CN113742695A - Password input system and password input method - Google Patents

Password input system and password input method Download PDF

Info

Publication number
CN113742695A
CN113742695A CN202111094707.XA CN202111094707A CN113742695A CN 113742695 A CN113742695 A CN 113742695A CN 202111094707 A CN202111094707 A CN 202111094707A CN 113742695 A CN113742695 A CN 113742695A
Authority
CN
China
Prior art keywords
finger
password input
information
user
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111094707.XA
Other languages
Chinese (zh)
Inventor
黄文强
徐晨敏
訾志博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202111094707.XA priority Critical patent/CN113742695A/en
Publication of CN113742695A publication Critical patent/CN113742695A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a password input system and a password input method, and relates to the technical field of information security and the financial field. This password input system includes host computer and password input device, password input device is used for connecting the host computer, password input device includes: the device comprises a first acquisition part, a second acquisition part and a controller. The first collecting part and the second collecting part are mirror images and are used for being worn on different hands of a user; the first acquisition part and the second acquisition part are used for acquiring the finger action information of the user; the controller is used for determining input information of the user according to the finger action information and sending the input information to the upper computer; and the upper computer determines the password input by the user according to the input information and a decryption rule preset by the user. By utilizing the scheme provided by the embodiment of the application, the safety during password input is improved, and the risk of password leakage is reduced.

Description

Password input system and password input method
Technical Field
The present application relates to the field of information security technologies, and in particular, to a password input system and a password input method.
Background
At present, when login operation or financial operation is performed on electronic equipment, a password is often required to be input for verification, a traditional password input mode generally utilizes a keyboard to input the password, the mode is easy to have the risk of password leakage, and the risk can be caused by personnel peeking, equipment shooting monitoring, input action presumption and the like.
A typical scenario is that when a lawbreaker handles business on a bank's self-service teller machine or handles business in front of a bank's counter, he or she may peep at a password by installing a camera in a hidden position, so that there is a risk of password leakage, which brings hidden risks to the information security and property security of the user.
Disclosure of Invention
In order to solve the problems in the prior art, the application provides a password input system and a password input method, so that the security during password input is improved, and the risk of password leakage is reduced.
In a first aspect, the present application provides a password input system, the password input system includes host computer and password input device, password input device is used for connecting the host computer, password input device includes: the device comprises a first acquisition part, a second acquisition part and a controller. The first collecting part and the second collecting part are mirror images of each other and are respectively worn on different hands of a user, for example, the first collecting part is worn on the left hand, and the second collecting part is worn on the right hand. The first collecting part and the second collecting part are used for collecting the action information of the fingers of the user. The controller is used for determining input information of the user according to the finger action information of the user, acquired by the first acquisition part and the second acquisition part, and sending the input information to the upper computer. And the upper computer determines the password input by the user according to the input information and the decryption rule preset by the user.
Utilize the password input system that this application provided, the user carries out the action of finger and realizes the input of password, and the host computer need be according to the decryption rule that the user set up in advance with user's input information conversion for the password, consequently even the action information of user's finger is snooped or is revealed, because can't know the decryption rule that the user set up in advance, consequently also can't explain user's password, consequently utilize the scheme of this application, the security when having promoted password input has reduced the risk that the password was revealed.
In one possible implementation, the collected information includes a sequence of finger movements of the user. The controller is specifically used for determining input information of a user according to the action sequence of the fingers and the corresponding identification of each finger on the password input device, wherein the input information is a first number string.
In a possible implementation manner, the first collecting part and the second collecting part specifically use the finger with the largest motion amplitude at the current time as the finger moving at the current time.
In a possible implementation manner, the first collecting part and the second collecting part specifically use a finger whose action time at the current time satisfies a preset time as the finger that is acting at the current time.
In one possible implementation manner, the decryption rule includes a correspondence relationship between each finger and the actually characterized number, or the decryption rule includes a correspondence relationship between an identifier corresponding to each finger on the password input device and the actually characterized number.
In a possible implementation manner, a fingerprint identification module is further disposed on at least one of the first collecting part or the second collecting part. The fingerprint identification module is used for acquiring fingerprint information of at least one finger of a user. The controller is also used for sending the fingerprint information to the upper computer and starting to acquire the acquired information when the upper computer passes the verification of the fingerprint information.
In one possible implementation, the first and second acquisition portions are glove-type wearable devices. Or the first collecting part and the second collecting part respectively comprise five collecting finger rings, and each collecting finger ring is used for being worn on one finger.
In a second aspect, the present application provides a password input device, which is connected to an upper computer. The password input device includes a first collecting part, a second collecting part, and a controller. Wherein, first collection portion and second collection portion are the mirror image each other, and wear respectively in the different hand of user. The first acquisition part and the second acquisition part are used for acquiring finger action information of a user. The controller is used for determining input information of a user according to the finger action information and sending the input information to the upper computer.
In one possible implementation, the collected information includes a sequence of finger movements of the user. The controller is specifically used for determining input information of a user according to the action sequence of the fingers and the corresponding identification of each finger on the password input device, wherein the input information is a first number string.
In a possible implementation manner, the first collecting part and the second collecting part specifically use the finger with the largest motion amplitude at the current time as the finger moving at the current time.
In a possible implementation manner, the first collecting part and the second collecting part specifically use a finger whose action time at the current time satisfies a preset time as the finger that is acting at the current time.
In a third aspect, the present application further provides a password input method, including the following steps:
presetting a decryption rule;
collecting finger action information of a user;
determining input information of a user according to the finger action information;
and determining the password input by the user according to the input information of the user and the decryption rule.
By utilizing the password input method provided by the application, the user performs the action of the finger to realize the input of the password, and the input information of the user needs to be converted into the password according to the decryption rule preset by the user, so that even if the action information of the finger of the user is snooped or leaked, the password of the user cannot be cracked because the decryption rule preset by the user cannot be known, and therefore, by utilizing the method provided by the application, the safety in password input is improved, and the risk of password leakage is reduced.
In a possible implementation manner, the finger motion information includes a finger motion sequence of the user, and the determining the input information of the user according to the finger motion information specifically includes:
and determining input information of the user according to the action sequence of the fingers and the corresponding identification of each finger on the password input equipment, wherein the input information is a first numeric string.
In a possible implementation manner, the collecting the finger motion information of the user specifically includes:
and taking the finger with the largest action amplitude at the current moment as the finger which acts at the current moment.
In a possible implementation manner, the collecting the finger motion information of the user specifically includes:
and taking the finger with the action times meeting the preset times at the current moment as the finger acting at the current moment.
In one possible implementation manner, the decryption rule includes a correspondence relationship between each finger and the actually characterized number, or the decryption rule includes a correspondence relationship between an identifier corresponding to each finger on the password input device and the actually characterized number.
Drawings
FIG. 1 is a schematic diagram of a password input method using a keyboard;
fig. 2 is a schematic diagram of a password input system according to an embodiment of the present application;
FIG. 3 is a schematic diagram of another password entry system provided in an embodiment of the present application;
FIG. 4 is a schematic diagram of another password entry system provided in an embodiment of the present application;
fig. 5 is a flowchart of a password input method according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solution more clearly understood by those skilled in the art, an application scenario of the technical solution of the present application is first described below.
Referring to fig. 1, the figure is a schematic diagram of inputting a password by using a keyboard;
in daily life, password security is related to information security and property security of users, a traditional password input mode depends on a keyboard, fig. 1 shows a scene when a password is input on a digital keyboard 01, the password input has a leakage risk, the risk may be caused by personnel peeking, equipment shooting monitoring, input action presumption and the like, and therefore the security is low.
Especially for financial institutions such as banks, the leakage of passwords brings great property safety risks to users, and along with the continuous progress of science and technology, the password leakage risk of the traditional password input mode is increased day by day, so that a more safe and reliable password input mode is needed.
In order to solve the above problems, embodiments of the present application provide a password input system and a password input method. Wherein, this input device includes host computer and password input device, and password input device is used for connecting the host computer, and password input device includes: the device comprises a first acquisition part, a second acquisition part and a controller. The first collecting part and the second collecting part are mirror images of each other and are respectively worn on different hands of a user. The first collecting part and the second collecting part are used for collecting the action information of the fingers of the user. The controller is used for determining input information of the user according to the finger action information of the user, acquired by the first acquisition part and the second acquisition part, and sending the input information to the upper computer. And the upper computer determines the password input by the user according to the input information and the decryption rule preset by the user. By utilizing the password input system, the user performs the action of the finger to realize the input of the password, the upper computer needs to convert the input information of the user into the password according to the preset decryption rule of the user, and therefore, even if the action information of the finger of the user is snooped or leaked, the password of the user cannot be cracked because the preset decryption rule of the user cannot be known, so that the safety during the password input is improved and the risk of password leakage is reduced.
In order to make the technical solutions more clearly understood by those skilled in the art, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
The terms "first", "second", and the like in the description of the present application are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated
In the present application, unless expressly stated or limited otherwise, the term "coupled" is to be construed broadly, e.g., "coupled" may be a fixed connection, a removable connection, or an integral part; may be directly connected or indirectly connected through an intermediate.
The embodiment of the present application provides a password input system, which is described in detail below with reference to the accompanying drawings.
Referring to fig. 2, the figure is a schematic diagram of a password input system according to an embodiment of the present application.
The password input system shown in the figure comprises a password input device and an upper computer 20, wherein the password input device is connected with the upper computer 20 and can perform data transmission with the upper computer 20.
The password input device specifically includes a first acquisition unit 12, a second acquisition unit 13, and a controller 11.
The first and second harvesting portions 12, 13 are mirror images of each other and are intended to be worn on different hands of a user. For example, the first collecting unit 12 shown in fig. 2 is worn on the left hand, and the second collecting unit 13 shown in fig. 3 is worn on the right hand.
The first collecting part 12 and the second collecting part 13 are used for collecting motion information of the fingers of the user.
In a possible implementation manner, the first collecting part 12 and the second collecting part 13 include a plurality of gyroscopes and acceleration sensors, so that the motion information of each finger of the user can be collected, for example, the motion direction, the trajectory, the motion acceleration, the motion speed, and the like of each finger are collected. Among them, the gyroscope is also called angular velocity sensor. The specific implementation manner and the working principle of the gyroscope and the acceleration sensor are relatively mature technologies, and are not described herein again in the embodiments of the present application.
In a possible implementation manner, each acquisition part comprises five gyroscopes and five acceleration sensors, and one gyroscope and one acceleration sensor are in a group and are used for sampling finger motion information of one finger.
The controller 11 acquires the acquisition results of the first acquisition unit 12 and the second acquisition unit 13, determines input information of the user based on the acquired finger movement information, and transmits the input information to the upper computer 20.
The upper computer 20 determines the password input by the user according to the input information and the decryption rule preset by the user.
The upper computer 20 may be a computer or a server, which is not specifically limited in this embodiment of the present application.
The decryption rule is used for converting input information into a password which is actually input, setting and storing the decryption rule on the upper computer in advance, and calling the decryption rule when the password is input. In a possible implementation manner, the decryption rule and the identity information of the user are correspondingly stored in the upper computer, and when the user inputs a password, the upper computer can match the corresponding decryption rule according to the identity information of the user.
The controller in the above description may be an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Digital Signal Processor (DSP), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a Field-Programmable Gate Array (FPGA), a General Array Logic (GAL), or any combination thereof, and the embodiments of the present invention are not limited in particular.
Another implementation of the password entry system is described below.
The password input device shown in fig. 2 is a glove-type wearable device, and in yet another possible implementation manner, the password input device may also be a ring-type wearable device, which is described in detail below with reference to the accompanying drawings.
Referring to fig. 3, a schematic diagram of another password input system provided in the embodiment of the present application is shown.
The password input system shown in the figure comprises a password input device and an upper computer 20, wherein the password input device is connected with the upper computer 20 and can perform data transmission with the upper computer 20.
The password input device specifically includes a first acquisition unit 12, a second acquisition unit 13, and a controller 11.
The first and second harvesting portions 12, 13 are mirror images of each other and are intended to be worn on different hands of a user.
The first collecting part 12 and the second collecting part 13 each include five finger rings, and each finger ring is connected to the controller 11 through a ribbon-like connecting line. Each ring is integrated with a gyroscope and an acceleration sensor, and therefore the action information of one finger of a user can be collected by each ring.
The operation principle of the controller 11 and the upper computer 20 is described in fig. 2, and will not be described herein.
To sum up, the password input system that this application embodiment provided supports the user and realizes the input of password through the action of finger, and the host computer need be according to the decryption rule that the user set up in advance with user's input information conversion for the password, consequently even the action information of user's finger is snooped or is revealed, because can't know the decryption rule that the user set up in advance, consequently also can't crack user's password, consequently utilize the scheme of this application, the security when having promoted password input has reduced the risk that the password was revealed.
The following description is made with reference to specific implementations.
In the following description, an implementation manner corresponding to fig. 2 is taken as an example for description, and when the implementation manner corresponding to fig. 3 is adopted, the principle is similar, and details of the embodiment of the present application are not repeated.
Referring to fig. 4, the figure is a schematic diagram of another password input system provided in the embodiment of the present application.
The password input system that this application embodiment provided includes password input device and host computer 20, and password input device is connected with host computer 20 to can carry out data transmission with host computer 20.
The password input device specifically includes a first acquisition unit 12, a second acquisition unit 13, and a controller 11.
The first and second harvesting portions 12, 13 are mirror images of each other and are intended to be worn on different hands of a user. For example, the first collecting unit 12 shown in fig. 2 is worn on the left hand, and the second collecting unit 13 shown in fig. 3 is worn on the right hand.
The first collecting part 12 and the second collecting part 13 are used for collecting motion information of the fingers of the user.
The first collecting part 12 further comprises a first fingerprint identification module 121, and the first fingerprint identification module 121 is arranged at the left thumb and used for acquiring the fingerprint information of the left thumb of the user.
The second acquisition part further comprises a second fingerprint identification module 131, and the second fingerprint identification module 131 is arranged at the position of the right thumb and used for acquiring the fingerprint information of the left thumb of the user.
After the client carries the password input device, the identity of the client is firstly verified through the first fingerprint identification module 121 or the second fingerprint identification module 131, and when the fingerprint information of the user acquired by the password input device is sent to the upper computer, the verification is carried out by the upper computer. When the fingerprint information stored in the upper computer is consistent with the fingerprint information of the user, the verification is passed, the upper computer feeds back verification passing information to the password input equipment at the moment, and the password input equipment starts to acquire the acquired information.
In a possible implementation manner, when the password input device is applied to a bank system, a customer needs to input fingerprint information through a fingerprint module of a mobile phone bank, and then the fingerprint information is bound with a preset decryption rule, the password input device can match the currently acquired fingerprint information with a fingerprint stored in a password library, the customer can use the fingerprint after matching, the customer can only input a password under a personal name, and products of other people, such as the mobile phone bank, of the device cannot be used.
The acquisition information acquired by the first acquisition unit 12 and the second acquisition unit 13 is the operation sequence of the finger. And the controller determines the input information of the user according to the action sequence of the fingers and the corresponding identification of each finger on the password input equipment. The input information in the embodiment of the present application is a first number string, that is, the identifier is an arabic number. Specifically, as shown in fig. 4, the corresponding identification of each finger on the password input device is 0 to 9 in sequence. The identification manner in the drawings is only one possible implementation manner, and in practical applications, other identification orders may also be adopted, which is not described herein again in this embodiment of the present application.
The decryption rule preset by the client comprises the corresponding relation between each finger and the actually represented number, and the corresponding relation is stored in the upper computer.
Because one finger is always inevitably connected to the adjacent finger to follow the action when the finger acts, in order to avoid misjudging the current acting finger, the controller summarizes in a possible implementation mode, the finger with the largest action amplitude at the current moment is taken as the current acting finger; in another possible implementation manner, the controller uses the finger with the action frequency satisfying the preset frequency at the current time as the finger with the action frequency satisfying the preset frequency at the current time, and the action frequency of the other fingers with the following action at the current time is less than the preset frequency, so as to reduce the probability of the false input caused by the following action of the other fingers.
The working principle of the password input system is illustrated below.
Taking the password as 6 digits as an example, that is, the number string to be obtained includes six digits at this time, it is not assumed that the actual password is 013579.
For example, the correspondence between each finger set by the user and the actually represented number is specifically: the left thumb corresponds to 1, the left index finger corresponds to 2, the left middle finger corresponds to 3, the left ring finger corresponds to 4, the left little finger corresponds to 5, the right thumb corresponds to 6, the right index finger corresponds to 7, the right middle finger corresponds to 8, the right ring finger corresponds to 9 and the right little finger corresponds to 0.
The client needs to sequentially act the right little finger, the left thumb, the left middle finger, the left little finger, the right index finger and the right ring finger on the password input device, that is, the corresponding identifiers of the fingers acting at this time on the password input device are sequentially 9, 0, 2, 4, 6 and 8.
In another possible implementation manner, the decryption rule includes a correspondence between an identifier corresponding to each finger on the password input device and a number actually represented, for example, the decryption rule at this time is specifically: the number 1 corresponding to the mark 0, the number 2 corresponding to the mark 1, the number 3 corresponding to the mark 2, the number 4 corresponding to the mark 3, the number 5 corresponding to the mark 4, the number 6 corresponding to the mark 5, the number 7 corresponding to the mark 6, the number 8 corresponding to the mark 7, the number 9 corresponding to the mark 8, and the number 0 corresponding to the mark 9.
The customer needs to act on the password input device sequentially with the right hand pinky finger, the left thumb, the left middle finger, the left pinky finger, the right index finger, and the right ring finger.
When a client inputs a password, the client can press down fingers (similar to keyboard typing operation), the identification method of the finger shake of the client is to identify the finger shake rule through a gyroscope and an acceleration sensor, and identify the finger action information of the client according to the hand shake rule, so that the corresponding password is obtained.
It is understood that the above first fingerprint identification module 121 and the second fingerprint identification module 131 may only exist in any one of them, and the confirmation of the user identity may be realized as well. In addition, in other embodiments, a plurality of fingerprint identification modules may be included in one collecting portion, for example, two fingerprint collecting modules may be included in the first collecting portion, and are respectively used for collecting fingerprint information of a thumb and an index finger.
In addition, for the implementation manner when the password input device shown in fig. 3 is a ring-type wearable device, a fingerprint identification module may be further additionally provided, and the specific implementation manner of the fingerprint identification module may refer to the description in the above embodiments, which is not described herein again.
In summary, with the password input system provided in the embodiment of the present application, a user performs a finger action to input a password, and the upper computer needs to convert the input information of the user into the password according to the decryption rule preset by the user, so even if the action information of the user finger is snooped or leaked, the user's password cannot be cracked because the decryption rule preset by the user cannot be known, and thus with the scheme of the present application, the security in inputting the password is improved, and the risk of password leakage is reduced.
Based on the password input system provided by the above embodiment, the embodiment of the present application further provides a password input method, which is specifically described below with reference to the accompanying drawings.
Referring to fig. 5, the flowchart of a password input method provided in the embodiment of the present application is shown.
The method comprises the following steps:
s501: and presetting a decryption rule.
In a possible implementation manner, when the password input device is applied to a bank system, a customer needs to input fingerprint information through a fingerprint module of a mobile phone bank, and then the fingerprint information is bound with a preset decryption rule, the password input device can match the currently acquired fingerprint information with a fingerprint stored in a password library, the customer can use the fingerprint after matching, the customer can only input a password under a personal name, and products of other people, such as the mobile phone bank, of the device cannot be used.
In one possible implementation, the decryption rules include a correspondence of each finger to the number actually characterized.
In another possible implementation, the decryption rule includes a correspondence between the identifier of each finger corresponding to the password input device and the number actually characterized.
S502: collecting finger action information of a user.
The finger motion information includes a sequence of finger motions of the user.
Specifically, in a possible implementation manner, the finger with the largest motion amplitude at the current time is taken as the finger moving at the current time.
In another possible implementation manner, the finger with the action time number meeting the preset time number at the current time is taken as the finger with the action time at the current time.
S503: and determining input information of the user according to the finger action information.
Specifically, input information of a user is determined according to the action sequence of the fingers and the corresponding identification of each finger on the password input device, and the input information is a first number string.
S504: and determining the password input by the user according to the input information of the user and the decryption rule.
In summary, with the password input method provided in the embodiment of the present application, the user performs a finger action to input a password, and the input information of the user needs to be converted into the password according to the decryption rule preset by the user, so even if the action information of the user finger is snooped or leaked, the password of the user cannot be cracked because the decryption rule preset by the user cannot be known, and thus with the method of the present application, the security of inputting the password is improved, and the risk of password leakage is reduced.
The password input system provided by the application can be used in the financial field or other fields, for example, can be used in a password input application scenario in the financial field. The other fields are arbitrary fields other than the financial field, for example, the field of information security. The above description is merely an example, and does not limit the application field of the password input system provided in the present application.
It should be understood that in the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" for describing an association relationship of associated objects, indicating that there may be three relationships, e.g., "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The above-described apparatus embodiments are merely illustrative, and the units and modules described as separate components may or may not be physically separate. In addition, some or all of the units and modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is directed to embodiments of the present application and it is noted that numerous modifications and adaptations may be made by those skilled in the art without departing from the principles of the present application and are intended to be within the scope of the present application.

Claims (12)

1. The utility model provides a password input system, its characterized in that, password input system includes host computer and password input device, password input device is used for connecting the host computer, password input device includes: the device comprises a first acquisition part, a second acquisition part and a controller;
the first collecting part and the second collecting part are mirror images and are used for being worn on different hands of a user;
the first acquisition part and the second acquisition part are used for acquiring the finger action information of the user;
the controller is used for determining input information of the user according to the finger action information and sending the input information to the upper computer;
and the upper computer is used for determining the password input by the user according to the input information and a decryption rule preset by the user.
2. The password input system of claim 1, wherein the collected information includes a sequence of finger movements of the user; the controller is specifically configured to determine input information of the user according to the finger action sequence and an identifier corresponding to each finger on the password input device, where the input information is a first numeric string.
3. The password input system according to claim 2, wherein the first collecting unit and the second collecting unit take a finger with the largest motion range at the current time as the finger moving at the current time.
4. The password input system according to claim 2, wherein the first and second capturing portions use a finger whose number of times of movement at the current time satisfies a preset number of times as the finger that is moved at the current time.
5. The password input system according to any one of claims 1 to 4, wherein the decryption rules include a correspondence of each finger to an actually characterized number; or, the decryption rule includes a correspondence between the identifier corresponding to each finger on the password input device and the actually characterized number.
6. The password input system of claim 1, wherein at least one of the first collecting part or the second collecting part is further provided with a fingerprint recognition module;
the fingerprint identification module is used for acquiring fingerprint information of at least one finger of the user;
the controller is further used for sending the fingerprint information to an upper computer, and when the upper computer passes the verification of the fingerprint information, the controller starts to acquire the acquisition information.
7. The password input system of claim 1, wherein the first and second acquisition portions are glove-type wearable devices; or the first collecting part and the second collecting part respectively comprise five collecting finger rings, and each collecting finger ring is worn on one finger.
8. A password input method applied to the password input system according to any one of claims 1 to 7, the method comprising:
presetting a decryption rule;
collecting finger action information of the user;
determining input information of the user according to the finger action information;
and determining the password input by the user according to the input information of the user and the decryption rule.
9. The password input method according to claim 8, wherein the finger motion information includes a finger motion sequence of the user, and the determining the input information of the user according to the finger motion information specifically includes:
and determining the input information of the user according to the finger action sequence and the corresponding identification of each finger on the password input equipment, wherein the input information is a first numeric string.
10. The password input method according to claim 9, wherein the collecting the finger motion information of the user specifically comprises:
and taking the finger with the largest action amplitude at the current moment as the finger which acts at the current moment.
11. The password input method according to claim 9, wherein the collecting the finger motion information of the user specifically comprises:
and taking the finger with the action times meeting the preset times at the current moment as the finger acting at the current moment.
12. A password input method according to claims 8 to 11, wherein the decryption rules include a correspondence of each finger to a number of the actual representation; or, the decryption rule includes a correspondence between the identifier corresponding to each finger on the password input device and the actually characterized number.
CN202111094707.XA 2021-09-17 2021-09-17 Password input system and password input method Pending CN113742695A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111094707.XA CN113742695A (en) 2021-09-17 2021-09-17 Password input system and password input method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111094707.XA CN113742695A (en) 2021-09-17 2021-09-17 Password input system and password input method

Publications (1)

Publication Number Publication Date
CN113742695A true CN113742695A (en) 2021-12-03

Family

ID=78739835

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111094707.XA Pending CN113742695A (en) 2021-09-17 2021-09-17 Password input system and password input method

Country Status (1)

Country Link
CN (1) CN113742695A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103221902A (en) * 2010-09-23 2013-07-24 诺基亚公司 Method and wearable apparatus for user input
CN106104421A (en) * 2014-01-29 2016-11-09 白桂雨 A kind of finger ring type wireless finger sense controller, control method and control system
CN107106907A (en) * 2014-12-31 2017-08-29 索尼互动娱乐股份有限公司 Signal generation and detector system and method for determining user's finger position
CN111158476A (en) * 2019-12-25 2020-05-15 中国人民解放军军事科学院国防科技创新研究院 Key identification method, system, equipment and storage medium of virtual keyboard

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103221902A (en) * 2010-09-23 2013-07-24 诺基亚公司 Method and wearable apparatus for user input
CN106104421A (en) * 2014-01-29 2016-11-09 白桂雨 A kind of finger ring type wireless finger sense controller, control method and control system
CN107106907A (en) * 2014-12-31 2017-08-29 索尼互动娱乐股份有限公司 Signal generation and detector system and method for determining user's finger position
CN111158476A (en) * 2019-12-25 2020-05-15 中国人民解放军军事科学院国防科技创新研究院 Key identification method, system, equipment and storage medium of virtual keyboard

Similar Documents

Publication Publication Date Title
CN106127130B (en) Managed biometric-based notification system and method
CN101047508B (en) Accession authorization system
US20060007189A1 (en) Forms-based computer interface
Bevan et al. Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures
KR20130073871A (en) Image processing device, image processing method and program
US20050204149A1 (en) Technology for authenticating person by data generated based on biological information
CN1957355A (en) Mouse performance identification
CN106462567A (en) Augmented data view
CN109273075A (en) A kind of medical staff relieves method, apparatus and terminal device
US10027684B1 (en) Method and system for user credential security
CN109858225A (en) Unlocked by fingerprint method, apparatus, terminal and storage medium
CN110442742A (en) Retrieve method and device, processor, electronic equipment and the storage medium of image
Nigam et al. Leap signature recognition using HOOF and HOT features
Wang et al. Wristspy: Snooping passcodes in mobile payment using wrist-worn wearables
WO2016077578A1 (en) System and method for feature-based authentication
Oak et al. A novel architecture for continuous authentication using behavioural biometrics
CN107076999A (en) Docked using eye contact via head-up display
EP3660633A1 (en) Hand-worn data-input device
Panda et al. Behavioral acoustic emanations: Attack and verification of pin entry using keypress sounds
JP6674683B2 (en) Authentication processing apparatus and authentication processing method
CN112101288A (en) Method, device and equipment for detecting wearing of safety helmet and storage medium
Chopra et al. Unconstrained fingerphoto database
Liu et al. Multi-source interactive behavior analysis for continuous user authentication on smartphones
CN113742695A (en) Password input system and password input method
Li et al. Finger gesture recognition using a smartwatch with integrated motion sensors

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination