CN112650996A - Password authentication method and password authentication device - Google Patents

Password authentication method and password authentication device Download PDF

Info

Publication number
CN112650996A
CN112650996A CN202011197721.8A CN202011197721A CN112650996A CN 112650996 A CN112650996 A CN 112650996A CN 202011197721 A CN202011197721 A CN 202011197721A CN 112650996 A CN112650996 A CN 112650996A
Authority
CN
China
Prior art keywords
sequence
password
input
character
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011197721.8A
Other languages
Chinese (zh)
Inventor
邓元策
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cienet Technologies (beijing) Co ltd
Original Assignee
Cienet Technologies (beijing) Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cienet Technologies (beijing) Co ltd filed Critical Cienet Technologies (beijing) Co ltd
Priority to CN202011197721.8A priority Critical patent/CN112650996A/en
Publication of CN112650996A publication Critical patent/CN112650996A/en
Priority to PCT/CN2021/133049 priority patent/WO2022089662A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Abstract

The invention discloses a password authentication method and a corresponding password authentication device. In the password authentication method, an input sequence input by a user is recorded firstly; and traversing the input sequence, and judging that all characters of the real password sequence are contained in the input sequence, so that the authentication is successful. The invention does not need to limit the user to input the sequence with the same length as the real password when in verification, and only needs to include the real password sequence in the sequence input by the user. Therefore, the length of the input sequence can be greatly increased, and the input sequence is difficult to be plagiarized by people; and each character position and the circular arrangement mode of the real password in the input sequence are difficult to be deduced by people, so that the decryption difficulty is greatly increased.

Description

Password authentication method and password authentication device
Technical Field
The invention relates to a password authentication method and a corresponding password authentication device, belonging to the technical field of data security.
Background
In daily life, cryptographic techniques are used in many places. In fact, cryptography is one of the core technologies for securing network space and informatization. It can be said that "there is no network security and no national security".
The harm caused by password leakage is very huge, for example, the password leakage of a bank card can cause money loss; the leakage of the password of the electronic door can cause the loss of valuables; the leakage of mobile phone passwords can cause personal privacy to be disclosed and the like. Especially, when the password is used in scenes such as bank counters and public places using mobile phones, the password is more easily leaked. In such public places, the video may be peeped or even hidden, so that the password is leaked and the loss is brought.
The reasons for password leakage are manifold. In summary, on one hand, part of people have weak consciousness for protecting the password, and do not pay attention to protecting the password from being pirated when inputting the password; on the other hand, the common password is too short (usually only 6-8 bits), is generally a fixed sequence and is easy to peep and reason.
Disclosure of Invention
In view of the deficiencies of the prior art, the primary technical problem to be solved by the present invention is to provide a password authentication method.
Another object of the present invention is to provide a password authentication device.
In order to achieve the purpose, the invention adopts the following technical scheme:
according to a first aspect of the embodiments of the present invention, there is provided a password authentication method, including the steps of:
recording an input sequence input by a user;
and traversing the input sequence, and judging that all characters of the real password sequence are contained in the input sequence, and then successfully authenticating.
Preferably, the step of traversing the input sequence and determining that the input sequence contains all characters of the real password sequence includes the following steps:
traversing each character of the input sequence, and extracting a subsequence with a preset length; the preset length is the length of a real password sequence;
comparing the real password sequence with each extracted subsequence until any extracted subsequence is the same as the real password sequence;
and judging that all characters of the input sequence contain the real password sequence.
Preferably, the step of traversing each character of the input sequence and extracting a subsequence of a predetermined length specifically includes the following steps:
setting the step length to be 1, and traversing each character of the input sequence from the first character of the input sequence;
and continuously extracting a subsequence with a preset length from each character in the input sequence according to the sequence of each character in the input sequence.
Preferably, the step of traversing the input sequence and determining that the input sequence contains all characters of the real password sequence includes the following steps:
acquiring a cyclic shift sequence of a real password sequence; the cyclic shift sequence is a character string which is formed by arranging characters according to the sequence of a real password sequence by taking the ith character of the real password sequence as an initial position after the first character and the last character of the real password sequence are connected;
and traversing each character of the input sequence, and judging whether the input sequence contains a cyclic shift sequence of the real password sequence.
Preferably, the step of traversing each character of the input sequence and determining whether the input sequence contains a cyclic shift sequence of the real password sequence further comprises:
and storing the circularly shifted sequences into a circularly linked list.
Preferably, the step of traversing each character of the input sequence and determining whether the input sequence contains a cyclic shift sequence of a true cipher sequence includes the following steps:
synchronously traversing each character of the input sequence and the circular linked list;
after judging that a certain character accessed by the input sequence is a certain character of the cyclic shift sequence, recording the address of the cyclic linked list at the moment as an original address;
sequentially judging that the characters of the next visit of the input sequence are equal to the characters of the next visit of the cyclic shift sequence;
until the address of the current circular linked list is equal to the original address.
Preferably, the obtaining of the cyclic shift sequence of the true cipher sequence specifically includes the following steps:
determining the start bit of the cyclic shift sequence by using a start bit extraction algorithm based on a preset value and the length of the real code sequence;
and decoding to obtain the cyclic shift sequence according to the start bit of the cyclic shift sequence and the real code sequence.
Preferably, the determining the start bit of the cyclic shift sequence by using a start bit extraction algorithm based on the preset value and the length of the true cipher sequence specifically includes the following steps:
determining the length of the real password sequence;
acquiring a preset value; the preset value is a natural number which is greater than zero and less than or equal to the length of the real password sequence;
carrying out remainder operation on the preset value and the length of the real password sequence to obtain a cycle value;
and taking the next bit of the cyclic value at the position corresponding to the real password sequence as the initial bit of the cyclic shift sequence.
Preferably, the decoding is performed according to the start bit of the cyclic shift sequence and the true cipher sequence to obtain the cyclic shift sequence, and specifically includes the following steps:
taking the character corresponding to the initial position of the cyclic shift sequence in the real password sequence as the first character of the cyclic shift sequence;
arranging the characters from the first character of the cyclic shift sequence to the last character of the real code sequence in sequence after the first character of the cyclic shift sequence according to the sequence in the real code sequence;
and sequentially arranging the characters at the head of the real password sequence to the characters at the head of the cyclic shift sequence in the real password sequence after the characters at the tail of the real password sequence according to the sequence in the real password sequence to obtain the cyclic shift sequence.
According to a second aspect of embodiments of the present invention, there is provided a password authentication apparatus, comprising a processor and a memory, the processor reading a computer program in the memory for performing the following operations:
recording an input sequence input by a user;
and traversing the input sequence, and judging that all characters of the real password sequence are contained in the input sequence, and then successfully authenticating.
By using the invention, when the password input by the user is authenticated, the user is not required to input the real password, and only all characters of the real password sequence are required to be included in the sequence input by the user. Therefore, on one hand, the sequence length input by the user can be greatly increased, and the sequence is difficult to be plagiarized by people; on the other hand, the positions of all the characters of the real password and the circular arrangement mode can be changed at any time and are difficult to be deduced by people, so that the decryption difficulty is greatly increased.
Drawings
Fig. 1 is a flowchart of a password authentication method according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating a password authentication process according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating an authentication cyclic shift sequence according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a password authentication apparatus according to an embodiment of the present invention.
Detailed Description
The technical contents of the invention are described in detail below with reference to the accompanying drawings and specific embodiments.
As shown in fig. 1, the password authentication method provided in the embodiment of the present invention includes the following steps:
101. recording an input sequence input by a user;
102. and traversing the input sequence, and judging that all characters of the real password sequence are contained in the input sequence, and then successfully authenticating.
In the embodiment of the invention, when the password input by the user is authenticated, the user is not required to input the real password, and only all characters of the real password sequence are required to be contained in the sequence input by the user. Thus, the input sequence of user input may take a variety of forms.
Assuming that the length of the real password sequence is N, the maximum length of the input sequence allowed to be input by the user is M when the password is authenticated. In the embodiment of the invention, M is beta N, and 2 is beta is less than or equal to 10. The larger the value of beta is, the better the peep-proof and anti-cracking performance of the password is, but the larger the calculation amount in the authentication flow is. The beta value is designed to be within a reasonable range before certification.
As shown in fig. 2, the password authentication process in the embodiment of the present invention is as follows:
step 1, when a user starts to input a sequence or a service subsystem needs to start a password authentication process, starting the password authentication process;
step 2, recording a sequence input by a user;
step 3, when the user presses a confirm key or the total length of the record reaches the maximum allowable M, ending the recording process;
step 4. verify the input sequence Sp aWhether it is valid; if sequence Sp aIf the data is invalid, entering step 5; if sequence Sp aIf yes, entering step 6;
step 5, prompting that the input is invalid, and returning to the step 2;
step 6, judging the input sequence Sp aWhether all characters of the real password sequence are contained in the code; if so, successfully authenticating and returning success information; if not, the authentication fails, and failure information is returned.
In one embodiment of the invention, it is assumed that the true crypto sequence is: 147258, respectively; input sequence by the user: 147258abcdef, 1a4b7c2d5e8f, abcdef258147, etc. can be successfully authenticated as long as they contain all characters "147258".
In step 102, traversing the input sequence, and determining that all characters of the real password sequence are included in the input sequence, specifically comprising the following steps:
1021a, traversing each character of the input sequence, and extracting a subsequence with a preset length; the preset length is the length of a real password sequence;
1022a, comparing the real password sequence with each extracted subsequence until any extracted subsequence is the same as the real password sequence;
and judging that all characters of the input sequence contain the real password sequence.
1021a, traversing each character of the input sequence, and extracting a subsequence of a predetermined length, specifically including:
10211a, setting step size to 1, and traversing each character of the input sequence from the first character of the input sequence;
and continuously extracting a subsequence with a preset length from each character in the input sequence according to the sequence of each character in the input sequence.
Suppose that the user sets the true password sequence to CN={c0,c1,c2,c3,....cN-2,cN-1),CNEach element of (A) is Cj,0≤j≤N-1。
The input sequence of the user input is
Figure BDA0002754477530000051
Wherein p is more than or equal to N and less than or equal to M.
From the input sequence Sp aThe procedure for searching for the true password sequence is as follows:
step 1, aiming at an input sequence Sp aStarting from index 0, step by step 1, traverse Sp a
Step 2, inputting sequence Sp aExtracting a subsequence with the length of N;
step 3, comparing the real password sequence with each extracted subsequence;
if the currently extracted subsequence is not identical to CNIf the two are the same, the authentication is successful;
if the currently extracted subsequence is not identical to CNIf not, judging whether the access to S is finishedp aThe last position of (1);
if so, authentication fails;
if not, adding 1 to the index, and returning to the step 2.
In one embodiment of the present invention,
Figure BDA0002754477530000052
the authentication can be successful.
In step 102, traversing the input sequence, and determining that all characters of the real password sequence are included in the input sequence specifically includes:
1021b, obtaining a cyclic shift sequence of the real password sequence; the cyclic shift sequence is a character string which is formed by arranging characters according to the sequence of a real password sequence by taking the ith character of the real password sequence as an initial position after the first character and the last character of the real password sequence are connected;
in one embodiment of the present invention, it is assumed that the user sets the true password sequence as:
CN={c0,c1,c2,c3,....cN-2,cN-1},CNeach element of (A) is Cj,0≤j≤N-1;
Then the corresponding cyclic shift sequence is:
CN,~i={ci,ci+1,...cN-1,cN,c0,c1,...,ci-2,ci-1},0≤i≤N-1
and the character of the initial bit of the cyclic shift sequence is the character corresponding to the (i + 1) th bit in the real password sequence.
If i is 2 and N is 6, the true cipher sequence is: c0,C1,C2,C3,C4,C5
The cyclic shift sequence is: c2,C3,C4,C5,C0,C1
The input sequence that can be successfully authenticated is as follows:
Figure BDA0002754477530000061
in one embodiment of the present invention, the start bit of the cyclic shift sequence may be randomly determined, and in another embodiment, the following method may be adopted for determining the start bit of the cyclic shift sequence, which is specifically described as follows:
10211b, determining the start bit of the cyclic shift sequence based on the preset value and the length of the real password sequence by using a start bit extraction algorithm;
102112b, determining the length of the real password sequence; it is assumed that the length of the true cipher sequence is 6;
102113b, acquiring a preset value; the preset value is a natural number which is greater than zero and less than or equal to the length of the real password sequence;
in one embodiment of the invention, the preset value is the number of days or weeks; assume that the current date is: number 8;
102114b, carrying out remainder operation on the preset value and the length of the real password sequence to obtain a cycle value;
carrying out remainder operation on the 8 and the 6 to obtain a remainder of 2, wherein the current cycle value is 2;
102115b, taking the next bit of the circulation value at the position corresponding to the real code sequence as the start bit of the circulation shift sequence;
thus, the start bit of the cyclic shift sequence is the third bit of the true cipher sequence;
for example, the true cipher sequence is: 672031, since the value of the cycle is 2, the cycle shift sequence is set circularly from the third bit of the real password sequence, and the following results are obtained: 203167.
10212b, decoding to obtain a cyclic shift sequence according to the start bit of the cyclic shift sequence and the true cipher sequence;
102121b, using the character corresponding to the start position of the cyclic shift sequence in the real code sequence as the first character of the cyclic shift sequence;
in the above example, the start bit of the cyclic shift sequence is the third bit of the real cipher sequence, and then "2" in "672031" is the first character of the cyclic shift sequence;
102122b, arranging the characters from the first character of the circular shift sequence to the last character of the real code sequence in sequence according to the sequence in the real code sequence;
in "672031," 031 "is arranged after" 2, "and" 2031 "is obtained by arranging" 031 "after" 2 "in the original order in the real cipher sequence;
102123b, arranging the characters at the first position of the real password sequence to the characters at the first position of the circular shift sequence in the real password sequence in sequence according to the sequence in the real password sequence to obtain the circular shift sequence;
in "672031," 67 "precedes" 2, "and" 67 "is arranged after the last bit" 1 "in the original order in the real cipher sequence, resulting in" 203167, "i.e., a circularly shifted sequence.
1022b, storing the cyclic shift sequence into a cyclic linked list;
1023b, traversing each character of the input sequence, and determining whether the input sequence contains a cyclic shift sequence of a real password sequence, specifically:
10231b, synchronously traversing each character of the input sequence and the circular linked list;
10232b, after a certain character accessed by the input sequence is judged to be a certain character of the cyclic shift sequence, recording the current address of the cyclic linked list as an original address;
10233b, sequentially judging that the character of the next visit of the input sequence is equal to the character of the next visit of the cyclic shift sequence;
10234b until the address of the current circular linked list equals the original address.
As shown in FIG. 3, a sequence S is input fromp aThe process of identifying the cyclic shift sequence is as follows:
step 1. input sequence S is traversed synchronouslyp aAnd each character of the circular linked list, take out Sp aThe character currently accessed;
step 2, judging and taking out Sp aWhether the currently accessed character is related to a loopThe characters currently accessed in the shift sequence are the same; if the two are the same, entering the step 3; if the indexes are different, the index is increased by 1, and the step 4 is entered;
step 3, recording the address of the current circular linked list as Address Start, and entering step 5;
step 4, judging whether the index value reaches Sp aThe last position of (1): if so, authentication fails; if not, returning to the step 1;
step 5, take out Sp aJudging whether the character of the next node is the same as the character of the next node of the circular linked list or not: if not, returning to the step 4; if the two are the same, entering step 6;
step 6, judging whether the address corresponding to the next node of the circular linked list is equal to the Address Start; if so, the authentication is successful; if not, returning to the step 5.
In some embodiments of the present invention, in order to increase the concealment of the real password in the input sequence, the real password sequence can be changed and embedded into the input sequence, so as to increase the difficulty of being memorized and cracked, thereby reducing the risk of password leakage.
The process of authenticating a password may be somewhat delayed due to the added complexity of the input sequence. Therefore, the embodiment of the invention provides a method for identifying a cyclic shift sequence, which stores the cyclic shift sequence into a cyclic linked list, and simultaneously moves a pointer and an index of the cyclic linked list to compare with each character of an input sequence, so that the time delay phenomenon in the authentication process can be effectively reduced.
In order to realize the password authentication method provided by the invention, the invention also provides a password authentication device. As shown in fig. 4, the password authentication apparatus includes a processor 42 and a memory 41, and may further include a communication component, a sensor component, a power component, a multimedia component, and an input/output interface according to actual needs. Memory, communication components, sensor components, power components, multimedia components, and input/output interfaces are coupled to the processor 42. The memory 41 may be a Static Random Access Memory (SRAM), an Electrically Erasable Programmable Read Only Memory (EEPROM), an Erasable Programmable Read Only Memory (EPROM), a Programmable Read Only Memory (PROM), a Read Only Memory (ROM), a magnetic memory, a flash memory, etc., and the processor may be a Central Processing Unit (CPU), a Graphic Processing Unit (GPU), a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), a Digital Signal Processing (DSP) chip, etc. Other communication components, sensor components, power components, multimedia components, etc. may be implemented using common components found in existing smartphones and are not specifically described herein.
On the other hand, in the password authentication apparatus shown in fig. 4, the processor 42 reads the computer program in the memory 41 for performing the following operations:
recording an input sequence input by a user;
and traversing the input sequence, and judging that all characters of the real password sequence are contained in the input sequence, and then successfully authenticating.
Compared with the prior art, the method and the device do not need to limit the user to input the sequence with the same length as the real password when in verification, and only need to include the real password sequence in the sequence input by the user. Alternatively, a cyclic shift sequence of the true cipher sequence may be included, i.e. the authentication may be passed. Therefore, the length of the input sequence can be greatly increased, and the input sequence is difficult to be plagiarized by people; and each character position and the circular arrangement mode of the real password in the input sequence are difficult to be deduced by people, so that the decryption difficulty is greatly increased.
The above describes the password authentication method and the password authentication apparatus provided in the embodiments of the present invention in detail. It will be apparent to those skilled in the art that any obvious modifications thereof can be made without departing from the spirit of the invention, which infringes the patent right of the invention and bears the corresponding legal responsibility.

Claims (10)

1. A password authentication method is characterized by comprising the following steps:
recording an input sequence input by a user;
and traversing the input sequence, and judging that all characters of the real password sequence are contained in the input sequence, and then successfully authenticating.
2. The password authentication method of claim 1, wherein traversing the input sequence and determining that the input sequence contains all characters of the true password sequence comprises the steps of:
traversing each character of the input sequence, and extracting a subsequence with a preset length; the preset length is the length of a real password sequence;
comparing the real password sequence with each extracted subsequence until any extracted subsequence is the same as the real password sequence;
and judging that all characters of the input sequence contain the real password sequence.
3. The password authentication method of claim 2, wherein traversing each character of the input sequence extracts a subsequence of predetermined length, comprising the steps of:
setting the step length to be 1, and traversing each character of the input sequence from the first character of the input sequence;
and continuously extracting a subsequence with a preset length from each character in the input sequence according to the sequence of each character in the input sequence.
4. The password authentication method of claim 1, wherein traversing the input sequence and determining that the input sequence contains all characters of the true password sequence comprises the steps of:
acquiring a cyclic shift sequence of a real password sequence; the cyclic shift sequence is a character string which is formed by arranging characters according to the sequence of a real password sequence by taking the ith character of the real password sequence as an initial position after the first character and the last character of the real password sequence are connected;
and traversing each character of the input sequence, and judging whether the input sequence contains a cyclic shift sequence of the real password sequence.
5. The method of claim 4, wherein traversing each character of the input sequence to determine whether the input sequence contains a cyclically shifted sequence of the true cipher sequence, further comprises:
and storing the circularly shifted sequences into a circularly linked list.
6. The password authentication method of claim 4, wherein traversing each character of the input sequence to determine whether the input sequence contains a circularly shifted sequence of the true password sequence, comprises the steps of:
synchronously traversing each character of the input sequence and the circular linked list;
after judging that a certain character accessed by the input sequence is a certain character of the cyclic shift sequence, recording the address of the cyclic linked list at the moment as an original address;
sequentially judging that the characters of the next visit of the input sequence are equal to the characters of the next visit of the cyclic shift sequence;
until the address of the current circular linked list is equal to the original address.
7. The password authentication method of claim 4, wherein the step of obtaining the cyclic shift sequence of the true password sequence comprises the steps of:
determining the start bit of the cyclic shift sequence by using a start bit extraction algorithm based on a preset value and the length of the real code sequence;
and decoding to obtain the cyclic shift sequence according to the start bit of the cyclic shift sequence and the real code sequence.
8. The password authentication method of claim 7, wherein the determining the start bit of the cyclic shift sequence using a start bit extraction algorithm based on the preset value and the length of the true password sequence comprises the steps of:
determining the length of the real password sequence;
acquiring a preset value; the preset value is a natural number which is greater than zero and less than or equal to the length of the real password sequence;
carrying out remainder operation on the preset value and the length of the real password sequence to obtain a cycle value;
and taking the next bit of the cyclic value at the position corresponding to the real password sequence as the initial bit of the cyclic shift sequence.
9. The password authentication method of claim 7, wherein the decoding obtains the cyclic shift sequence according to the start bit of the cyclic shift sequence and the true password sequence, and specifically comprises the following steps:
taking the character corresponding to the initial position of the cyclic shift sequence in the real password sequence as the first character of the cyclic shift sequence;
arranging the characters from the first character of the cyclic shift sequence to the last character of the real code sequence in sequence after the first character of the cyclic shift sequence according to the sequence in the real code sequence;
and sequentially arranging the characters at the head of the real password sequence to the characters at the head of the cyclic shift sequence in the real password sequence after the characters at the tail of the real password sequence according to the sequence in the real password sequence to obtain the cyclic shift sequence.
10. A cryptographic authentication apparatus comprising a processor and a memory, the processor reading a computer program in the memory for performing the following operations:
recording an input sequence input by a user;
and traversing the input sequence, and judging that all characters of the real password sequence are contained in the input sequence, and then successfully authenticating.
CN202011197721.8A 2020-10-30 2020-10-30 Password authentication method and password authentication device Pending CN112650996A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011197721.8A CN112650996A (en) 2020-10-30 2020-10-30 Password authentication method and password authentication device
PCT/CN2021/133049 WO2022089662A1 (en) 2020-10-30 2021-11-25 Password authentication method and password authentication device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011197721.8A CN112650996A (en) 2020-10-30 2020-10-30 Password authentication method and password authentication device

Publications (1)

Publication Number Publication Date
CN112650996A true CN112650996A (en) 2021-04-13

Family

ID=75346888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011197721.8A Pending CN112650996A (en) 2020-10-30 2020-10-30 Password authentication method and password authentication device

Country Status (2)

Country Link
CN (1) CN112650996A (en)
WO (1) WO2022089662A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022089662A1 (en) * 2020-10-30 2022-05-05 瞬联软件科技(北京)有限公司 Password authentication method and password authentication device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW451025B (en) * 2000-03-29 2001-08-21 Taiwan Jantek Electronics Inc Electronic password lock with operation mode of random number input and method thereof
CN1474317A (en) * 2003-07-15 2004-02-11 �̳��� Hidden cipher coding and identifying method
CN105095701A (en) * 2014-05-06 2015-11-25 黄熙镜 User authentication method and device and terminal equipment
US20160112199A1 (en) * 2014-10-15 2016-04-21 Vmware, Inc. Reducing the effectiveness of smudge and thermal imaging attacks

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112650996A (en) * 2020-10-30 2021-04-13 瞬联软件科技(北京)有限公司 Password authentication method and password authentication device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW451025B (en) * 2000-03-29 2001-08-21 Taiwan Jantek Electronics Inc Electronic password lock with operation mode of random number input and method thereof
CN1474317A (en) * 2003-07-15 2004-02-11 �̳��� Hidden cipher coding and identifying method
CN105095701A (en) * 2014-05-06 2015-11-25 黄熙镜 User authentication method and device and terminal equipment
US20160112199A1 (en) * 2014-10-15 2016-04-21 Vmware, Inc. Reducing the effectiveness of smudge and thermal imaging attacks

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022089662A1 (en) * 2020-10-30 2022-05-05 瞬联软件科技(北京)有限公司 Password authentication method and password authentication device

Also Published As

Publication number Publication date
WO2022089662A1 (en) 2022-05-05

Similar Documents

Publication Publication Date Title
US9892245B2 (en) Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device
US9740849B2 (en) Registration and authentication of computing devices using a digital skeleton key
US7793108B2 (en) Method of creating password schemes for devices
US7797549B2 (en) Secure method and system for biometric verification
US8561174B2 (en) Authorization method with hints to the authorization code
US9106422B2 (en) System and method for personalized security signature
US8984599B2 (en) Real time password generation apparatus and method
CN101145911A (en) Identity authentication method with privacy protection and password retrieval function
CN102456102A (en) Method for carrying out identity recertification on particular operation of information system by using Usb key technology
CN106100851B (en) Password management system, intelligent wristwatch and its cipher management method
TWI416922B (en) Authentication system utilizing image authentication code and method thereof
CN112650996A (en) Password authentication method and password authentication device
CN105590044A (en) Information authentication method and apparatus
KR101156102B1 (en) Memory card reader apparatus having security features and the method thereof
KR101511378B1 (en) Data processing device and data securing method for storage device using the same
KR100919486B1 (en) Method for aligning concealed fingerprint data using partial geometric hashing, Method for authenticating fingerprint data using partial geometric hashing, Apparatus and System thereof
CN112738082B (en) Secret information storage verification method and device based on cloud storage and storage medium
KR102196347B1 (en) System for electronic payment and method for operating the same
AU2021104146A4 (en) A Novel Approach to Unbreakable Authentication for Smart Phones with Flexible Combinations of Multiple Multimedia features, Screen Angles, Shaking Directions
GB2435533A (en) Integrated systems for simultaneous mutual authentication of a database and a user
CN116401645A (en) Computer system and identity recognition method and device for user of computer system
CN114117385A (en) Password generation method and device and computer readable storage medium
CN117390652A (en) Optical disc encryption method, system, medium and equipment based on double-factor authentication
JPS59154837A (en) Pass word verifying system
Kanwaria et al. USER AUTHENTICATION BY USING BIOMETRICS & GRAPHICAL PASSWORDS BY IMPROVISING CONVENTIONAL METHODS USING SHA-256 HASH ALGORITHM WITH RANDOMIZED KEY SUPPORT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination