methods
CN104283679A (en) * 2013-07-05 2015-01-14 中国电信股份有限公司 Method and system for conducting safety certification by input rhythms
CN104318136A (en) * 2014-09-29 2015-01-28 同济大学 Modeling and analysis system for user keyboard key pressing activity mode and identity identification method thereof
CN105446622A (en) * 2015-11-11 2016-03-30 北京京东尚科信息技术有限公司 Enhancement transaction password input method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090069964A (en) * 2007-12-26 2009-07-01 주식회사 비원플러스 Method and system for analyzing keystroke pattern of authentication information inputted from user
CN104283679A (en) * 2013-07-05 2015-01-14 中国电信股份有限公司 Method and system for conducting safety certification by input rhythms
CN103455752A (en) * 2013-09-10 2013-12-18 百度在线网络技术(北京)有限公司 Password setting method, password verification method, device and system using methods
CN104318136A (en) * 2014-09-29 2015-01-28 同济大学 Modeling and analysis system for user keyboard key pressing activity mode and identity identification method thereof
CN105446622A (en) * 2015-11-11 2016-03-30 北京京东尚科信息技术有限公司 Enhancement transaction password input method and apparatus

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112329003A (en) * 2020-11-06 2021-02-05 上海湖顶大数据科技有限公司 Method and system for generating safe and easy-to-remember password
CN112329003B (en) * 2020-11-06 2023-12-29 上海湖顶大数据科技有限公司 Method and system for generating password with good security

Also Published As

Publication number Publication date
CN106570362B (en) 2020-04-21

Similar Documents

Publication Publication Date Title
CN106161006B (en) Digital encryption algorithm
CN103227717B (en) The input of round key XOR is selected to carry out the method that SM4 cryptographic algorithm side channel energy is analyzed
CN104468090B (en) Character cipher coding method based on image pixel coordinates
CN102640450B (en) Security token is distributed to method, the method for handling safety token, the security token of key
CN101013943B (en) Method for binding/recovering key using fingerprint details
CN103778590B (en) Using digital picture storage and the method and apparatus of transmission information
CN104408356B (en) A kind of fingerprint verification method and system, fingerprint template encryption device
CN101201886A (en) Three-he-code for recognizing commodity
CN102710657B (en) A kind of one-time password generates method and system
CN103996011A (en) Method and device for protecting codes to be input safely
CN103607274B (en) A kind of method generating dynamic password with static password for source
CN106789063B (en) A kind of double factor authentication method based on convolution sum circulation dual coding
CN102957688A (en) Password input and verification method and device
CN103164187B (en) RSA modular exponentiation circuit and RSA security encryption chip
CN1427575A (en) Electronic cipher formation and checking method
CN106570362A (en) Password input method and device
CN102752285B (en) Pre-authentification computer system login method based on high collision probability hash function
CN107483182A (en) A kind of anti-power consumption attack method towards aes algorithm based on Out-of-order execution
CN102857340A (en) Encryption method using symmetric cryptosystem
CN103888245A (en) S box randomized method and system for smart card
CN108650072A (en) It is a kind of to support a variety of symmetric cryptographic algorithm chips and its anti-attack circuit implementation method
CN103595523B (en) A file encryption method
Tabrez et al. Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system
CN106850206A (en) Dynamic password protection system and method based on PLC
TWI492089B (en) Fingerprint and Chaos ECG signal based on the personal data encryption / decryption system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant