CN106570362A - Password input method and device - Google Patents
Password input method and device Download PDFInfo
- Publication number
- CN106570362A CN106570362A CN201610939811.7A CN201610939811A CN106570362A CN 106570362 A CN106570362 A CN 106570362A CN 201610939811 A CN201610939811 A CN 201610939811A CN 106570362 A CN106570362 A CN 106570362A
- Authority
- CN
- China
- Prior art keywords
- time interval
- value
- interval value
- password
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Abstract
The invention provides a password input method and device. The password input method comprises the following steps: acquiring two or more characters and obtaining a first password; recording and storing a time point of acquiring the characters; calculating time intervals between adjacent characters of the first password according to the time point, and obtaining a time interval set; and according to the first password and the time interval set, obtaining a second password. The method improves the password strength, so that passwords are not easy to crack, and thus the password input method is secured and reliable.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of cipher-code input method and device.
Background technology
Password is all, with numeral, letter and special symbol composition, to be considered based on convenience in prior art, typically will not be set
Long password is put, the length of password is shorter, and safety is lower;And user input password during easily by people
Peep and remember password, also reduce further the safety of password.
The Chinese invention patent of Application No. 201510767006.6 disclose enhancement mode trading password input method and
Device, comprises the following steps:According to, by the difference of screen dynamics, producing corresponding pressure signal during user input trading password;Will
The pressure signal is converted to character;By the character adding on the trading password of input;Repeat the above steps, to be input into increasing
Strong type trading password.Pressure signal is converted into into character in the invention, then by the character adding on the trading password of input,
The intensity of trading password is enhanced on certain procedures.But weak point using pressure transducer it is clear that increased use
The use cost at family, while pressure transducer only produces three kinds of pressure signals, password is also relatively easy on certain procedures
It is cracked.
The content of the invention
The technical problem to be solved is:A kind of safe and reliable Password Input side for being not easy to be cracked by people is provided
Method and device.
In order to solve above-mentioned technical problem, the present invention provides a kind of cipher-code input method and device, can be in user input
During trading password, the time point for being input into each character is obtained, the time interval value of adjacent character is calculated by the time point, by
The time interval value is combined with password, so as to increased the intensity of password;And cause input close by this kind of mode
The process of code is difficult to be peeped by people, and then enhances the safety of transaction.
In order to solve above-mentioned technical problem, the technical solution used in the present invention is:
The present invention provides a kind of cipher-code input method, comprises the following steps:
S1:More than 2 characters are obtained, first password is obtained;Record and preserve the time point for obtaining the character;
S2:The time interval value of the first password adjacent character is calculated according to the time point, time interval value is obtained
Set;
S3:According to the first password and the time interval value set, the second password is obtained.
The present invention also provides a kind of cipher input, including Password Input module, and secret generation module and password merge
Module.
The beneficial effects of the present invention is:More than 2 characters are obtained, first password is obtained, acquisition is recorded and preserve described
The time point of character, by the time point time interval value of the first password adjacent character is calculated, and obtains time interval
Value set, by the first password and the time interval value set, obtains the second password, so as to reach the mesh for strengthening password
, and be difficult to be peeped in the process for being input into password so that the safety of password is further enhanced.
Description of the drawings
Fig. 1 is the schematic diagram of the key step of the cipher-code input method according to the embodiment of the present invention;
Fig. 2 is the schematic diagram of the main modular of the cipher input according to the embodiment of the present invention.
Label declaration:
1- cipher inputs;11- Password Input modules;12- secret generation modules;13- password merging modules.
Specific embodiment
To describe the technology contents of the present invention in detail, being realized purpose and effect, below in conjunction with embodiment and coordinate attached
Figure is explained in detail.
The design of most critical of the present invention is:By the time point for obtaining character, by the time point described first is calculated
The time interval value of password adjacent character, obtains time interval value set, arranges the character and the time interval value set
Time interval value, obtain the second password, so as to reach strengthen password purpose.
Fig. 1 is refer to, a kind of cipher-code input method is comprised the following steps:
S1:More than 2 characters are obtained, first password is obtained;Record and preserve the time point for obtaining the character;
S2:The time interval value of the first password adjacent character is calculated according to the time point, time interval value is obtained
Set;
S3:According to the first password and the time interval value set, the second password is obtained.
Knowable to foregoing description, the beneficial effects of the present invention is:More than 2 characters are obtained, first password is obtained, is recorded
And the time point for obtaining the character is preserved, the time interval of the first password adjacent character is calculated by the time point
Value, obtains time interval value set, by the first password and the time interval value set, the second password is obtained, so as to reach
To the purpose for strengthening password, and the process in input password is difficult to be peeped so that the safety of password is further carried
It is high.
Further, obtain " time interval value set " to be specially:
S21:Default first value and second value;First value and the second value are different natural numbers;
S22:Time interval value described in obtaining one successively, obtains very first time spacing value;
S23:If the very first time spacing value arranges second less than the arithmetic mean of instantaneous value of all time interval values
Time interval value is the described first value;
S24:If arithmetic mean of instantaneous value of the very first time spacing value not less than all time interval values, arranges the
Two time interval values are the second value;
Repeat S22, S23, S24, according to second time interval value corresponding with the very first time spacing value, obtain
Time interval value set.
Seen from the above description, the beneficial effects of the present invention is:The very first time spacing value and all times
The arithmetic mean of instantaneous value of spacing value is compared, and it is the described first value or the second value to arrange the second time interval value, and user is defeated
When entering password, will not cause to be input into password bad because of key scroll difference.
Further, obtain " time interval value set " to be specially:
S25:Two time interval values are obtained successively, obtain the 3rd time interval value and the 4th time interval value;
S26:If the 3rd time interval value less than all time interval values arithmetic mean of instantaneous value, the described 3rd
Time interval value and the 4th time interval value carry out with or operation, obtain the 5th time interval value;
S27:If the 3rd time interval value is not less than the arithmetic mean of instantaneous value of all time interval values, described the
Three time interval values and the 4th time interval value carry out xor operation, obtain the 5th time interval value;
Repeat S25, S26, S27, according to the 5th time interval value, obtain time interval value set.
Seen from the above description, the beneficial effects of the present invention is:Entered by the 3rd time interval and the 4th time interval
Row with or, xor operation, further increase the complexity of password so that the safety of password is further enhanced.
Further, obtain " time interval value set " to be specially:
The time interval value is converted into into default system number, time interval value set is obtained.
Seen from the above description, the beneficial effects of the present invention is:The time interval value is converted into into default system number,
The safety of password is further increased, just password is difficult to be cracked.
Further, obtain " time interval value set " to be specially:
S28:Default mapping table, the mapping table includes the corresponding relation of pressure value and the first character set;
S29:Obtain the pressure value that the input character is produced;
S210:The pressure value is changed into the first character according to the mapping table;
Repeat S29, S210, according to the time interval value and first character, obtain time interval value set.
Seen from the above description, the beneficial effects of the present invention is:Pressure value is converted to into corresponding first character,
By the time interval value and first character, time interval value set is obtained, further enhancing the safety of password, just
Password is difficult to be cracked.
Further, obtain " time interval value set " to be specially:
The difference of the adjacent time interval value is calculated, the first difference is obtained;
According to first difference, time interval value set is obtained.
Seen from the above description, the beneficial effects of the present invention is:The difference for calculating the adjacent time interval value can be crossed,
According to first difference, time interval value set is obtained, it is ensured that during user input password, will not lead because of key scroll difference
Cause input password bad.
Further, the cipher-code input method, also includes:
By the second password described in md5 encryption algorithm for encryption, the 3rd password is obtained.
Seen from the above description, the beneficial effects of the present invention is:Using the second password described in md5 encryption algorithm for encryption,
The 3rd password is obtained, the complexity of password is enhanced, the safety of password is further improved.
Fig. 2, a kind of cipher input, including Password Input module are refer to, secret generation module, password merges mould
Block.
Knowable to foregoing description, the beneficial effects of the present invention is:More than 2 characters are obtained, first password is obtained, is recorded
And the time point for obtaining the character is preserved, the time interval of the first password adjacent character is calculated by the time point
Value, obtains time interval value set, by the first password and the time interval value set, the second password is obtained, so as to reach
To the purpose for strengthening password, and the process in input password is difficult to be peeped so that the safety of password is further carried
It is high;By the arithmetic mean of instantaneous value for calculating all time interval values, the time interval value is compared with the arithmetic mean of instantaneous value
After give different value, it is ensured that again be input into password when, will not because key scroll difference cause be input into password bad;
By by the 3rd time interval and the 4th time interval carry out with or, xor operation, further increase the complexity of password,
So that the safety of password is further enhanced;By the way that the time interval value is converted to into default hex value, enhance close
The safety of code.
Fig. 1 is refer to, embodiments of the invention one are:
A kind of cipher-code input method, comprises the following steps:
S1:More than 2 characters are obtained, first password is obtained;Record and preserve the time point for obtaining the character;
S2:The time interval value of the first password adjacent character is calculated according to the time point, time interval value is obtained
Set;
S3:According to the first password and the time interval value set, the second password is obtained;
Embodiments of the invention two are:
A kind of cipher-code input method, comprises the following steps:
S1:More than 2 characters are obtained, first password is obtained;Record and preserve the time point for obtaining the character;
S2:The time interval value of the first password adjacent character is calculated according to the time point;
S21:Time interval value described in obtaining one successively, obtains very first time spacing value;
S22:If the very first time spacing value arranges second less than the arithmetic mean of instantaneous value of all time interval values
Time interval value is 0;
S23:If arithmetic mean of instantaneous value of the very first time spacing value not less than all time interval values, arranges the
Two time interval values are 1;
S24:Repeat S21, S22, S23, obtain second time interval value corresponding with the very first time spacing value;
S25:Continuous four second time interval values are taken, a tetrad is constituted, described four two are entered
Number processed is converted to hexadecimal number;
S26:Repetition takes continuous four second time interval values, a tetrad is constituted, by described four
Binary number is converted to hexadecimal number, by the hexadecimal number, obtains time interval value set;
S3:According to the first password and the time interval value set, the second password is obtained;
S4:By the second password described in md5 encryption algorithm for encryption, the 3rd password is obtained.
Embodiments of the invention three are:
A kind of cipher-code input method, comprises the following steps:
User input password abc123, the time interval value for being input into adjacent character in password is respectively 2s, 3s, 3s, 1s,
3s;
The time interval value is compared with all time interval value meansigma methodss 2.4s, if the time interval
Value then arranges the time interval value for 0 less than the arithmetic mean of instantaneous value of all time interval values;If the time interval value
Not less than the arithmetic mean of instantaneous value of all time interval values, then the time interval value is set for 1;Thus can obtain 0,1,1,0,
1, it is combined into five bits 01101;
The method that five bit 01101 is converted to into hexadecimal number is as follows:From left to right successively will be each
The tetrad of bit and three two arrays Cheng Xin processed below, cannot constitute tetrad due to last three
Number, therefore mend 000 in its mantissa, obtains eight-digit binary number 01101000, and 01101000 each and three below are constituted into five
Tetrad 0110,1101,1010,0100,1000, is converted into hexadecimal, obtains 6, D, A, 4,8, arrangement a, b,
C, 1,2,3,6, D, A, 4,8, rank results have 39916800 kinds, take one of which, and thus such as a6bDcA14283 is increased
The password of strong type;
Five bit 01101 can also be converted to octal number, its method is as follows:Successively will from left to right
The triad number of each bit and two two arrays Cheng Xin processed below, cannot constitute three two due to last two
System number, therefore mend 00 in its mantissa, obtains seven bits 0110100, by 0110100 each and two below compositions five
Individual triad 011,110,101,010,100, is converted into hexadecimal, obtains 3,6,5,2,4, arrangement a, b, c, 1,
2nd, 3,3,6,5,2,4, rank results have 39916800 kinds, take one of which, and thus such as a3b6c512243 obtains enhancement mode
Password.
Fig. 2 is refer to, embodiments of the invention four are:
A kind of cipher input 1, including:
Password Input module 11, record user input password and user input password every character when time point,
And send it to secret generation module;
Secret generation module 12, according to the time point of every character obtained by Password Input module, calculates adjacent character
Time interval value, obtain time interval value set;
Secret generation module includes:
First module includes the first default unit, first acquisition unit, second acquisition unit, the 3rd acquiring unit and first
Repetitives, for calculating the time interval value set;
Second unit includes the 4th acquiring unit, the 5th acquiring unit, the 6th acquiring unit and the second repetitives, is used for
Calculate the time interval value set;
Unit the 3rd includes the 7th acquiring unit, for calculating the time interval value set;
Unit the 4th includes the second default unit, the 8th acquiring unit, the 9th acquiring unit and the third repeating unit, is used for
Calculate the time interval value set;
Unit the 5th includes the tenth acquiring unit and the 11st acquiring unit, for calculating the time interval value set;
Password merging module 13, the password recorded in Password Input module is arranged with time interval value set,
Obtain enhancement mode password;
Cryptographic module, the enhancement mode password that password merging module is obtained is encrypted, and further enhancing password
Intensity.
In sum, the present invention is provided cipher-code input method and device, by obtaining more than 2 characters, obtain first
Password, records and preserves the time point for obtaining the character, and by the time point first password adjacent character is calculated
Time interval value, obtains time interval value set, by the first password and the time interval value set, obtains second close
Code, so as to reach the purpose for strengthening password, and the process in input password is difficult to be peeped so that the safety of password enters one
Step is improved;By the arithmetic mean of instantaneous value for calculating all time interval values, by the time interval value and the arithmetic average
Value gives different value after being compared, it is ensured that when being input into password again, because of key scroll difference input will not be caused close
Code is incorrect;By by the 3rd time interval and the 4th time interval carry out with or, xor operation, further increase password
Complexity so that the safety of password is further enhanced;By the way that the time interval value is converted to into default hex value,
Enhance the safety of password.
Embodiments of the invention are the foregoing is only, the scope of the claims of the present invention is not thereby limited, it is every using this
The equivalents that bright description and accompanying drawing content are made, or other related technical fields are directly or indirectly used in, in the same manner
It is included within the scope of the present invention.
Claims (10)
1. a kind of cipher-code input method, it is characterised in that comprise the following steps:
S1:More than 2 characters are obtained, first password is obtained;Record and preserve the time point for obtaining the character;
S2:The time interval value of the first password adjacent character is calculated according to the time point, time interval value set is obtained;
S3:According to the first password and the time interval value set, the second password is obtained.
2. cipher-code input method according to claim 1, it is characterised in that obtain " time interval value set " and be specially:
S21:Default first value and second value;First value and the second value are different natural numbers;
S22:Time interval value described in obtaining one successively, obtains very first time spacing value;
S23:If the very first time spacing value arranged for the second time less than the arithmetic mean of instantaneous value of all time interval values
Spacing value is the described first value;
S24:If the very first time spacing value is not less than the arithmetic mean of instantaneous value of all time interval values, when arranging second
Between spacing value be the second value;
Repeat S22, S23, S24, according to second time interval value corresponding with the very first time spacing value, obtain the time
Interval value set.
3. cipher-code input method according to claim 1, it is characterised in that obtain " time interval value set " and be specially:
S25:Two time interval values are obtained successively, obtain the 3rd time interval value and the 4th time interval value;
S26:If the 3rd time interval value is less than the arithmetic mean of instantaneous value of all time interval values, the 3rd time
Spacing value and the 4th time interval value carry out with or operation, obtain the 5th time interval value;
S27:If the 3rd time interval value is not less than the arithmetic mean of instantaneous value of all time interval values, when the described 3rd
Between spacing value and the 4th time interval value carry out xor operation, obtain the 5th time interval value;
Repeat S25, S26, S27, according to the 5th time interval value, obtain time interval value set.
4. cipher-code input method according to claim 1, it is characterised in that obtain " time interval value set " and be specially:
The time interval value is converted into into default system number, time interval value set is obtained.
5. cipher-code input method according to claim 1, it is characterised in that obtain " time interval value set " and be specially:
S28:Default mapping table, the mapping table includes the corresponding relation of pressure value and the first character set;
S29:Obtain the pressure value that the input character is produced;
S210:The pressure value is changed into the first character according to the mapping table;
Repeat S29, S210, according to the time interval value and first character, obtain time interval value set.
6. cipher-code input method according to claim 1, it is characterised in that obtain " time interval value set " and be specially:
The difference of the adjacent time interval value is calculated, the first difference is obtained;
According to first difference, time interval value set is obtained.
7. cipher-code input method according to claim 1, it is characterised in that also include:
By the second password described in md5 encryption algorithm for encryption, the 3rd password is obtained.
8. a kind of cipher input, it is characterised in that include:
Password Input module, for obtaining more than 2 characters, obtains first password;Record and preserve obtain the character when
Between point;
Secret generation module, for calculating the time interval value of the first password adjacent character according to the time point, obtains
Time interval value set;
Password merging module, for according to the first password and the time interval value set, obtaining the second password.
9. cipher input according to claim 8, it is characterised in that the secret generation module, also includes:
First module, for calculating the time interval value set, specially:
First default unit, for presetting the first value and second value;First value and the second value are different natural numbers;
First acquisition unit, for obtaining time interval value described in successively, obtains very first time spacing value;
Second acquisition unit, if the arithmetic mean of instantaneous value for being less than all time interval values for the very first time spacing value,
Second time interval value is then set for first value;
3rd acquiring unit, if the arithmetic average for being not less than all time interval values for the very first time spacing value
Value, then arrange the second time interval value for the second value;
First repetitives, for repeating first acquisition unit, second acquisition unit, the 3rd acquiring unit, according to institute
Corresponding second time interval value of very first time spacing value is stated, time interval value set is obtained;
Second unit, for calculating the time interval value set, specially:
4th acquiring unit, for obtaining two time interval values successively, obtains the 3rd time interval value and the 4th time
Spacing value;
5th acquiring unit, if the arithmetic mean of instantaneous value for being less than all time interval values for the 3rd time interval value,
Then the 3rd time interval value and the 4th time interval value carry out with or operation, obtain the 5th time interval value;
6th acquiring unit, if the arithmetic average for being not less than all time interval values for the 3rd time interval value
Value, then the 3rd time interval value and the 4th time interval value carry out xor operation, obtain the 5th time interval value;
Second repetitives, for repeating the 4th acquiring unit, the 5th acquiring unit, the 6th acquiring unit, according to institute
Corresponding 5th time interval value of the 3rd time interval value is stated, time interval value set is obtained;
Unit the 3rd, for calculating the time interval value set, specially:
7th acquiring unit, for the time interval value to be converted into into default system number, obtains time interval value set;
Unit the 4th, for calculating the time interval value set, specially:
Second default unit, for presetting mapping table, the mapping table includes the corresponding relation of pressure value and the first character set;
8th acquiring unit, for obtaining the pressure value that the input character is produced;
9th acquiring unit, for changing the pressure value into the first character according to the mapping table;
The third repeating unit, for repeating the 8th acquiring unit, the 9th acquiring unit, according to the time interval value and institute
The first character is stated, time interval value set is obtained;
Unit the 5th:For calculating the time interval value set, specially:
Tenth acquiring unit, for calculating the difference of the adjacent time interval value, obtains the first difference;
11st acquiring unit, for according to first difference, obtaining time interval value set.
10. cipher input according to claim 8, it is characterised in that also include:
Cryptographic module, for by the second password described in md5 encryption algorithm for encryption, obtaining the 3rd password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610939811.7A CN106570362B (en) | 2016-10-25 | 2016-10-25 | Password input method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610939811.7A CN106570362B (en) | 2016-10-25 | 2016-10-25 | Password input method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106570362A true CN106570362A (en) | 2017-04-19 |
CN106570362B CN106570362B (en) | 2020-04-21 |
Family
ID=58534780
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610939811.7A Active CN106570362B (en) | 2016-10-25 | 2016-10-25 | Password input method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106570362B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112329003A (en) * | 2020-11-06 | 2021-02-05 | 上海湖顶大数据科技有限公司 | Method and system for generating safe and easy-to-remember password |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090069964A (en) * | 2007-12-26 | 2009-07-01 | 주식회사 비원플러스 | Method and system for analyzing keystroke pattern of authentication information inputted from user |
CN103455752A (en) * | 2013-09-10 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | Password setting method, password verification method, device and system using methods |
CN104283679A (en) * | 2013-07-05 | 2015-01-14 | 中国电信股份有限公司 | Method and system for conducting safety certification by input rhythms |
CN104318136A (en) * | 2014-09-29 | 2015-01-28 | 同济大学 | Modeling and analysis system for user keyboard key pressing activity mode and identity identification method thereof |
CN105446622A (en) * | 2015-11-11 | 2016-03-30 | 北京京东尚科信息技术有限公司 | Enhancement transaction password input method and apparatus |
-
2016
- 2016-10-25 CN CN201610939811.7A patent/CN106570362B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090069964A (en) * | 2007-12-26 | 2009-07-01 | 주식회사 비원플러스 | Method and system for analyzing keystroke pattern of authentication information inputted from user |
CN104283679A (en) * | 2013-07-05 | 2015-01-14 | 中国电信股份有限公司 | Method and system for conducting safety certification by input rhythms |
CN103455752A (en) * | 2013-09-10 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | Password setting method, password verification method, device and system using methods |
CN104318136A (en) * | 2014-09-29 | 2015-01-28 | 同济大学 | Modeling and analysis system for user keyboard key pressing activity mode and identity identification method thereof |
CN105446622A (en) * | 2015-11-11 | 2016-03-30 | 北京京东尚科信息技术有限公司 | Enhancement transaction password input method and apparatus |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112329003A (en) * | 2020-11-06 | 2021-02-05 | 上海湖顶大数据科技有限公司 | Method and system for generating safe and easy-to-remember password |
CN112329003B (en) * | 2020-11-06 | 2023-12-29 | 上海湖顶大数据科技有限公司 | Method and system for generating password with good security |
Also Published As
Publication number | Publication date |
---|---|
CN106570362B (en) | 2020-04-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106161006B (en) | Digital encryption algorithm | |
CN103227717B (en) | The input of round key XOR is selected to carry out the method that SM4 cryptographic algorithm side channel energy is analyzed | |
CN104468090B (en) | Character cipher coding method based on image pixel coordinates | |
CN102640450B (en) | Security token is distributed to method, the method for handling safety token, the security token of key | |
CN101013943B (en) | Method for binding/recovering key using fingerprint details | |
CN103778590B (en) | Using digital picture storage and the method and apparatus of transmission information | |
CN104408356B (en) | A kind of fingerprint verification method and system, fingerprint template encryption device | |
CN101201886A (en) | Three-he-code for recognizing commodity | |
CN102710657B (en) | A kind of one-time password generates method and system | |
CN103996011A (en) | Method and device for protecting codes to be input safely | |
CN103607274B (en) | A kind of method generating dynamic password with static password for source | |
CN106789063B (en) | A kind of double factor authentication method based on convolution sum circulation dual coding | |
CN102957688A (en) | Password input and verification method and device | |
CN103164187B (en) | RSA modular exponentiation circuit and RSA security encryption chip | |
CN1427575A (en) | Electronic cipher formation and checking method | |
CN106570362A (en) | Password input method and device | |
CN102752285B (en) | Pre-authentification computer system login method based on high collision probability hash function | |
CN107483182A (en) | A kind of anti-power consumption attack method towards aes algorithm based on Out-of-order execution | |
CN102857340A (en) | Encryption method using symmetric cryptosystem | |
CN103888245A (en) | S box randomized method and system for smart card | |
CN108650072A (en) | It is a kind of to support a variety of symmetric cryptographic algorithm chips and its anti-attack circuit implementation method | |
CN103595523B (en) | A file encryption method | |
Tabrez et al. | Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system | |
CN106850206A (en) | Dynamic password protection system and method based on PLC | |
TWI492089B (en) | Fingerprint and Chaos ECG signal based on the personal data encryption / decryption system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |