CN110611562B - Contact-connection-control-instruction-based man-machine interaction application method in cryptography field - Google Patents
Contact-connection-control-instruction-based man-machine interaction application method in cryptography field Download PDFInfo
- Publication number
- CN110611562B CN110611562B CN201810621092.3A CN201810621092A CN110611562B CN 110611562 B CN110611562 B CN 110611562B CN 201810621092 A CN201810621092 A CN 201810621092A CN 110611562 B CN110611562 B CN 110611562B
- Authority
- CN
- China
- Prior art keywords
- password
- user
- custom
- unique terminal
- terminal equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses a contact connection control instruction-based man-machine interaction application method in the cryptography field, which comprises the following steps: step one: registering an account number according to rules through a network login platform and acquiring 'unique terminal equipment' as an account number, wherein the 'unique terminal equipment' is used as a unique login account number and password input equipment; step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform; step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen; the point positions of the language logic can be any number, the protection effect of the password is greatly improved, the language characters of the language logic can use any language characters as a basis, and the artificial new symbols are used for increasing the strength of the password, so that the password customization by a user is met, the risk of the password being deciphered is reduced, and the use of the user is facilitated.
Description
Technical Field
The invention belongs to the technical field of cryptography, and particularly relates to a man-machine interaction application method in the field of cryptography based on contact connection control instructions.
Background
The normal 9 palace lattice unlocking is a long line, is composed of random point positions, and has the possibility of 9 times (9^9) of 9in mathematical principle, which is 387420489. The Morse cipher principle is to hide original text, combine X intelligent screen origins to convert and secret new language, and the method is to replace 26-bit letters and 10-bit numbers by means of '5-bit random combination of 5-bit number superposition at most and 5-bit number superposition at most of one line' of the same point. Because of the use of the international universal master table, the password can be decoded reversely at present, and in a new functional era, single point location and single line are not effective protection means. More possibilities are possible from a combination of multi-point multilines, assuming 9 points, i.e. 9 to the 9 th power of 9, the possibility of an extra large value of 1.96627054755529101361807590852691e+77. The invention is based on the application category of the field of cryptography with the deepened concept.
Man-machine interaction defect of current intelligent screen password input:
1. short password risk: the password is short, and the protection effect is difficult to achieve.
2. Memory risk: the code is long and is hard to memorize.
3. Input time cost risk: the longer the password, the higher the time cost of entry.
4. Peeking risk: the input environment is seen, can be guessed, and has peeping risk.
Aiming at the problems exposed in the current intelligent screen password input process, a more rapid and safe input mode is needed to be redesigned, and therefore, the human-computer interaction application method in the cryptography field based on the contact connection control instruction and the use method thereof are provided.
Disclosure of Invention
The invention aims to provide a contact-connection-control-instruction-based man-machine interaction application method in the cryptography field, so as to solve the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions: the cryptography field man-machine interaction application method based on the contact connection control instruction comprises the following steps:
step one: registering an account number according to rules through a network login platform and acquiring 'unique terminal equipment' as an account number, wherein the 'unique terminal equipment' is used as a unique login account number and password input equipment;
step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform;
step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen;
step four: converting each custom grouping into a custom gesture password, and inputting the custom gesture password by opening software or using unique terminal equipment when a user needs to log in;
step five: the user-defined gesture password logic is stored and identified and converted by the unique equipment of the user, and the computer and the platform only identify and encrypt and store the background password and encrypt and transmit by using the hash value and salt;
step six: the user selects a password ciphertext to disguise and encrypt the stored user data information in the platform by himself, the password ciphertext is unique knowledge of the user, the platform and the computer network only record and transmit disguised information, and the user performs conversion extraction through a unique terminal device; the unique terminal device forward and backward converts the true information and the camouflage information through the password ciphertext;
step seven: the platform, the computer network and various intelligent devices recognize the user-defined password design rule mother table and the gesture form of the user without touching the password in the process of the unique terminal device; after the account password identification is completed, the information hash value is salted, encrypted and transmitted, and login is completed;
preferably; the custom password design rule in the third step comprises custom point line gesture password, custom female parent logic point line gesture password, plane array point line gesture password and three-dimensional array point line gesture password;
preferably; in the fourth step, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' can be stored in the user 'unique terminal equipment', and only contact and encrypt the ciphertext after conversion in the process of identifying the platform, the computer network and various types of equipment;
preferably; in the fifth step, the user manually touches the key position on the surface of the display screen of the computer or other intelligent equipment by using a finger to finish the input of the custom gesture password, or the user stores the custom gesture password in the unique terminal equipment and converts the custom gesture password into a background password to be input to the computer by the unique terminal equipment.
Compared with the prior art, the invention has the beneficial effects that: the point positions of the language logic can be any number, the protection effect of the password is greatly improved, the language characters of the language logic can use any language characters as a basis, and even can be artificial new symbols so as to increase the strength of the password, reduce the risk of cracking the password while meeting the requirement of customizing the password by a user, and facilitate the use of the user.
Drawings
FIG. 1 is a human-machine interaction flow diagram;
FIG. 2 is a diagram of a background analysis of a point and line command language;
FIG. 3 is a schematic illustration of human-machine interaction;
FIG. 4 is a schematic diagram of a user-defined point-line gesture password-human-computer interaction "input end
FIG. 5 is a diagram of a user-defined point-line gesture password-a human-computer interaction "background end
FIG. 6 is a schematic diagram of a user-defined female parent logical dot-line gesture password-human-computer interaction "input end
FIG. 7 is a diagram of a user-defined female parent logic dotted line gesture password-a human-computer interaction "background end" defined point location female parent
FIG. 8 is a diagram of a user-defined female parent logic dotted line gesture password-a human-computer interaction "background end" defined gesture female parent
FIG. 9 is a schematic view of a planar array of point-line gesture ciphers-human-machine interaction "inputs
FIG. 10 is a schematic diagram of a planar array dotted gesture password-human-computer interaction "background end
FIG. 11 is a schematic view of a stereoscopic array of "inputs" for human-machine interaction, which is a dotted gesture password
FIG. 12 is a schematic view of a stereoscopic array dotted gesture password-human-computer interaction "background end
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
Referring to fig. 1, 2, 3, 4 and 5, the present invention provides a technical solution: the cryptography field man-machine interaction application method based on the contact connection control instruction comprises the following steps:
in order to facilitate the use of users with common security level, the users can directly use the gesture password of the self-defined point line by a command method of the point and the line, and the password possibility is as follows: the 9 characters of the 9 lattice sequences to the power of 9 are possible=the possibility of an extra large value of 1.9662705475552955361807590852691e+77.
Step one: registering and picking up 'unique terminal equipment' by a network login platform according to rules, wherein the 'unique terminal equipment' is used as a unique login account and password input equipment;
step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform;
step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen;
step four: converting each custom grouping into a custom gesture password, and inputting the custom gesture password by opening software or using unique terminal equipment when a user needs to log in;
step five: the user-defined gesture password logic is stored and identified and converted by the unique equipment of the user, and the computer and the platform only identify and encrypt and store the background password and encrypt and transmit by using the hash value and salt;
step six: the user selects a password ciphertext to disguise and encrypt the stored user data information in the platform by himself, the password ciphertext is unique knowledge of the user, the platform and the computer network only record and transmit disguised information, and the user performs conversion extraction through a unique terminal device; the unique terminal device forward and backward converts the true information and the camouflage information through the password ciphertext; in the conversion of "password ciphertext" into "dummy information", for example, lPjJTaQGwPR430L8Tr71 in which the important information source is "real information", the password ciphertext is: tomas- > 12345-;
the "real information" is automatically converted into: lPjJ [ T ] QGwPR430L8Tr71;
the final generated "pseudo information" is: lPjJ [ 1 ] QGwPR430L8Tr71 [ 4 ];
step seven: the platform, the computer network and various intelligent devices recognize the user-defined password design rule mother table and the gesture form of the user without touching the password in the process of the unique terminal device; after the account password identification is completed, the information hash value is salted, encrypted and transmitted, and login is completed;
in order to facilitate the use of users, the custom password design rule in the third step comprises a custom point and point line gesture password; each gesture input corresponds to a background code phrase, "1", "14", "147", "2", "25", "258", "3", "6" and "9", so that the current common nine-grid unlocking security can be improved.
Considering any system, background information is more and more important, and as a network platform, storing real information of a user is quite unsafe, and in order to effectively prevent the background programmer from pinking or hacking, a method of 'unique knowledge' of the user, namely 'password ciphertext', is needed to enable the user information to be fully protected, so that the security level of the user is improved. In the fourth step, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' can be stored in the user 'unique terminal equipment', and only contact and encrypt the ciphertext after conversion in the process of identifying the platform, the computer network and various types of equipment;
in order to improve safety, in the fifth step, a user manually touches a key position on the surface of a display screen of a computer or other intelligent equipment with a finger to finish input of a custom gesture password, or the user stores the custom gesture password in a unique terminal device and converts the custom gesture password into a background password to be input to the computer through the unique terminal device.
The password includes a common 70 character graphic, and the case examples have temporarily left unused other special characters, multinational languages, ancient languages, and artificial special characters. ABCDEFGHIJKLMNOPRSTUVWXYZabcdefghijklnonopqrstuvwxyz 0123456789-! @ # $ percent pattern and &.
Example 2
Referring to fig. 1, 2, 3, 6, 7 and 8, the cryptography field man-machine interaction application method based on the contact connection control instruction includes the following steps:
in order to facilitate the use of users with higher security level, the users can use a custom female parent logic dotted line gesture password by a command method of point and line, and the password is formed by the following possibilities: dot-line combinations of 70 characters to the power of 9 lattice sequences to 9 may = 2.837535091800107078244610627312e+149.
Step one: registering and picking up 'unique terminal equipment' by a network login platform according to rules, wherein the 'unique terminal equipment' is used as a unique login account and password input equipment;
step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform;
step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen;
step four: converting each custom grouping into a custom gesture password, and inputting the custom gesture password by opening software or using unique terminal equipment when a user needs to log in;
step five: the user-defined gesture password logic is stored and identified and converted by the unique equipment of the user, and the computer and the platform only identify and encrypt and store the background password and encrypt and transmit by using the hash value and salt;
step six: the user selects a password ciphertext to disguise and encrypt the stored user data information in the platform by himself, the password ciphertext is unique knowledge of the user, the platform and the computer network only record and transmit disguised information, and the user performs conversion extraction through a unique terminal device; the unique terminal device forward and backward converts the true information and the camouflage information through the password ciphertext; in the conversion of "password ciphertext" into "dummy information", for example, lPjJTaQGwPR430L8Tr71 in which the important information source is "real information", the password ciphertext is: tomas- > 12345-;
the "real information" is automatically converted into: lPjJ [ T ] QGwPR430L8Tr71;
the final generated "pseudo information" is: lPjJ [ 1 ] QGwPR430L8Tr71 [ 4 ];
step seven: the platform, the computer network and various intelligent devices recognize the user-defined password design rule mother table and the gesture form of the user without touching the password in the process of the unique terminal device; after the account password identification is completed, the information hash value is salted, encrypted and transmitted, and login is completed;
in order to facilitate the use of users, the custom password design rule in the third step comprises a custom female parent logic dotted line gesture password;
considering any system, background information is more and more important, and as a network platform, storing real information of a user is quite unsafe, and in order to effectively prevent the background programmer from pinking or hacking, a method of 'unique knowledge' of the user, namely 'password ciphertext', is needed to enable the user information to be fully protected, so that the security level of the user is improved. In the fourth step, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' can be stored in the user 'unique terminal equipment', and only contact and encrypt the ciphertext after conversion in the process of identifying the platform, the computer network and various types of equipment;
in order to improve the safety, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' in the fourth step can be stored in the user 'unique terminal equipment', and only contact and encrypt and transmit the transformed ciphertext in the process of identifying the platform, the computer network and various types of equipment;
in order to improve safety, in the fifth step, a user manually touches a key position on the surface of a display screen of a computer or other intelligent equipment with a finger to finish input of a custom gesture password, or the user stores the custom gesture password in a unique terminal device and converts the custom gesture password into a background password to be input to the computer through the unique terminal device.
The password includes a common 70 character graphic, and the case examples have temporarily left unused other special characters, multinational languages, ancient languages, and artificial special characters. ABCDEFGHIJKLMNOPRSTUVWXYZabcdefghijklnonopqrstuvwxyz 0123456789-! @ # $ percent pattern and &.
Example 3
Referring to fig. 1, 2, 3, 9 and 10, the cryptography field man-machine interaction application method based on the contact connection control instruction includes the following steps:
in order to better improve the security level of the user, the user can use a planar array dotted line gesture password, and the password is formed by the following possibilities: the combination of the dotted lines of the power of 9 of the 9 lattice sequences of the 70 characters 81 bit codes may=super strong codes of super large numbers (which cannot be calculated by the computer's own calculator).
Step one: registering and picking up 'unique terminal equipment' by a network login platform according to rules, wherein the 'unique terminal equipment' is used as a unique login account and password input equipment;
step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform;
step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen; each gesture input corresponds to an ultralong background password segment (for example, 81 bits), the total stroke number is 26, the input is equivalent to the input of an ultralong password of 9 x 81 bits, and the computer recognizes and encrypts and transmits the ultralong background password of 729 bits. First gesture input: kmlE $poxx > k-! y1U% rYIX $EE7$h17UpMEbAe#GfJc9jh≡mVpfMM9S6p5E3j@YeZ $ -! The following is carried out s.LoWC 5ua9SKA & second gesture input: ij51sEvY63AwCIWPVQ8NVSg9P$hRRcT$2sqDusX% gMr-! xls2jLbe#sHXeBaK% KsOHC RX revedU 0r93B third gesture input: tzL05HB & RRm2V9 IN. QycS3KLrjBPukNvkl@tdBBBJT810. Sup.5 Itm f0 EjKD2422 PZgq 5BF37TQoKYDs34m fourth gesture input: o9scRrH5iy582U6 qXzc-! g21N & sodBqJwKON6oC2BJqSMjTjn3SLXtJry 09-! J $ tv5GCDg A8HsT EzVzB-! Fifth gesture input: sp% Sj 3OymLAy@r3ssNUEp3xqby5jNYrz% SnVO1 aftisKQ#UW2xp4N28$uackbwjjcm 4k13thpravos sixth gesture input: 6 jiffN9qPhZvxpK1#BTIXasKOjrgaa EOJEk3t7hawtOB@fxlRsaiTMhsl4$pNnB1XBq$oRxi8J5xXI@N
Step four: converting each custom grouping into a custom gesture password, and inputting the custom gesture password by opening software or using unique terminal equipment when a user needs to log in;
step five: the user-defined gesture password logic is stored and identified and converted by the unique equipment of the user, and the computer and the platform only identify and encrypt and store the background password and encrypt and transmit by using the hash value and salt;
step six: the user selects a password ciphertext to disguise and encrypt the stored user data information in the platform by himself, the password ciphertext is unique knowledge of the user, the platform and the computer network only record and transmit disguised information, and the user performs conversion extraction through a unique terminal device; the unique terminal device forward and backward converts the true information and the camouflage information through the password ciphertext; in the conversion of "password ciphertext" into "dummy information", for example, lPjJTaQGwPR430L8Tr71 in which the important information source is "real information", the password ciphertext is: tomas- > 12345-;
the "real information" is automatically converted into: lPjJ [ T ] QGwPR430L8Tr71;
the final generated "pseudo information" is: lPjJ [ 1 ] QGwPR430L8Tr71 [ 4 ];
step seven: the platform, the computer network and various intelligent devices recognize the user-defined password design rule mother table and the gesture form of the user without touching the password in the process of the unique terminal device; after the account password identification is completed, the information hash value is salted, encrypted and transmitted, and login is completed;
in order to facilitate the use of users, the 'custom password design rule' in the third step comprises a 'plane array dotted line gesture password';
considering any system, background information is more and more important, and as a network platform, storing real information of a user is quite unsafe, and in order to effectively prevent the background programmer from pinking or hacking, a method of 'unique knowledge' of the user, namely 'password ciphertext', is needed to enable the user information to be fully protected, so that the security level of the user is improved. In the fourth step, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' can be stored in the user 'unique terminal equipment', and only contact and encrypt the ciphertext after conversion in the process of identifying the platform, the computer network and various types of equipment;
in order to improve the safety, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' in the fourth step can be stored in the user 'unique terminal equipment', and only contact and encrypt and transmit the transformed ciphertext in the process of identifying the platform, the computer network and various types of equipment;
in order to improve safety, in the fifth step, a user manually touches a key position on the surface of a display screen of a computer or other intelligent equipment with a finger to finish input of a custom gesture password, or the user stores the custom gesture password in a unique terminal device and converts the custom gesture password into a background password to be input to the computer through the unique terminal device.
The password includes a common 70 character graphic, and the case examples have temporarily left unused other special characters, multinational languages, ancient languages, and artificial special characters. ABCDEFGHIJKLMNOPRSTUVWXYZabcdefghijklnonopqrstuvwxyz 0123456789-! @ # $ percent pattern and &.
Example 4
Referring to fig. 1, 2, 3, 11 and 12, the cryptography field man-machine interaction application method based on the contact connection control instruction includes the following steps:
in order to improve the security level of the user, the user uses a stereoscopic array dotted line gesture password, and the password possibility is as follows: the combination of the dotted lines of the 40 th power of the 40 th lattice sequences of the 70 kinds of characters 81 bit passwords can be a password of 6 plane = super large number (which cannot be calculated by a computer self-contained calculator);
step one: registering and picking up 'unique terminal equipment' by a network login platform according to rules, wherein the 'unique terminal equipment' is used as a unique login account and password input equipment;
step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform; each gesture input corresponds to an ultralong background password segment (for example, 81 bits), the total stroke number is 26, the input corresponds to the ultralong password of 26 x 81 bits, and the computer recognizes and encrypts and transmits the ultralong background password of 2106 bits. kmlE $poxx > k-! y1U% rYIX $EE7$h17UpMEbAe#GfJc9jh≡mVpfMM9S6p5E3j@YeZ $ -! The following is carried out s. LoWC5ua9SKA & first gesture input in color order: kmlE $poxx > k-! y1U% rYIX $EE7$h17UpMEbAe#GfJc9jh≡mVpfMM9S6p5E3j@YeZ $ -! The following is carried out s.LoWC 5ua9SKA & second gesture input: ij51sEvY63AwCIWPVQ8NVSg9P$hRRcT$2sqDusX% gMr-! xls2jLbe#sHXeBaK% KsOHC RX revedU 0r93B third gesture input: tzL05HB & RRm2V9 IN. QycS3KLrjBPukNvkl@tdBBBJT810. Sup.5 Itm f0 EjKD2422 PZgq 5BF37TQoKYDs34m fourth gesture input: o9scRrH5iy582U6 qXzc-! g21N & sodBqJwKON6oC2BJqSMjTjn3SLXtJry 09-! J $ tv5GCDg A8HsT EzVzB-! Fifth gesture input: sp% Sj 3OymLAy@r3ssNUEp3xqby5jNYrz% SnVO1 aftisKQ#UW2xp4N28$uackbwjjcm 4k13thpravos sixth gesture input: 6 jifn9 qphzvxpk1#btixaskojrgaa eojek3t7 hawtob@fxlrsaitmhsl4$pnb1xbq$orxi8j5xxi@n and so on … … (the surface distinguishing designs of the present facade can take the forms of, but are not limited to, color, pattern, shape, shading, stereo, etc.);
step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen;
step four: converting each custom grouping into a custom gesture password, and inputting the custom gesture password by opening software or using unique terminal equipment when a user needs to log in;
step five: the user-defined gesture password logic is stored and identified and converted by the unique equipment of the user, and the computer and the platform only identify and encrypt and store the background password and encrypt and transmit by using the hash value and salt;
step six: the user selects a password ciphertext to disguise and encrypt the stored user data information in the platform by himself, the password ciphertext is unique knowledge of the user, the platform and the computer network only record and transmit disguised information, and the user performs conversion extraction through a unique terminal device; the unique terminal device forward and backward converts the true information and the camouflage information through the password ciphertext; in the conversion of "password ciphertext" into "dummy information", for example, lPjJTaQGwPR430L8Tr71 in which the important information source is "real information", the password ciphertext is: tomas- > 12345-;
the "real information" is automatically converted into: lPjJ [ T ] QGwPR430L8Tr71;
the final generated "pseudo information" is: lPjJ [ 1 ] QGwPR430L8Tr71 [ 4 ];
step seven: the platform, the computer network and various intelligent devices recognize the user-defined password design rule mother table and the gesture form of the user without touching the password in the process of the unique terminal device; after the account password identification is completed, the information hash value is salted, encrypted and transmitted, and login is completed;
in order to facilitate the use of users, the custom password design rule in the third step comprises a stereoscopic array dotted line gesture password;
considering any system, background information is more and more important, and as a network platform, storing real information of a user is quite unsafe, and in order to effectively prevent the background programmer from pinking or hacking, a method of 'unique knowledge' of the user, namely 'password ciphertext', is needed to enable the user information to be fully protected, so that the security level of the user is improved. In the fourth step, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' can be stored in the user 'unique terminal equipment', and only contact and encrypt the ciphertext after conversion in the process of identifying the platform, the computer network and various types of equipment;
in order to improve the safety, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' in the fourth step can be stored in the user 'unique terminal equipment', and only contact and encrypt and transmit the transformed ciphertext in the process of identifying the platform, the computer network and various types of equipment;
in order to improve safety, in the fifth step, a user manually touches a key position on the surface of a display screen of a computer or other intelligent equipment with a finger to finish input of a custom gesture password, or the user stores the custom gesture password in a unique terminal device and converts the custom gesture password into a background password to be input to the computer through the unique terminal device.
The password includes a common 70 character graphic, and the case examples have temporarily left unused other special characters, multinational languages, ancient languages, and artificial special characters. ABCDEFGHIJKLMNOPRSTUVWXYZabcdefghijklnonopqrstuvwxyz 0123456789-! @ # $ percent pattern and &.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (4)
1. The cryptography field man-machine interaction application method based on the contact connection control instruction is characterized by comprising the following steps:
step one: logging in an initial platform through a network, registering an account according to rules, and acquiring unique terminal equipment as an account, wherein the unique terminal equipment is used as a unique login account, and the unique terminal equipment is used as a password input device;
step two: starting a unique terminal device of a user to connect with an intelligent device or a computer, and opening an initial platform through a network to perform account verification and password interaction;
step three: setting passwords according to the custom password design rules, and converting and compiling the multi-layer grouping of the passwords by a local background of the unique terminal equipment or a cloud background of the equipment through the prompt operation of the initial platform and the display screen of the unique terminal equipment;
step four: the background passwords are converted into custom gesture passwords through each custom grouping, when a user needs to log in, the user directly inputs the custom gesture passwords by opening software or locally inputting the custom gesture passwords by using unique terminal equipment, and the actual input is the background passwords;
step five: the user-defined gesture cryptograph logic is stored and identified and converted by a user unique device local or cloud background, and a computer and an initial or other platform only identify and encrypt and store background passwords and encrypt and transmit the background passwords by using a hash value and an initial platform pseudo-random salt value;
step six: the user selects the password ciphertext by himself to disguise and encrypt the stored user data information in the initial platform, the password ciphertext is unique knowledge of the user, the computer networks of the initial platform and other platforms only record and transmit disguised information, and the user performs conversion extraction through the unique terminal equipment; the unique terminal equipment positively and reversely converts the real information and the camouflage information in a mode of changing the real information salt value and the false information salt value through password ciphertext interference; the true information salt value is a pseudo-random salt value which is not entangled by the password ciphertext, and the pseudo-information salt value is a true random salt value after the password ciphertext is entangled;
step seven: the method comprises the steps that a background password custom cryptogram design rule mother table and a user gesture form are not contacted in the process of identifying unique terminal equipment by an initial platform or other platforms, computer networks and various intelligent equipment; and after the account password identification is completed, encrypting and transmitting the information through a hash function in combination with a true random salt value after password ciphertext scrambling, and completing login.
2. The touch-and-line control instruction-based cryptographic domain human-computer interaction application method of claim 1, wherein the custom passcode design rules include custom passcode, custom parent logic passcode, planar array passcode, and stereoscopic array passcode.
3. The cryptographic field man-machine interaction application method based on contact connection control instructions according to claim 1, wherein custom gesture passwords designed by a user and related custom password design rule mother table and password ciphertext can be stored in unique terminal equipment of the user, and only contact and encrypt and transmit the transformed ciphertext in the process of identifying platforms, computer networks and various intelligent devices.
4. The touch-point-connection-control-instruction-based man-machine interaction application method in the cryptography field, according to claim 1, is characterized in that a user manually touches a key position on the surface of a display screen of a computer or other intelligent equipment with a finger to finish input of a custom gesture password, or the user stores the custom gesture password in a unique terminal equipment and converts the custom gesture password into a background password through the unique terminal equipment to input the custom gesture password to the computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810621092.3A CN110611562B (en) | 2018-06-15 | 2018-06-15 | Contact-connection-control-instruction-based man-machine interaction application method in cryptography field |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810621092.3A CN110611562B (en) | 2018-06-15 | 2018-06-15 | Contact-connection-control-instruction-based man-machine interaction application method in cryptography field |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110611562A CN110611562A (en) | 2019-12-24 |
CN110611562B true CN110611562B (en) | 2023-05-26 |
Family
ID=68888358
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810621092.3A Active CN110611562B (en) | 2018-06-15 | 2018-06-15 | Contact-connection-control-instruction-based man-machine interaction application method in cryptography field |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110611562B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236440A (en) * | 2010-04-22 | 2011-11-09 | 联芯科技有限公司 | Password input method and mobile terminal using same |
CN104700007A (en) * | 2015-03-18 | 2015-06-10 | 詹万泉 | Gesture impression password setting and application method |
CN105743893A (en) * | 2016-01-29 | 2016-07-06 | 大连秘阵科技有限公司 | One time dynamic positioning authentication method and system and one time dynamic password modifying method |
CN107231330A (en) * | 2016-03-23 | 2017-10-03 | 阿里巴巴集团控股有限公司 | A kind of password determination, login validation method and equipment |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100287382A1 (en) * | 2009-05-07 | 2010-11-11 | John Charles Gyorffy | Two-factor graphical password for text password and encryption key generation |
US9634833B2 (en) * | 2014-06-20 | 2017-04-25 | Google Inc. | Gesture-based password entry to unlock an encrypted device |
CN104766002B (en) * | 2015-03-04 | 2017-03-08 | 努比亚技术有限公司 | A kind of unlocking method and device |
CN204759393U (en) * | 2015-06-26 | 2015-11-11 | 中国工商银行股份有限公司 | Gesture password input device and system |
CN104978144A (en) * | 2015-06-26 | 2015-10-14 | 中国工商银行股份有限公司 | Gesture password input device and system and method for transaction based on system |
CN105184568B (en) * | 2015-08-27 | 2019-05-24 | 北京智能果技术有限公司 | Cipher-code input method, system, code keyboard equipment and terminal device |
CN107276962B (en) * | 2016-04-07 | 2023-04-07 | 北京得意音通技术有限责任公司 | Dynamic password voice authentication system capable of combining any gesture |
CN106790122A (en) * | 2016-12-27 | 2017-05-31 | 努比亚技术有限公司 | A kind of login method when terminal, server and access application |
-
2018
- 2018-06-15 CN CN201810621092.3A patent/CN110611562B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236440A (en) * | 2010-04-22 | 2011-11-09 | 联芯科技有限公司 | Password input method and mobile terminal using same |
CN104700007A (en) * | 2015-03-18 | 2015-06-10 | 詹万泉 | Gesture impression password setting and application method |
CN105743893A (en) * | 2016-01-29 | 2016-07-06 | 大连秘阵科技有限公司 | One time dynamic positioning authentication method and system and one time dynamic password modifying method |
CN107231330A (en) * | 2016-03-23 | 2017-10-03 | 阿里巴巴集团控股有限公司 | A kind of password determination, login validation method and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110611562A (en) | 2019-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3319069B1 (en) | Method for authenticating a user by means of a non-secure terminal | |
CN106789052B (en) | Remote key issuing system based on quantum communication network and use method thereof | |
CN108234458A (en) | Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher | |
CN102419805A (en) | Terminal equipment and method for encrypting user information | |
CN104134022A (en) | Information hiding and protecting method based on image | |
CN110008745A (en) | A kind of encryption method, computer equipment and computer storage medium | |
CN105184181A (en) | File encryption method, file decryption method and file encryption device | |
CN102427459B (en) | Offline authorization method based on Usbkeys | |
CN105450419A (en) | Method, device and system | |
CN109165531B (en) | AES mask method, electronic equipment and storage medium | |
CN103198247A (en) | Computer safety protection method and computer safety protection system | |
CN105117658A (en) | Password security management method and equipment based on fingerprint authentication | |
CN105426727B (en) | Fingerprint decryption method and mobile terminal | |
JP2019505051A (en) | Dynamic graphical password-based network registration method and system | |
CN107257283A (en) | Fingerprint verification method based on quantum figure state | |
CN110611562B (en) | Contact-connection-control-instruction-based man-machine interaction application method in cryptography field | |
CN105959116A (en) | Password input system and method capable of realizing encrypted password input | |
WO2018082930A1 (en) | Method for securely performing a sensitive operation using a non-secure terminal | |
CN104883341A (en) | Application management device, terminal and application management method | |
CN102868521A (en) | Method for enhancing secret key transmission of symmetrical secret key system | |
EP3319067B1 (en) | Method for authenticating a user by means of a non-secure terminal | |
CN107070658B (en) | Improved method of system encryption authentication mechanism | |
CN106789079A (en) | Identity identifying method, disposal password electronic installation and system | |
CN106686015B (en) | A kind of safe networking dynamic confirming method for smart machine | |
CN100546242C (en) | A kind of generation of super code and authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |