CN112287332A - Password authentication system and method based on combination of graph and character - Google Patents

Password authentication system and method based on combination of graph and character Download PDF

Info

Publication number
CN112287332A
CN112287332A CN202010999622.5A CN202010999622A CN112287332A CN 112287332 A CN112287332 A CN 112287332A CN 202010999622 A CN202010999622 A CN 202010999622A CN 112287332 A CN112287332 A CN 112287332A
Authority
CN
China
Prior art keywords
password
grid
characters
character
graph
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010999622.5A
Other languages
Chinese (zh)
Inventor
郑自然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Normal University
Original Assignee
Shandong Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Normal University filed Critical Shandong Normal University
Priority to CN202010999622.5A priority Critical patent/CN112287332A/en
Publication of CN112287332A publication Critical patent/CN112287332A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention provides a password authentication system and method based on combination of graphs and characters, which comprises the steps of constructing a password grid, receiving and storing a user name input by a user, graphs input in the password grid and corresponding stroke sequences, and using the graphs and the corresponding stroke sequences as a graph password matched with the user name; receiving a login request of a user and a user name of the login request, outputting a password grid, and configuring characters in each grid of the password grid; and receiving a character combination input by a user according to the shape and stroke sequence of the graphic password set by the user, judging whether the character combination is correct, if so, successfully authenticating, and otherwise, unsuccessfully authenticating. The invention utilizes the password authentication mode of combining the graph and the character, has larger password space, also has strong resistance to brute force cracking, and is beneficial to improving the safety.

Description

Password authentication system and method based on combination of graph and character
Technical Field
The invention belongs to the technical field of password authentication, and particularly relates to a password authentication system and method based on combination of graphs and characters.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
At present, there are many password authentication methods, which ensure the security of information authentication to a certain extent, but according to the knowledge of the inventor, most of the current password authentication is based on text or graphic authentication, for example, setting a text password or setting a gesture and other graphic authentication; the password authentication scheme based on the characters and the graphs is easy to be attacked by shoulder surfing and hidden cameras, and has certain potential safety hazard.
The existing authentication technology tries to increase the security by adding combinations of different symbols or longer passwords, but passwords which are too complicated or have larger lengths are not suitable for memorizing, are easy to forget, need to be verified or registered again, waste the time of a user, and have poor experience.
Disclosure of Invention
The invention provides a password authentication system and method based on combination of graphs and characters in order to solve the problems.
According to some embodiments, the invention adopts the following technical scheme:
a password authentication method based on combination of graphics and characters comprises the following steps:
constructing a password grid, receiving and storing a user name input by a user, a graph input in the password grid and a corresponding stroke sequence, and taking the graph as a graph password matched with the user name;
receiving a login request of a user and a user name of the login request, outputting a password grid, and configuring characters in each grid of the password grid;
and receiving a character combination input by a user according to the shape and stroke sequence of the graphic password set by the user, judging whether the character combination is correct, if so, successfully authenticating, and otherwise, unsuccessfully authenticating.
As an alternative embodiment, when characters are randomly arranged in each grid of the password grid, the characters arranged in each grid are any one of numbers, letters and characters.
As an alternative embodiment, the character type of each grid configuration may be the same or different.
As an alternative embodiment, when the characters are randomly arranged in each grid of the password grid, the number of the characters arranged in each grid may be the same or different.
As an alternative embodiment, each configured character within the cryptographic grid is randomly generated.
As an alternative embodiment, the specific process of determining whether the character is correct includes: and according to the graph initially set by the user, sequentially determining the characters in the graph, forming character groups according to the stroke sequence, judging whether the character groups are consistent with the input character groups, and if so, judging that the character groups are correct.
A password authentication system based on a combination of graphics and characters, comprising:
the password configuration module is configured to configure a password grid, receive and store a user name input by a user and a graph input in the password grid, and use the graph as a graph password matched with the user name;
the input module is configured to receive a login request of a user and a user name of the login request, and receive characters input by the user according to the shape and stroke sequence of a set graphic password;
a character configuration module configured to randomly configure characters in each cell of the password grid;
and the authentication module is configured to judge whether the character is correct or not, if so, the authentication is successful, and otherwise, the authentication is unsuccessful.
As an alternative embodiment, the input module comprises a touch screen.
As an alternative embodiment, the system further comprises an output module for displaying the authentication interface, the graphical password and the graphical password configured with characters.
A computer readable storage medium having stored therein a plurality of instructions adapted to be loaded by a processor of a terminal device and to perform the steps of a method for password authentication based on a combination of graphics and characters.
A terminal device comprising a processor and a computer readable storage medium, the processor being configured to implement instructions; the computer readable storage medium is used for storing a plurality of instructions which are suitable for being loaded by a processor and executing the steps of the password authentication method based on the combination of the graph and the characters.
Compared with the prior art, the invention has the beneficial effects that:
the invention uses the strokes in the grid area as the initial password, the initial password is easy to memorize based on the graph, and has high degree of freedom, the user can select any password suitable for the user as the initial graph, the addition of the stroke sequence further enlarges the space of the password, and the randomness is also high.
When the password is logged in, the password login method utilizes the characters to log in, simultaneously combines the graphs and the characters, and the characters of each grid are randomly configured, so that the password space is large, even if an attacker sees the password, the attacker cannot simply deduce the form of the password, and the password login method also has strong resistance to brute force cracking.
The invention has generality and wide applicability, can be used for password authentication login of any equipment, and is easy to realize.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
FIG. 1 is a password setting interface according to the first embodiment;
FIG. 2 is a login interface according to the first embodiment;
FIG. 3 is a diagram illustrating a mapping process of a password according to the first embodiment;
FIG. 4 is a schematic diagram of text input based on graphics and stroke order according to the first embodiment;
FIGS. 5(a) - (d) are examples of possible graphs;
FIGS. 6(a) - (d) are diagrams of several possible stroke sequences for the same graph;
FIGS. 7(a) - (b) are examples of variations of the login interface of the second embodiment;
FIG. 8 is a diagram illustrating a login interface according to an embodiment;
FIGS. 9(a) - (d) are several possible representations of the letter N in a grid;
fig. 10(a) - (d) illustrate possible graphical strokes corresponding to the character string 1100110110011.
The specific implementation mode is as follows:
the invention is further described with reference to the following figures and examples.
It is to be understood that the following detailed description is exemplary and is intended to provide further explanation of the invention as claimed. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
As described in the background, both graphical and textual passwords are vulnerable to shoulder surfing and hidden camera and direct attack. For example, the hidden camera is used for recording the whole process of password input, so that the password can be easily cracked. In order to solve the above problems, a password authentication scheme combining a graphic and a character is proposed. The strokes in the grid area are used as initial passwords, so that the passwords are easy to remember, and meanwhile, a character-based login process is used, and the process supports keyboard or other input modes; the anti-peeping device has extremely strong resistance to shoulder surfing and hidden camera attack. The password has a larger password space and also has strong resistance to brute force cracking. The password authentication method has generality, can be used for password authentication login of any equipment, and is easy to implement.
The following examples are given by way of illustration.
Example one
A password authentication method combining graphics and characters comprises the following two steps: the first step is as follows: and (4) creating a graphic password. The second step is that: logging in based on graphical and text passwords. A 5 by 5 grid area is used as an example for illustration. Fig. 1 and 2 show a possible interface implementation of the two-step system.
The first step is the creation of an initial password. Here the system requires the user to enter a username and initial password. The interface is shown in fig. 1.
The initial password is a stroke graph based on the grid area. The user first mentally draws a graphic and completes a stroke of the graphic (in the following description we use "graphic and stroke" to describe). After the user selects the selected images, the images selected in the mind are sequentially clicked in the grid area according to the stroke sequence in the interface. The clicking here may be implemented using a mouse, touch screen, or other interactive technology. The system will record the grids clicked by the user in order during the input process. When a grid in the interface is selected, the system may prompt using a different color. Fig. 3 illustrates an example of one such process. The example shows a schematic diagram in which the user thinks of the order of the graphics and strokes of the letter N, then maps into a grid, and finally clicks out in turn in the grid area of the interface.
When the user inputs the password, the system will correspond the user name and the grid and sequence clicked by the user in a database or other storage media for subsequent login.
The second step is a login step based on a graphic and a text password. The size of the interface grid during login is the same as that of the first step, but the grid at the moment is filled with numbers. This number is a number randomly assigned by the system, and 0 and 1 are used here as examples. The landing interface is shown in fig. 2. When logging in, the user firstly inputs the user name of the user. And then, inputting the corresponding characters in the current grid based on the self-memorized graphs and stroke sequences in the password input box by using a keyboard or other input modes.
Assume that the user again uses the previous example of the letter N of fig. 3, and the digits of the login interface use the example of fig. 2. At this time, the user inputs 1100110110011 based on his own memorized graphics in combination with the numbers in fig. 2. This process is illustrated in fig. 4 (the dashed lines indicate the user's input sequence and are not displayed in the interface). Although the character string is long, the input process is still convenient because only two letters are used here. If the input is wrong or other login errors occur, the system randomly generates a new interface again each time for the user to input again.
When the input is completed, the system compares the character string in the grid with the character string input by the user using the graph and stroke order initially set by the user, and compares the character string with the user name. When all the character strings are matched, the login is passed.
Of course, the initial password pattern has a high degree of freedom in selection, and the user can select any password suitable for himself as the initial pattern. In theory, any element in a certain lattice, whether graphical or otherwise, may be used as the graph of the initial password. For example, in other embodiments, fig. 5(a) - (d) are several possible graphical examples.
The addition of the stroke sequence further increases the space of the password, and the randomness is also higher. Even for the same graphic, such as a triangle, the user can express it by using different stroke orders according to his/her preference. FIGS. 6(a) - (d) illustrate different stroke sequences for the triangle of FIG. 5 (a). Note that fig. 6(a), (b) use a single start point and end point, i.e., one stroke, to draw the graph. And fig. 6(c) and (d) use two strokes, i.e. two strokes to draw the figure. Note that the user may even select a certain grid repeatedly as his password due to the sequence of strokes.
Example two
The difference from the embodiment one is that the login interface can be filled with different characters or the login grid can be set using two characters for each grid. Fig. 7(a) and 7(b) show two possible implementations. Where (a) still uses 0 and 1, but some grids use double characters. This can further increase the space for the password. FIG. 7(b) is populated using characters a and s as character sets. The selection of the character set is not sensitive, but the use of more than 2 characters is not recommended for security reasons. Assuming that the characters of each lattice are different, an attacker can reverse the graph and stroke order through the character string, and then lose the function of the scheme. The use of double characters is a safer option.
EXAMPLE III
The difference from the above embodiment is that: other implementations may be used for environments without more complex keys. One possible implementation is shown in fig. 8. The figure assumes the use of hardware-based ID identification, such as a bank card, and thus does not require entry of a user ID, only a password.
The security of the above embodiments is analyzed, where it is assumed that an attacker uses brute force to break, and the corresponding cipher spaces are analyzed in turn.
First is the password space of the initial graph:
because the password cracking mode is very wide, any password scheme cannot guarantee the absolute security of all links, and therefore only an attacker is supposed to know that the user selects a graph with a certain meaning. In fact, the user may select a graphic that has no meaning as the initial graphic to increase security. Even though the process of mapping the letter N to a graphic varies considerably, it is assumed by an attacker that the user may select the capital letter N as the graphic. As shown in fig. 9(a) - (d), all of the following figures can be represented as N. However, such an expression space can hardly be completely expressed according to the user's understanding, and thus it is difficult for an attacker to determine the graph actually used by the user by knowing only the graph concept of the user.
Further, assuming that the actual grid pattern is already known to the attacker, the number of sequential spaces of strokes is a factorial of the number of lattices for the same pattern according to FIG. 6 described above. Assuming that V is used to represent the set of all the lattices occupied by the user-selected graph and | V | is used to represent the number of lattices, then the number of strokes is a factorial of | V |. If the number of lattices occupied by the graph is 12, as in the example of FIG. 6, the stroke space, i.e., the possible stroke order, is 479001600. If brute force is used, the above number of strokes need to be tried. If the grid area is enlarged while the user selects more graphical grids, the space is larger. This further increases the number of lattices if the user is allowed to use repeated strokes, i.e. to set a lattice of arbitrary length in the lattice.
For the resistance to shoulder surfing and hidden camera attack, it is assumed that the attacker records the user's login process in the whole course. First, since the user does not directly click on the grid during login, the attacker does not directly know the graphical and stroke information, but knows the character string entered by the user. If the initial graph and stroke need to be cracked, an attacker needs to reversely deduce the graph and stroke information through the character string. From a string, its graph and stroke space can be calculated as follows. Assume that the number of 1 s in the user string is s1 and the number of 0 s 2. Assume that the number of 1 s in the interface grid is f1 and the number of 0 s is f 2. Since a character in a string may be any one of the same characters in the grid, the stroke space is f1 for a character of length | s |s1f2s2. Assume the example of fig. 2 above. The number of 1 is 12 f1, and the number of 0 is 13 f 2. The user's string is 1100110110011. Wherein the number of 1 is 8 in s1, and the number of 0 is 5 in s 2. The number of possible graphic strokes is 12 according to the formula 8135About 1.6X 1014. Fig. 10(a) - (d) illustrate 4 possible graphical strokes corresponding to 1100110110011.
In summary, the embodiments described above are highly resistant to shoulder surfing and hidden camera attacks. It should be noted that the initial password setting step does not have the same security as the login step, and therefore a relatively secure environment is required in the setting process. And the security of this process can generally be guaranteed.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Although the embodiments of the present invention have been described with reference to the accompanying drawings, it is not intended to limit the scope of the present invention, and it should be understood by those skilled in the art that various modifications and variations can be made without inventive efforts by those skilled in the art based on the technical solution of the present invention.

Claims (10)

1. A password authentication method based on combination of graphics and characters is characterized in that: the method comprises the following steps:
constructing a password grid, receiving and storing a user name input by a user, a graph input in the password grid and a corresponding stroke sequence, and taking the graph as a graph password matched with the user name;
receiving a login request of a user and a user name of the login request, outputting a password grid, and configuring characters in each grid of the password grid;
and receiving a character combination input by a user according to the shape and stroke sequence of the graphic password set by the user, judging whether the character combination is correct, if so, successfully authenticating, and otherwise, unsuccessfully authenticating.
2. The password authentication method based on the combination of the graph and the character as claimed in claim 1, wherein: when characters are randomly configured in each grid of the password grid, characters configured in each grid are any one of numbers, letters and characters.
3. The password authentication method based on the combination of the graph and the character as claimed in claim 2, wherein: the character types of each grid configuration may be the same or different.
4. The password authentication method based on the combination of the graph and the character as claimed in claim 1, wherein: when characters are randomly configured in each grid of the password grid, the number of the characters configured in each grid is the same;
or, when the characters are randomly configured in each grid of the password grid, the number of the characters configured in each grid is different.
5. The password authentication method based on the combination of the graph and the character as claimed in claim 1, wherein: each configured character within the cryptographic grid is randomly generated.
6. The password authentication method based on the combination of the graph and the character as claimed in claim 1, wherein: the specific process for judging whether the character is correct comprises the following steps: and according to the graph initially set by the user, sequentially determining the characters in the graph, forming character groups according to the stroke sequence, judging whether the character groups are consistent with the input character groups, and if so, judging that the character groups are correct.
7. A password authentication system based on combination of graphics and characters is characterized in that: the method comprises the following steps:
the password configuration module is configured to configure a password grid, receive and store a user name input by a user and a graph input in the password grid, and use the graph as a graph password matched with the user name;
the input module is configured to receive a login request of a user and a user name of the login request, and receive characters input by the user according to the shape and stroke sequence of a set graphic password;
a character configuration module configured to randomly configure characters in each cell of the password grid;
and the authentication module is configured to judge whether the character is correct or not, if so, the authentication is successful, and otherwise, the authentication is unsuccessful.
8. The system of claim 7, wherein: the input module comprises a touch screen;
or, the system also comprises an output module which is used for displaying the authentication interface, the graphical password and the graphical password configured with characters.
9. A computer-readable storage medium characterized by: in which a plurality of instructions are stored, said instructions being adapted to be loaded by a processor of a terminal device and to carry out the steps of a method for password authentication based on a combination of figures and characters as claimed in any one of claims 1 to 6.
10. A terminal device is characterized in that: the system comprises a processor and a computer readable storage medium, wherein the processor is used for realizing instructions; the computer readable storage medium is used for storing a plurality of instructions adapted to be loaded by a processor and for performing the steps of a method for password authentication based on a combination of graphics and characters as claimed in any one of claims 1 to 6.
CN202010999622.5A 2020-09-22 2020-09-22 Password authentication system and method based on combination of graph and character Pending CN112287332A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010999622.5A CN112287332A (en) 2020-09-22 2020-09-22 Password authentication system and method based on combination of graph and character

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010999622.5A CN112287332A (en) 2020-09-22 2020-09-22 Password authentication system and method based on combination of graph and character

Publications (1)

Publication Number Publication Date
CN112287332A true CN112287332A (en) 2021-01-29

Family

ID=74422224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010999622.5A Pending CN112287332A (en) 2020-09-22 2020-09-22 Password authentication system and method based on combination of graph and character

Country Status (1)

Country Link
CN (1) CN112287332A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1763682A (en) * 2004-10-20 2006-04-26 乐金电子(沈阳)有限公司 Log on apparatus using icon user name or password and method thereof
CN101772772A (en) * 2007-08-13 2010-07-07 索尼爱立信移动通讯有限公司 Graphical image authentication
CN102148826A (en) * 2011-02-11 2011-08-10 王颢 Method for dynamically setting password by setting graphic per se in grid digital array
CN104573447A (en) * 2013-10-16 2015-04-29 中国移动通信集团公司 Method and device for controlling terminal equipment
CN104794392A (en) * 2015-05-05 2015-07-22 福州瑞芯微电子有限公司 Equipment unlocking method and device based on grids
CN107066870A (en) * 2017-04-07 2017-08-18 乐山师范学院 A kind of gesture password unlocking method of intelligent touch-screen equipment
CN108959898A (en) * 2018-07-02 2018-12-07 兰州交通大学 A kind of figure unlocking pin authentication method based on figure computation system
CN108985042A (en) * 2018-07-02 2018-12-11 兰州交通大学 A kind of Android graphics unlocking method based on figure addend word
CN109063454A (en) * 2018-07-02 2018-12-21 兰州交通大学 A kind of multi stroke shapes password suggested design and its Verification System
US20200065468A1 (en) * 2018-08-24 2020-02-27 Kyocera Document Solutions Inc. Password authentication device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1763682A (en) * 2004-10-20 2006-04-26 乐金电子(沈阳)有限公司 Log on apparatus using icon user name or password and method thereof
CN101772772A (en) * 2007-08-13 2010-07-07 索尼爱立信移动通讯有限公司 Graphical image authentication
CN102148826A (en) * 2011-02-11 2011-08-10 王颢 Method for dynamically setting password by setting graphic per se in grid digital array
CN104573447A (en) * 2013-10-16 2015-04-29 中国移动通信集团公司 Method and device for controlling terminal equipment
CN104794392A (en) * 2015-05-05 2015-07-22 福州瑞芯微电子有限公司 Equipment unlocking method and device based on grids
CN107066870A (en) * 2017-04-07 2017-08-18 乐山师范学院 A kind of gesture password unlocking method of intelligent touch-screen equipment
CN108959898A (en) * 2018-07-02 2018-12-07 兰州交通大学 A kind of figure unlocking pin authentication method based on figure computation system
CN108985042A (en) * 2018-07-02 2018-12-11 兰州交通大学 A kind of Android graphics unlocking method based on figure addend word
CN109063454A (en) * 2018-07-02 2018-12-21 兰州交通大学 A kind of multi stroke shapes password suggested design and its Verification System
US20200065468A1 (en) * 2018-08-24 2020-02-27 Kyocera Document Solutions Inc. Password authentication device

Similar Documents

Publication Publication Date Title
US9117068B1 (en) Password protection using pattern
CA2689853C (en) Secure access by a user to a resource
TWI510954B (en) A method and a device for generating a secret value
US20150281215A1 (en) Method of Dynamically Adapting a Graphical Password Sequence by Executing Computer-Executable Instructions Stored On a Non-Transitory Computer-Readable Medium
CN106709382B (en) Keyboard display method and device
CN104657653B (en) The verification method and checking device of image authentication code
US20100199100A1 (en) Secure Access by a User to a Resource
Zheng et al. A stroke-based textual password authentication scheme
US9122852B2 (en) Password input system and method for inputting password
CN111143812B (en) Login authentication method based on graphics
EP2386973A1 (en) Methods, devices and computer program supports for password generation and verification
Nizamani et al. A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability
EP2966552A1 (en) Apparatus and method for providing feedback on input data
CN107808076B (en) Unlocking method of terminal equipment, terminal equipment and storage medium
CN107231330B (en) Password determination and login verification method and device
TW201712204A (en) Input authentication method, input authentication system and lock with input authentication system
CN112287332A (en) Password authentication system and method based on combination of graph and character
CN113268780B (en) Identity authentication method and device, computer equipment and storage medium
CN115242450A (en) Password data input method, device and storage medium
US20120023549A1 (en) CAPTCHA AND reCAPTCHA WITH SINOGRAPHS
US20150172276A1 (en) Systems and Methods for User Authentication
US10586037B1 (en) Disambiguation of an alphanumeric security code to a user
CN107272920B (en) Method and device for changing corresponding relation between keys and characters
Cain et al. RSVP a temporal method for graphical authentication
Vaz et al. Authentication technique for security using ensemble graphical password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210129

RJ01 Rejection of invention patent application after publication