CN110611562B - Contact-connection-control-instruction-based man-machine interaction application method in cryptography field - Google Patents

Contact-connection-control-instruction-based man-machine interaction application method in cryptography field Download PDF

Info

Publication number
CN110611562B
CN110611562B CN201810621092.3A CN201810621092A CN110611562B CN 110611562 B CN110611562 B CN 110611562B CN 201810621092 A CN201810621092 A CN 201810621092A CN 110611562 B CN110611562 B CN 110611562B
Authority
CN
China
Prior art keywords
password
user
custom
unique terminal
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810621092.3A
Other languages
Chinese (zh)
Other versions
CN110611562A (en
Inventor
陈超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810621092.3A priority Critical patent/CN110611562B/en
Publication of CN110611562A publication Critical patent/CN110611562A/en
Application granted granted Critical
Publication of CN110611562B publication Critical patent/CN110611562B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a contact connection control instruction-based man-machine interaction application method in the cryptography field, which comprises the following steps: step one: registering an account number according to rules through a network login platform and acquiring 'unique terminal equipment' as an account number, wherein the 'unique terminal equipment' is used as a unique login account number and password input equipment; step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform; step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen; the point positions of the language logic can be any number, the protection effect of the password is greatly improved, the language characters of the language logic can use any language characters as a basis, and the artificial new symbols are used for increasing the strength of the password, so that the password customization by a user is met, the risk of the password being deciphered is reduced, and the use of the user is facilitated.

Description

Contact-connection-control-instruction-based man-machine interaction application method in cryptography field
Technical Field
The invention belongs to the technical field of cryptography, and particularly relates to a man-machine interaction application method in the field of cryptography based on contact connection control instructions.
Background
The normal 9 palace lattice unlocking is a long line, is composed of random point positions, and has the possibility of 9 times (9^9) of 9in mathematical principle, which is 387420489. The Morse cipher principle is to hide original text, combine X intelligent screen origins to convert and secret new language, and the method is to replace 26-bit letters and 10-bit numbers by means of '5-bit random combination of 5-bit number superposition at most and 5-bit number superposition at most of one line' of the same point. Because of the use of the international universal master table, the password can be decoded reversely at present, and in a new functional era, single point location and single line are not effective protection means. More possibilities are possible from a combination of multi-point multilines, assuming 9 points, i.e. 9 to the 9 th power of 9, the possibility of an extra large value of 1.96627054755529101361807590852691e+77. The invention is based on the application category of the field of cryptography with the deepened concept.
Man-machine interaction defect of current intelligent screen password input:
1. short password risk: the password is short, and the protection effect is difficult to achieve.
2. Memory risk: the code is long and is hard to memorize.
3. Input time cost risk: the longer the password, the higher the time cost of entry.
4. Peeking risk: the input environment is seen, can be guessed, and has peeping risk.
Aiming at the problems exposed in the current intelligent screen password input process, a more rapid and safe input mode is needed to be redesigned, and therefore, the human-computer interaction application method in the cryptography field based on the contact connection control instruction and the use method thereof are provided.
Disclosure of Invention
The invention aims to provide a contact-connection-control-instruction-based man-machine interaction application method in the cryptography field, so as to solve the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions: the cryptography field man-machine interaction application method based on the contact connection control instruction comprises the following steps:
step one: registering an account number according to rules through a network login platform and acquiring 'unique terminal equipment' as an account number, wherein the 'unique terminal equipment' is used as a unique login account number and password input equipment;
step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform;
step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen;
step four: converting each custom grouping into a custom gesture password, and inputting the custom gesture password by opening software or using unique terminal equipment when a user needs to log in;
step five: the user-defined gesture password logic is stored and identified and converted by the unique equipment of the user, and the computer and the platform only identify and encrypt and store the background password and encrypt and transmit by using the hash value and salt;
step six: the user selects a password ciphertext to disguise and encrypt the stored user data information in the platform by himself, the password ciphertext is unique knowledge of the user, the platform and the computer network only record and transmit disguised information, and the user performs conversion extraction through a unique terminal device; the unique terminal device forward and backward converts the true information and the camouflage information through the password ciphertext;
step seven: the platform, the computer network and various intelligent devices recognize the user-defined password design rule mother table and the gesture form of the user without touching the password in the process of the unique terminal device; after the account password identification is completed, the information hash value is salted, encrypted and transmitted, and login is completed;
preferably; the custom password design rule in the third step comprises custom point line gesture password, custom female parent logic point line gesture password, plane array point line gesture password and three-dimensional array point line gesture password;
preferably; in the fourth step, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' can be stored in the user 'unique terminal equipment', and only contact and encrypt the ciphertext after conversion in the process of identifying the platform, the computer network and various types of equipment;
preferably; in the fifth step, the user manually touches the key position on the surface of the display screen of the computer or other intelligent equipment by using a finger to finish the input of the custom gesture password, or the user stores the custom gesture password in the unique terminal equipment and converts the custom gesture password into a background password to be input to the computer by the unique terminal equipment.
Compared with the prior art, the invention has the beneficial effects that: the point positions of the language logic can be any number, the protection effect of the password is greatly improved, the language characters of the language logic can use any language characters as a basis, and even can be artificial new symbols so as to increase the strength of the password, reduce the risk of cracking the password while meeting the requirement of customizing the password by a user, and facilitate the use of the user.
Drawings
FIG. 1 is a human-machine interaction flow diagram;
FIG. 2 is a diagram of a background analysis of a point and line command language;
FIG. 3 is a schematic illustration of human-machine interaction;
FIG. 4 is a schematic diagram of a user-defined point-line gesture password-human-computer interaction "input end
FIG. 5 is a diagram of a user-defined point-line gesture password-a human-computer interaction "background end
FIG. 6 is a schematic diagram of a user-defined female parent logical dot-line gesture password-human-computer interaction "input end
FIG. 7 is a diagram of a user-defined female parent logic dotted line gesture password-a human-computer interaction "background end" defined point location female parent
FIG. 8 is a diagram of a user-defined female parent logic dotted line gesture password-a human-computer interaction "background end" defined gesture female parent
FIG. 9 is a schematic view of a planar array of point-line gesture ciphers-human-machine interaction "inputs
FIG. 10 is a schematic diagram of a planar array dotted gesture password-human-computer interaction "background end
FIG. 11 is a schematic view of a stereoscopic array of "inputs" for human-machine interaction, which is a dotted gesture password
FIG. 12 is a schematic view of a stereoscopic array dotted gesture password-human-computer interaction "background end
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
Referring to fig. 1, 2, 3, 4 and 5, the present invention provides a technical solution: the cryptography field man-machine interaction application method based on the contact connection control instruction comprises the following steps:
in order to facilitate the use of users with common security level, the users can directly use the gesture password of the self-defined point line by a command method of the point and the line, and the password possibility is as follows: the 9 characters of the 9 lattice sequences to the power of 9 are possible=the possibility of an extra large value of 1.9662705475552955361807590852691e+77.
Step one: registering and picking up 'unique terminal equipment' by a network login platform according to rules, wherein the 'unique terminal equipment' is used as a unique login account and password input equipment;
step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform;
step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen;
step four: converting each custom grouping into a custom gesture password, and inputting the custom gesture password by opening software or using unique terminal equipment when a user needs to log in;
step five: the user-defined gesture password logic is stored and identified and converted by the unique equipment of the user, and the computer and the platform only identify and encrypt and store the background password and encrypt and transmit by using the hash value and salt;
step six: the user selects a password ciphertext to disguise and encrypt the stored user data information in the platform by himself, the password ciphertext is unique knowledge of the user, the platform and the computer network only record and transmit disguised information, and the user performs conversion extraction through a unique terminal device; the unique terminal device forward and backward converts the true information and the camouflage information through the password ciphertext; in the conversion of "password ciphertext" into "dummy information", for example, lPjJTaQGwPR430L8Tr71 in which the important information source is "real information", the password ciphertext is: tomas- > 12345-;
the "real information" is automatically converted into: lPjJ [ T ] QGwPR430L8Tr71;
the final generated "pseudo information" is: lPjJ [ 1 ] QGwPR430L8Tr71 [ 4 ];
step seven: the platform, the computer network and various intelligent devices recognize the user-defined password design rule mother table and the gesture form of the user without touching the password in the process of the unique terminal device; after the account password identification is completed, the information hash value is salted, encrypted and transmitted, and login is completed;
in order to facilitate the use of users, the custom password design rule in the third step comprises a custom point and point line gesture password; each gesture input corresponds to a background code phrase, "1", "14", "147", "2", "25", "258", "3", "6" and "9", so that the current common nine-grid unlocking security can be improved.
Considering any system, background information is more and more important, and as a network platform, storing real information of a user is quite unsafe, and in order to effectively prevent the background programmer from pinking or hacking, a method of 'unique knowledge' of the user, namely 'password ciphertext', is needed to enable the user information to be fully protected, so that the security level of the user is improved. In the fourth step, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' can be stored in the user 'unique terminal equipment', and only contact and encrypt the ciphertext after conversion in the process of identifying the platform, the computer network and various types of equipment;
in order to improve safety, in the fifth step, a user manually touches a key position on the surface of a display screen of a computer or other intelligent equipment with a finger to finish input of a custom gesture password, or the user stores the custom gesture password in a unique terminal device and converts the custom gesture password into a background password to be input to the computer through the unique terminal device.
The password includes a common 70 character graphic, and the case examples have temporarily left unused other special characters, multinational languages, ancient languages, and artificial special characters. ABCDEFGHIJKLMNOPRSTUVWXYZabcdefghijklnonopqrstuvwxyz 0123456789-! @ # $ percent pattern and &.
Example 2
Referring to fig. 1, 2, 3, 6, 7 and 8, the cryptography field man-machine interaction application method based on the contact connection control instruction includes the following steps:
in order to facilitate the use of users with higher security level, the users can use a custom female parent logic dotted line gesture password by a command method of point and line, and the password is formed by the following possibilities: dot-line combinations of 70 characters to the power of 9 lattice sequences to 9 may = 2.837535091800107078244610627312e+149.
Step one: registering and picking up 'unique terminal equipment' by a network login platform according to rules, wherein the 'unique terminal equipment' is used as a unique login account and password input equipment;
step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform;
step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen;
step four: converting each custom grouping into a custom gesture password, and inputting the custom gesture password by opening software or using unique terminal equipment when a user needs to log in;
step five: the user-defined gesture password logic is stored and identified and converted by the unique equipment of the user, and the computer and the platform only identify and encrypt and store the background password and encrypt and transmit by using the hash value and salt;
step six: the user selects a password ciphertext to disguise and encrypt the stored user data information in the platform by himself, the password ciphertext is unique knowledge of the user, the platform and the computer network only record and transmit disguised information, and the user performs conversion extraction through a unique terminal device; the unique terminal device forward and backward converts the true information and the camouflage information through the password ciphertext; in the conversion of "password ciphertext" into "dummy information", for example, lPjJTaQGwPR430L8Tr71 in which the important information source is "real information", the password ciphertext is: tomas- > 12345-;
the "real information" is automatically converted into: lPjJ [ T ] QGwPR430L8Tr71;
the final generated "pseudo information" is: lPjJ [ 1 ] QGwPR430L8Tr71 [ 4 ];
step seven: the platform, the computer network and various intelligent devices recognize the user-defined password design rule mother table and the gesture form of the user without touching the password in the process of the unique terminal device; after the account password identification is completed, the information hash value is salted, encrypted and transmitted, and login is completed;
in order to facilitate the use of users, the custom password design rule in the third step comprises a custom female parent logic dotted line gesture password;
considering any system, background information is more and more important, and as a network platform, storing real information of a user is quite unsafe, and in order to effectively prevent the background programmer from pinking or hacking, a method of 'unique knowledge' of the user, namely 'password ciphertext', is needed to enable the user information to be fully protected, so that the security level of the user is improved. In the fourth step, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' can be stored in the user 'unique terminal equipment', and only contact and encrypt the ciphertext after conversion in the process of identifying the platform, the computer network and various types of equipment;
in order to improve the safety, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' in the fourth step can be stored in the user 'unique terminal equipment', and only contact and encrypt and transmit the transformed ciphertext in the process of identifying the platform, the computer network and various types of equipment;
in order to improve safety, in the fifth step, a user manually touches a key position on the surface of a display screen of a computer or other intelligent equipment with a finger to finish input of a custom gesture password, or the user stores the custom gesture password in a unique terminal device and converts the custom gesture password into a background password to be input to the computer through the unique terminal device.
The password includes a common 70 character graphic, and the case examples have temporarily left unused other special characters, multinational languages, ancient languages, and artificial special characters. ABCDEFGHIJKLMNOPRSTUVWXYZabcdefghijklnonopqrstuvwxyz 0123456789-! @ # $ percent pattern and &.
Example 3
Referring to fig. 1, 2, 3, 9 and 10, the cryptography field man-machine interaction application method based on the contact connection control instruction includes the following steps:
in order to better improve the security level of the user, the user can use a planar array dotted line gesture password, and the password is formed by the following possibilities: the combination of the dotted lines of the power of 9 of the 9 lattice sequences of the 70 characters 81 bit codes may=super strong codes of super large numbers (which cannot be calculated by the computer's own calculator).
Step one: registering and picking up 'unique terminal equipment' by a network login platform according to rules, wherein the 'unique terminal equipment' is used as a unique login account and password input equipment;
step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform;
step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen; each gesture input corresponds to an ultralong background password segment (for example, 81 bits), the total stroke number is 26, the input is equivalent to the input of an ultralong password of 9 x 81 bits, and the computer recognizes and encrypts and transmits the ultralong background password of 729 bits. First gesture input: kmlE $poxx > k-! y1U% rYIX $EE7$h17UpMEbAe#GfJc9jh≡mVpfMM9S6p5E3j@YeZ $ -! The following is carried out s.LoWC 5ua9SKA & second gesture input: ij51sEvY63AwCIWPVQ8NVSg9P$hRRcT$2sqDusX% gMr-! xls2jLbe#sHXeBaK% KsOHC RX revedU 0r93B third gesture input: tzL05HB & RRm2V9 IN. QycS3KLrjBPukNvkl@tdBBBJT810. Sup.5 Itm f0 EjKD2422 PZgq 5BF37TQoKYDs34m fourth gesture input: o9scRrH5iy582U6 qXzc-! g21N & sodBqJwKON6oC2BJqSMjTjn3SLXtJry 09-! J $ tv5GCDg A8HsT EzVzB-! Fifth gesture input: sp% Sj 3OymLAy@r3ssNUEp3xqby5jNYrz% SnVO1 aftisKQ#UW2xp4N28$uackbwjjcm 4k13thpravos sixth gesture input: 6 jiffN9qPhZvxpK1#BTIXasKOjrgaa EOJEk3t7hawtOB@fxlRsaiTMhsl4$pNnB1XBq$oRxi8J5xXI@N
Step four: converting each custom grouping into a custom gesture password, and inputting the custom gesture password by opening software or using unique terminal equipment when a user needs to log in;
step five: the user-defined gesture password logic is stored and identified and converted by the unique equipment of the user, and the computer and the platform only identify and encrypt and store the background password and encrypt and transmit by using the hash value and salt;
step six: the user selects a password ciphertext to disguise and encrypt the stored user data information in the platform by himself, the password ciphertext is unique knowledge of the user, the platform and the computer network only record and transmit disguised information, and the user performs conversion extraction through a unique terminal device; the unique terminal device forward and backward converts the true information and the camouflage information through the password ciphertext; in the conversion of "password ciphertext" into "dummy information", for example, lPjJTaQGwPR430L8Tr71 in which the important information source is "real information", the password ciphertext is: tomas- > 12345-;
the "real information" is automatically converted into: lPjJ [ T ] QGwPR430L8Tr71;
the final generated "pseudo information" is: lPjJ [ 1 ] QGwPR430L8Tr71 [ 4 ];
step seven: the platform, the computer network and various intelligent devices recognize the user-defined password design rule mother table and the gesture form of the user without touching the password in the process of the unique terminal device; after the account password identification is completed, the information hash value is salted, encrypted and transmitted, and login is completed;
in order to facilitate the use of users, the 'custom password design rule' in the third step comprises a 'plane array dotted line gesture password';
considering any system, background information is more and more important, and as a network platform, storing real information of a user is quite unsafe, and in order to effectively prevent the background programmer from pinking or hacking, a method of 'unique knowledge' of the user, namely 'password ciphertext', is needed to enable the user information to be fully protected, so that the security level of the user is improved. In the fourth step, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' can be stored in the user 'unique terminal equipment', and only contact and encrypt the ciphertext after conversion in the process of identifying the platform, the computer network and various types of equipment;
in order to improve the safety, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' in the fourth step can be stored in the user 'unique terminal equipment', and only contact and encrypt and transmit the transformed ciphertext in the process of identifying the platform, the computer network and various types of equipment;
in order to improve safety, in the fifth step, a user manually touches a key position on the surface of a display screen of a computer or other intelligent equipment with a finger to finish input of a custom gesture password, or the user stores the custom gesture password in a unique terminal device and converts the custom gesture password into a background password to be input to the computer through the unique terminal device.
The password includes a common 70 character graphic, and the case examples have temporarily left unused other special characters, multinational languages, ancient languages, and artificial special characters. ABCDEFGHIJKLMNOPRSTUVWXYZabcdefghijklnonopqrstuvwxyz 0123456789-! @ # $ percent pattern and &.
Example 4
Referring to fig. 1, 2, 3, 11 and 12, the cryptography field man-machine interaction application method based on the contact connection control instruction includes the following steps:
in order to improve the security level of the user, the user uses a stereoscopic array dotted line gesture password, and the password possibility is as follows: the combination of the dotted lines of the 40 th power of the 40 th lattice sequences of the 70 kinds of characters 81 bit passwords can be a password of 6 plane = super large number (which cannot be calculated by a computer self-contained calculator);
step one: registering and picking up 'unique terminal equipment' by a network login platform according to rules, wherein the 'unique terminal equipment' is used as a unique login account and password input equipment;
step two: starting a user 'unique terminal device' to connect with an intelligent device or a computer, and carrying out account verification and password input through a network opening platform; each gesture input corresponds to an ultralong background password segment (for example, 81 bits), the total stroke number is 26, the input corresponds to the ultralong password of 26 x 81 bits, and the computer recognizes and encrypts and transmits the ultralong background password of 2106 bits. kmlE $poxx > k-! y1U% rYIX $EE7$h17UpMEbAe#GfJc9jh≡mVpfMM9S6p5E3j@YeZ $ -! The following is carried out s. LoWC5ua9SKA & first gesture input in color order: kmlE $poxx > k-! y1U% rYIX $EE7$h17UpMEbAe#GfJc9jh≡mVpfMM9S6p5E3j@YeZ $ -! The following is carried out s.LoWC 5ua9SKA & second gesture input: ij51sEvY63AwCIWPVQ8NVSg9P$hRRcT$2sqDusX% gMr-! xls2jLbe#sHXeBaK% KsOHC RX revedU 0r93B third gesture input: tzL05HB & RRm2V9 IN. QycS3KLrjBPukNvkl@tdBBBJT810. Sup.5 Itm f0 EjKD2422 PZgq 5BF37TQoKYDs34m fourth gesture input: o9scRrH5iy582U6 qXzc-! g21N & sodBqJwKON6oC2BJqSMjTjn3SLXtJry 09-! J $ tv5GCDg A8HsT EzVzB-! Fifth gesture input: sp% Sj 3OymLAy@r3ssNUEp3xqby5jNYrz% SnVO1 aftisKQ#UW2xp4N28$uackbwjjcm 4k13thpravos sixth gesture input: 6 jifn9 qphzvxpk1#btixaskojrgaa eojek3t7 hawtob@fxlrsaitmhsl4$pnb1xbq$orxi8j5xxi@n and so on … … (the surface distinguishing designs of the present facade can take the forms of, but are not limited to, color, pattern, shape, shading, stereo, etc.);
step three: setting a password according to a custom password design rule, and converting the password into a multi-layer packet by a background through prompting operation of a platform and a display screen;
step four: converting each custom grouping into a custom gesture password, and inputting the custom gesture password by opening software or using unique terminal equipment when a user needs to log in;
step five: the user-defined gesture password logic is stored and identified and converted by the unique equipment of the user, and the computer and the platform only identify and encrypt and store the background password and encrypt and transmit by using the hash value and salt;
step six: the user selects a password ciphertext to disguise and encrypt the stored user data information in the platform by himself, the password ciphertext is unique knowledge of the user, the platform and the computer network only record and transmit disguised information, and the user performs conversion extraction through a unique terminal device; the unique terminal device forward and backward converts the true information and the camouflage information through the password ciphertext; in the conversion of "password ciphertext" into "dummy information", for example, lPjJTaQGwPR430L8Tr71 in which the important information source is "real information", the password ciphertext is: tomas- > 12345-;
the "real information" is automatically converted into: lPjJ [ T ] QGwPR430L8Tr71;
the final generated "pseudo information" is: lPjJ [ 1 ] QGwPR430L8Tr71 [ 4 ];
step seven: the platform, the computer network and various intelligent devices recognize the user-defined password design rule mother table and the gesture form of the user without touching the password in the process of the unique terminal device; after the account password identification is completed, the information hash value is salted, encrypted and transmitted, and login is completed;
in order to facilitate the use of users, the custom password design rule in the third step comprises a stereoscopic array dotted line gesture password;
considering any system, background information is more and more important, and as a network platform, storing real information of a user is quite unsafe, and in order to effectively prevent the background programmer from pinking or hacking, a method of 'unique knowledge' of the user, namely 'password ciphertext', is needed to enable the user information to be fully protected, so that the security level of the user is improved. In the fourth step, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' can be stored in the user 'unique terminal equipment', and only contact and encrypt the ciphertext after conversion in the process of identifying the platform, the computer network and various types of equipment;
in order to improve the safety, the user-designed 'custom gesture password' and related 'custom password design rule mother table' and 'password ciphertext' in the fourth step can be stored in the user 'unique terminal equipment', and only contact and encrypt and transmit the transformed ciphertext in the process of identifying the platform, the computer network and various types of equipment;
in order to improve safety, in the fifth step, a user manually touches a key position on the surface of a display screen of a computer or other intelligent equipment with a finger to finish input of a custom gesture password, or the user stores the custom gesture password in a unique terminal device and converts the custom gesture password into a background password to be input to the computer through the unique terminal device.
The password includes a common 70 character graphic, and the case examples have temporarily left unused other special characters, multinational languages, ancient languages, and artificial special characters. ABCDEFGHIJKLMNOPRSTUVWXYZabcdefghijklnonopqrstuvwxyz 0123456789-! @ # $ percent pattern and &.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (4)

1. The cryptography field man-machine interaction application method based on the contact connection control instruction is characterized by comprising the following steps:
step one: logging in an initial platform through a network, registering an account according to rules, and acquiring unique terminal equipment as an account, wherein the unique terminal equipment is used as a unique login account, and the unique terminal equipment is used as a password input device;
step two: starting a unique terminal device of a user to connect with an intelligent device or a computer, and opening an initial platform through a network to perform account verification and password interaction;
step three: setting passwords according to the custom password design rules, and converting and compiling the multi-layer grouping of the passwords by a local background of the unique terminal equipment or a cloud background of the equipment through the prompt operation of the initial platform and the display screen of the unique terminal equipment;
step four: the background passwords are converted into custom gesture passwords through each custom grouping, when a user needs to log in, the user directly inputs the custom gesture passwords by opening software or locally inputting the custom gesture passwords by using unique terminal equipment, and the actual input is the background passwords;
step five: the user-defined gesture cryptograph logic is stored and identified and converted by a user unique device local or cloud background, and a computer and an initial or other platform only identify and encrypt and store background passwords and encrypt and transmit the background passwords by using a hash value and an initial platform pseudo-random salt value;
step six: the user selects the password ciphertext by himself to disguise and encrypt the stored user data information in the initial platform, the password ciphertext is unique knowledge of the user, the computer networks of the initial platform and other platforms only record and transmit disguised information, and the user performs conversion extraction through the unique terminal equipment; the unique terminal equipment positively and reversely converts the real information and the camouflage information in a mode of changing the real information salt value and the false information salt value through password ciphertext interference; the true information salt value is a pseudo-random salt value which is not entangled by the password ciphertext, and the pseudo-information salt value is a true random salt value after the password ciphertext is entangled;
step seven: the method comprises the steps that a background password custom cryptogram design rule mother table and a user gesture form are not contacted in the process of identifying unique terminal equipment by an initial platform or other platforms, computer networks and various intelligent equipment; and after the account password identification is completed, encrypting and transmitting the information through a hash function in combination with a true random salt value after password ciphertext scrambling, and completing login.
2. The touch-and-line control instruction-based cryptographic domain human-computer interaction application method of claim 1, wherein the custom passcode design rules include custom passcode, custom parent logic passcode, planar array passcode, and stereoscopic array passcode.
3. The cryptographic field man-machine interaction application method based on contact connection control instructions according to claim 1, wherein custom gesture passwords designed by a user and related custom password design rule mother table and password ciphertext can be stored in unique terminal equipment of the user, and only contact and encrypt and transmit the transformed ciphertext in the process of identifying platforms, computer networks and various intelligent devices.
4. The touch-point-connection-control-instruction-based man-machine interaction application method in the cryptography field, according to claim 1, is characterized in that a user manually touches a key position on the surface of a display screen of a computer or other intelligent equipment with a finger to finish input of a custom gesture password, or the user stores the custom gesture password in a unique terminal equipment and converts the custom gesture password into a background password through the unique terminal equipment to input the custom gesture password to the computer.
CN201810621092.3A 2018-06-15 2018-06-15 Contact-connection-control-instruction-based man-machine interaction application method in cryptography field Active CN110611562B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810621092.3A CN110611562B (en) 2018-06-15 2018-06-15 Contact-connection-control-instruction-based man-machine interaction application method in cryptography field

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810621092.3A CN110611562B (en) 2018-06-15 2018-06-15 Contact-connection-control-instruction-based man-machine interaction application method in cryptography field

Publications (2)

Publication Number Publication Date
CN110611562A CN110611562A (en) 2019-12-24
CN110611562B true CN110611562B (en) 2023-05-26

Family

ID=68888358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810621092.3A Active CN110611562B (en) 2018-06-15 2018-06-15 Contact-connection-control-instruction-based man-machine interaction application method in cryptography field

Country Status (1)

Country Link
CN (1) CN110611562B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236440A (en) * 2010-04-22 2011-11-09 联芯科技有限公司 Password input method and mobile terminal using same
CN104700007A (en) * 2015-03-18 2015-06-10 詹万泉 Gesture impression password setting and application method
CN105743893A (en) * 2016-01-29 2016-07-06 大连秘阵科技有限公司 One time dynamic positioning authentication method and system and one time dynamic password modifying method
CN107231330A (en) * 2016-03-23 2017-10-03 阿里巴巴集团控股有限公司 A kind of password determination, login validation method and equipment

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100287382A1 (en) * 2009-05-07 2010-11-11 John Charles Gyorffy Two-factor graphical password for text password and encryption key generation
US9634833B2 (en) * 2014-06-20 2017-04-25 Google Inc. Gesture-based password entry to unlock an encrypted device
CN104766002B (en) * 2015-03-04 2017-03-08 努比亚技术有限公司 A kind of unlocking method and device
CN204759393U (en) * 2015-06-26 2015-11-11 中国工商银行股份有限公司 Gesture password input device and system
CN104978144A (en) * 2015-06-26 2015-10-14 中国工商银行股份有限公司 Gesture password input device and system and method for transaction based on system
CN105184568B (en) * 2015-08-27 2019-05-24 北京智能果技术有限公司 Cipher-code input method, system, code keyboard equipment and terminal device
CN107276962B (en) * 2016-04-07 2023-04-07 北京得意音通技术有限责任公司 Dynamic password voice authentication system capable of combining any gesture
CN106790122A (en) * 2016-12-27 2017-05-31 努比亚技术有限公司 A kind of login method when terminal, server and access application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236440A (en) * 2010-04-22 2011-11-09 联芯科技有限公司 Password input method and mobile terminal using same
CN104700007A (en) * 2015-03-18 2015-06-10 詹万泉 Gesture impression password setting and application method
CN105743893A (en) * 2016-01-29 2016-07-06 大连秘阵科技有限公司 One time dynamic positioning authentication method and system and one time dynamic password modifying method
CN107231330A (en) * 2016-03-23 2017-10-03 阿里巴巴集团控股有限公司 A kind of password determination, login validation method and equipment

Also Published As

Publication number Publication date
CN110611562A (en) 2019-12-24

Similar Documents

Publication Publication Date Title
EP3319069B1 (en) Method for authenticating a user by means of a non-secure terminal
CN106789052B (en) Remote key issuing system based on quantum communication network and use method thereof
CN108234458A (en) Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN102419805A (en) Terminal equipment and method for encrypting user information
CN104134022A (en) Information hiding and protecting method based on image
CN110008745A (en) A kind of encryption method, computer equipment and computer storage medium
CN105184181A (en) File encryption method, file decryption method and file encryption device
CN102427459B (en) Offline authorization method based on Usbkeys
CN105450419A (en) Method, device and system
CN109165531B (en) AES mask method, electronic equipment and storage medium
CN103198247A (en) Computer safety protection method and computer safety protection system
CN105117658A (en) Password security management method and equipment based on fingerprint authentication
CN105426727B (en) Fingerprint decryption method and mobile terminal
JP2019505051A (en) Dynamic graphical password-based network registration method and system
CN107257283A (en) Fingerprint verification method based on quantum figure state
CN110611562B (en) Contact-connection-control-instruction-based man-machine interaction application method in cryptography field
CN105959116A (en) Password input system and method capable of realizing encrypted password input
WO2018082930A1 (en) Method for securely performing a sensitive operation using a non-secure terminal
CN104883341A (en) Application management device, terminal and application management method
CN102868521A (en) Method for enhancing secret key transmission of symmetrical secret key system
EP3319067B1 (en) Method for authenticating a user by means of a non-secure terminal
CN107070658B (en) Improved method of system encryption authentication mechanism
CN106789079A (en) Identity identifying method, disposal password electronic installation and system
CN106686015B (en) A kind of safe networking dynamic confirming method for smart machine
CN100546242C (en) A kind of generation of super code and authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant