CN113918903A - Intelligent leakage-proof password input system, method and medium - Google Patents

Intelligent leakage-proof password input system, method and medium Download PDF

Info

Publication number
CN113918903A
CN113918903A CN202111180630.8A CN202111180630A CN113918903A CN 113918903 A CN113918903 A CN 113918903A CN 202111180630 A CN202111180630 A CN 202111180630A CN 113918903 A CN113918903 A CN 113918903A
Authority
CN
China
Prior art keywords
module
information
password
user
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111180630.8A
Other languages
Chinese (zh)
Inventor
张鑫
祝召虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhitu Network Technology Jiangsu Co ltd
Original Assignee
Zhitu Network Technology Jiangsu Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhitu Network Technology Jiangsu Co ltd filed Critical Zhitu Network Technology Jiangsu Co ltd
Priority to CN202111180630.8A priority Critical patent/CN113918903A/en
Publication of CN113918903A publication Critical patent/CN113918903A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses an intelligent leakage-proof password input system, method and medium, the system includes: the password protection device comprises a password input module, an interface encryption module, a password processing module and a password backup protection module; the password input module is used for acquiring the sensing information and outputting a first password input interface based on the sensing information; the interface encryption module is used for detecting first touch information of the first password input interface and generating a second password input interface based on the first touch information; the password processing module is used for acquiring the keying-in completion degree information of the second password keying-in interface and executing password encryption operation based on the keying-in completion degree information; the password backup protection module is used for executing timing operation to obtain first time, acquiring abnormal user access conditions based on the first time, and executing biological identification operation based on the abnormal user access conditions; the invention can protect the password of the user in various directions and has extremely high safety.

Description

Intelligent leakage-proof password input system, method and medium
Technical Field
The invention relates to the technical field of password encryption, in particular to an intelligent leakage-proof password input system, method and medium.
Background
In the prior art, the password input modules used on various terminal devices all adopt button type interactive devices, and the password input modules are easy to peep by others when in use, so that user information is leaked or user property loss is caused, and finally the safety of the terminal device where the password input module is located is reduced.
Disclosure of Invention
The password input module mainly solves the problems that when the existing password input module is used, the existing password input module is easy to be peeped by others, so that user information is leaked or user property loss is caused, and finally the safety of terminal equipment is reduced.
In order to solve the technical problems, the invention adopts a technical scheme that: provided is an intelligent leakage-proof password input system, including:
the password protection device comprises a password input module, an interface encryption module, a password processing module and a password backup protection module;
a sensing threshold value setting program is configured in the password input module and used for setting a sensing threshold value; the password input module is used for acquiring sensing information and outputting a first password input interface based on the sensing threshold and the sensing information;
the interface encryption module is provided with an arrangement sequence configuration program, and the arrangement sequence configuration program is used for configuring a character value and password arrangement sequence matching table; the interface encryption module is used for detecting first touch information of the first password input interface, and the interface encryption module generates a second password input interface based on the character value and password arrangement sequence matching table and the first touch information;
the password processing module is used for acquiring keying-in completion degree information of the second password keying-in interface, executing password encryption operation based on the keying-in completion degree information and sending interval detection signals to the password backup protection module;
a time threshold setting program is configured in the password backup protection module and used for setting a time threshold; the password backup protection module is used for executing timing operation according to the interval detection signal to obtain first time; and the password backup protection module acquires the abnormal user access condition based on the time threshold and the first time, and executes the biological identification operation based on the abnormal user access condition.
As an improved scheme, the password entry module comprises: the system comprises a user on-site detection module and an interface output module; the user on-site detection module is provided with a distance sensor and a first power amplifier module; the interface output module is provided with an image sensor and an indication module;
the image sensor and the indicating module are arranged outside the interface output module in parallel; the user presence detection module is in communication connection with the image sensor and the indication module;
the user in-place detection module is used for calling the distance sensor to acquire first distance information between a first user and the user in-place detection module, setting the first distance information as the sensing information by the user in-place detection module, and comparing whether the sensing information is not greater than the sensing threshold value; if the current state is not larger than the preset threshold value, the user in-place detection module adjusts the indication module to be in a lighting state, and the user in-place detection module prompts the first user to face the indication module through the first power amplifier module in a voice mode;
the user presence detection module is also used for calling the image sensor to acquire the face information detection condition of the first user; if the face information detection condition is that the face information of the first user is captured, the user in-place detection module sends a first interface output signal to the interface output module;
the interface output module is used for outputting the first password input interface according to the first interface output signal.
As an improved solution, the interface output module includes: the system comprises an image processing module, a region selection module and an interface release module; the interface delivery module is in communication connection with the image processing module and the image sensor;
a gray value set configuration program is configured in the image processing module, and the gray value set configuration program is used for configuring a parameter and gray value matching set and distance information and gray value matching set;
an interface construction program is configured in the interface release module, and the interface construction program is used for constructing the first password input interface;
the image processing module is used for acquiring first display screen parameter information of a first terminal carried by the user on-site detection module, screening out first gray value information matched with the first display screen parameter information from the parameter and gray value matching set by the image processing module, and adjusting the gray value of the display screen of the first terminal according to the first gray value information;
the area selection module is used for outputting a plurality of interface display areas to a first display screen of the first terminal after the image processing module adjusts the gray value of the display screen of the first terminal according to the first gray value information, and the area selection module prompts the first user to select the interface display areas; the area selection module sets the interface display area selected by the first user as a first area;
the interface releasing module is used for calling the image sensor to acquire second distance information between the face of the first user and the first display screen, screening second gray value information matched with the second distance information from the distance information and gray value matching set by the interface releasing module, calling the image processing module by the interface releasing module to adjust the gray value of the display screen corresponding to the first area in the first display screen according to the second gray value information, and outputting the first password input interface to the first area after the gray value of the display screen is adjusted by the interface releasing module.
As an improved solution, the interface encryption module includes: the system comprises a touch detection module, a character value calculation module and a password scrambling module; a digit information setting program is arranged in the character value calculation module and used for setting digit information;
the touch detection module is used for acquiring the first touch information of the first password input interface on the first display screen, converting the first touch information into a first character value and sending a calculation signal to the character value calculation module;
the character value calculating module is used for acquiring a second time after receiving the calculating signal; the character value calculation module extracts a third character value matched with the digit information in the second time; the character value calculation module calculates an absolute value of a difference between the first character value and the third character value, and sets the absolute value as a fourth character value;
the password scrambling module is used for screening out a first password arrangement sequence matched with the fourth character value from the character value and password arrangement sequence matching table; and the password scrambling module adjusts the password layout in the first password input interface on the first display screen according to the first password arrangement sequence to obtain the second password input interface.
As an improved solution, the cryptographic processing module includes: the password completion degree detection module and the password encryption module; the second password input interface comprises a password input area and a password confirmation area;
the password completion detection module is used for acquiring second touch information of the first display screen for the second password input interface; the password completion detection module identifies whether the coordinate information in the second touch information belongs to the password input area; if the user key is the password key, the password completion detection module converts the second touch information into a second character value, integrates the first character value and the second character value to obtain a user key, and sets the key input completion information as the password key to be input; if not, the password completion detection module identifies whether the coordinate information in the second touch information belongs to the password confirmation area, and if so, the password completion detection module sets the typing completion information as password typing completion;
and the password encryption module is used for executing the password encryption operation and sending an interval detection signal to the password backup protection module when the keying-in completion degree information is that the password keying-in is completed.
As an improved solution, the cryptographic module includes: the system comprises a data splitting module, a data integration module and an algorithm encryption module;
a splitting algorithm compiling program is configured in the data splitting module, and the splitting algorithm compiling program is used for compiling a key splitting algorithm and a time character splitting algorithm;
an integration algorithm compiling program is configured in the data integration module, and the integration algorithm compiling program is used for compiling a data integration algorithm;
the algorithm encryption module is provided with an encryption algorithm configuration program and an encryption space division program; the encryption algorithm configuration program is used for configuring an encryption algorithm;
the encryption space dividing program is used for dividing an encryption space in a virtual memory of the first terminal; the encryption algorithm comprises: an asymmetric encryption algorithm;
the password encryption operation is realized by the mutual cooperation among the data splitting module, the data integration module and the algorithm encryption module:
the data splitting module splits the user key through the key splitting algorithm to obtain a plurality of split keys; the data splitting module obtains a third time, and splits the third time through the time character splitting algorithm to obtain a plurality of encrypted characters;
the data integration module integrates the split keys and the encrypted characters through the data integration algorithm to obtain a first encrypted key;
the algorithm encryption module encrypts the first encryption key by calling the asymmetric encryption algorithm to obtain a second encryption key; and the algorithm encryption module stores the second encryption key into the encryption space.
As an improved solution, the password backup protection module includes: the system comprises a time schedule controller, a user information comparison module and a biological authentication module; a time period setting program and a database building program are configured in the user information comparison module, wherein the time period setting program is used for setting a detection time period, and the database building program is used for building a terminal database;
the time schedule controller is used for executing the timing operation after receiving the interval detection signal to obtain the first time; the time schedule controller compares whether the first time reaches the time threshold value, and if so, the time schedule controller sends an abnormal user detection signal to the user information comparison module;
the user information comparison module is used for acquiring first user identification information matched with the user key in the terminal database after receiving the abnormal user detection signal, and detecting whether an access request matched with the first user identification information exists in the first terminal every other detection time period; if the abnormal user access condition exists, the user information comparison module sets the abnormal user access condition as the abnormal user access condition; if the abnormal user access condition does not exist, the user information comparison module sets the abnormal user access condition as that the abnormal user access does not exist;
the biometric authentication module is used for executing the biometric identification operation when the abnormal user access condition is that the abnormal user access exists.
As an improved scheme, a fingerprint information acquisition module, a facial information acquisition module, a pickup comparison module, a second power amplifier module, an alarm module and a check information processing program are arranged in the biological authentication module; the alarm module is in communication connection with the first terminal; a regular expression matching algorithm is configured in the check information processing program;
the verification information processing program is used for acquiring user verification information matched with the first user identification information in the terminal database;
the biological identification operation is realized by the mutual cooperation among the fingerprint information acquisition module, the facial information acquisition module, the pickup comparison module, the second power amplifier module, the alarm module and the check information processing program:
the biological authentication module prompts a second user to select a fingerprint verification mode or a face verification mode through the second power amplification module;
the biometric authentication module acquires first fingerprint information of the second user through the fingerprint information acquisition module when the second user selects the fingerprint verification mode;
the biometric authentication module acquires first facial information of the second user through the facial information acquisition module when the second user selects the facial verification mode;
the biological authentication module captures voice information output by the second user when the fingerprint verification mode or the face verification mode is selected through the pickup comparison module, and the biological authentication module identifies a first voice feature in the voice information through the pickup comparison module;
the biometric authentication module extracts second fingerprint information, second facial information and second voice characteristics in the user verification information through the verification information processing program;
the biological authentication module calls the regular expression matching algorithm through the verification information processing program to compare whether the first voice feature is matched with the second voice feature; if the first terminal is not matched with the second terminal, the biological authentication module sends first alarm information to a management background of the first terminal through the alarm module; if the first face information and the second face information are matched, the biological authentication module calls the regular expression matching algorithm through the verification information processing program to compare the first fingerprint information with the second fingerprint information, or compares the first face information with the second face information; if the first fingerprint information is matched with the second fingerprint information when the second user selects the fingerprint verification mode, or the first face information is matched with the second face information when the second user selects the face verification mode, the biometric authentication module calls the password input module to output the first password input interface; and if the first fingerprint information is not matched with the second fingerprint information when the second user selects the fingerprint verification mode, or the first face information is not matched with the second face information when the second user selects the face verification mode, the biological authentication module sends second warning information to a management background of the first terminal through the warning module.
The invention also provides an intelligent leakage-proof password input method, which comprises the following steps:
a first interface output step: setting a sensing threshold value; acquiring sensing information; outputting a first password entry interface based on the sensing threshold and the sensing information;
a second interface output step: configuring a character value and password arrangement sequence matching table; detecting first touch information of the first password input interface; generating a second password input interface based on the character value and password arrangement sequence matching table and the first touch information;
a user password encryption step: acquiring the typing completion degree information of the second password typing interface; performing a password encryption operation based on the keying-in completion information and generating an interval detection signal;
backup identification and protection: setting a time threshold; executing timing operation based on the interval detection signal to obtain first time; and acquiring an abnormal user access condition based on the time threshold and the first time, and executing a biological identification operation based on the abnormal user access condition.
The present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the intelligent anti-disclosure password input method.
The invention has the beneficial effects that:
1. the intelligent leakage-proof password input system can intelligently change the rule of password input on an interactive interface through the mutual matching of the password key-in module, the interface encryption module, the password processing module and the password backup protection module, realizes the function of peeping prevention through the design of image processing, protects the password of a user in various directions, improves the safety of terminal equipment in an all-round way, further improves the experience of the user and the trust of the user on the terminal equipment, makes up the defects of the prior art, and has extremely high market value and product competitiveness.
2. The intelligent leakage-proof password input method can realize the intelligent change of the password input rule, realizes the function of peep prevention through the design of image processing, protects the password of the user in various directions, improves the safety of the terminal equipment in an all-around way, further improves the experience of the user and the trust of the user on the terminal equipment, and makes up the defects of the prior art.
3. The computer-readable storage medium can realize the cooperation of the password-guiding typing module, the interface encryption module, the password processing module and the password backup protection module, further realize the intelligentized change rule of password input, realize the function of peep prevention through the design of image processing, improve the safety of terminal equipment in an all-round way, further improve the experience of users and the trust of the users on the terminal equipment, and effectively improve the operability of the intelligentized anti-leakage password input method.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is an architecture diagram of an intelligent leakage-proof password input system according to embodiment 1 of the present invention;
fig. 2 is a flowchart of an intelligent leakage-proof password input method according to embodiment 2 of the present invention;
fig. 3 is a schematic specific flowchart of the intelligent leakage-proof password input method according to embodiment 2 of the present invention.
Detailed Description
The following detailed description of the preferred embodiments of the present invention, taken in conjunction with the accompanying drawings, will make the advantages and features of the invention easier to understand by those skilled in the art, and thus will clearly and clearly define the scope of the invention.
In the description of the present invention, it should be noted that the described embodiments of the present invention are a part of the embodiments of the present invention, and not all embodiments; all other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "first", "second", "third", and "fourth" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless explicitly specified or limited otherwise, the terms "password entry module", "interface encryption module", "password processing module", "password backup protection module", "sensing threshold setting program", "sensing threshold", "sensing information", "password entry interface", "arrangement order configuration program", "character value and password arrangement order matching table", "touch information", "entry completion information", "password encryption operation", "interval detection signal", "time threshold setting program", "time threshold", "timing operation", "abnormal user access situation", "biometric operation", "user presence detection module", "interface output module", "distance sensor", "power amplifier module", "image sensor", "indication module "first distance information", "lighting state", "voice prompt", "face information detection condition", "face information captured by the first user", "interface output signal", "display screen", "digit information setting program", "digit information", "character value", "password arrangement order", "password layout", "password entry area", "password confirmation area", "coordinate information", "user key", "password entry to be completed", "password entry completed", "gradation value set configuration program", "parameter and gradation value matching set", "distance information and gradation value matching set", "interface construction program", "display screen parameter information", "gradation value information", "display screen gradation value", "interface display area", "split algorithm compiler", "key split algorithm" ], The terms "time character splitting algorithm", "integration algorithm compiling program", "data integration algorithm", "encryption algorithm configuration program", "encryption space partitioning program", "encryption algorithm", "encryption space", "asymmetric encryption algorithm", "split key", "encrypted character", "encryption key", "timing controller", "time period setting program", "database construction program", "detection time period", "terminal database", "abnormal user detection signal", "user identification information", "access request", "abnormal user access not present", "verification information processing program", "regular expression matching algorithm", "user verification information", "fingerprint verification pattern", "face verification pattern" should be understood in a broad sense. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
In the description of the present invention, it is to be noted that: AI (Artificial Intelligence) is artificial intelligence; id (identity document) is an identification number; tn (twisted nematic) is a twisted nematic panel.
Example 1
The present embodiment provides an intelligent leakage-proof password input system, as shown in fig. 1, including: the password protection device comprises a password input module, an interface encryption module, a password processing module and a password backup protection module;
in the intelligent leakage-proof password input system, a password input module is provided with a sensing threshold setting program, and the threshold setting program is used for setting a sensing threshold; the password input module is used for acquiring sensing information and outputting a first password input interface based on the sensing threshold and the sensing information; in this embodiment, the function of the password entry module is mainly to feed back the behavior of the user, and then output a relatively safe password input interface to the user;
specifically, the password entry module includes: the system comprises a user on-site detection module and an interface output module; the user on-site detection module is provided with a distance sensor and a first power amplifier module; the interface output module is provided with an image sensor and an indication module; in this embodiment, the indication module may be an LED lamp or a display screen; the image sensor and the indicating module are arranged outside the interface output module in parallel; in this embodiment, the exterior of the interface output module includes, but is not limited to, a housing and a logo on the interface output module that can be observed by a user; the user presence detection module is in communication connection with the image sensor and the indication module; in this embodiment, all communication connections adopt a wireless transmission technology, and correspondingly, the wireless transmission technology includes, but is not limited to, bluetooth transmission, network transmission, and the like;
the user in-place detection module is used for calling the distance sensor to acquire first distance information between a first user and the user in-place detection module, setting the first distance information as the sensing information by the user in-place detection module, and comparing whether the sensing information is not greater than the sensing threshold value; if the current state is not larger than the preset threshold value, the user in-place detection module adjusts the indication module to be in a lighting state, and the user in-place detection module prompts the first user to face the indication module through the first power amplifier module in a voice mode; correspondingly, the operation of the user presence detection module has extremely high intelligence, and when the sensing information is not greater than the sensing threshold value, the user needs to input a key or a password on the terminal equipment carried by the user presence detection module; at the moment, corresponding feedback operation needs to be carried out on the behavior of the user; correspondingly, the user is guided to perform the next operation through the setting of the indication module and the voice prompt and the humanization, in the embodiment, the first user is a user who is about to input a password when the terminal device is normally used, and the description of the first user is also used for distinguishing and limiting the sequence; correspondingly, the indication module is normally in an off state, and the lighting state in the embodiment includes, but is not limited to, high-frequency flashing, low-frequency flashing, normally on, high-brightness normally on, low-brightness normally on, and the like; the user presence detection module is also used for calling the image sensor to acquire the face information detection condition of the first user; this operation serves to detect whether the user has been directed towards the indication module; if the face information detection condition is that the face information of the first user is captured, it indicates that the user is facing the indicating module, and subsequent operations can be performed, and if corresponding information is not captured, it indicates that the user is too close, so that the user needs to be reminded again; when the facial information of the first user is captured, the user in-place detection module sends a first interface output signal to the interface output module; the interface output module is used for outputting the first password input interface according to the first interface output signal;
specifically, the interface output module includes: the system comprises an image processing module, a region selection module and an interface release module; the interface delivery module is in communication connection with the image processing module and the image sensor;
a gray value set configuration program is configured in the image processing module, and the gray value set configuration program is used for configuring a parameter and gray value matching set and distance information and gray value matching set; in this embodiment, the parameter and gray value matching set is a mapping relationship between a plurality of different display parameters and gray values, the distance information and gray value matching set is a mapping relationship between a plurality of different distance information and gray values, the gray values in the two sets are set according to the display effects of different display screens, and the adjustment of the gray values needs to ensure that a user can see the display screens clearly; an interface construction program is configured in the interface release module, and the interface construction program is used for constructing the first password input interface;
the image processing module is configured to obtain parameter information of a first display screen of a first terminal carried by the user presence detection module, where in this embodiment, the first terminal includes but is not limited to a mobile terminal; the image processing module screens out first gray value information matched with the first display screen parameter information from the parameter and gray value matching set, and adjusts the gray value of the display screen of the first terminal according to the first gray value information; conceivably, the image processing module can also adjust the contrast and brightness of the first display screen, so as to avoid peeping of others under the condition that the first user can see the first display screen; the area selection module is used for outputting a plurality of interface display areas to a first display screen of the first terminal after the image processing module adjusts the gray value of the display screen of the first terminal according to the first gray value information, and prompting the first user to select the interface display areas; the area selection module sets the interface display area selected by the first user as a first area; in this embodiment, the operation of the region selection module further improves the safety of interface output, and the mode that the user selects the display region is adopted to fit the use condition of the user, so that the environment where the user is located is further matched, the safety is improved, and the flexibility of the system and the experience of the user are improved; the interface releasing module is used for calling the image sensor to acquire second distance information between the face of the first user and the first display screen, screening second gray value information matched with the second distance information from the distance information and gray value matching set by the interface releasing module, calling the image processing module by the interface releasing module to adjust the gray value of the display screen corresponding to the first area in the first display screen according to the second gray value information, and outputting the first password input interface to the first area after the gray value of the display screen is adjusted by the interface releasing module; in this embodiment, it is conceivable that the first display screen may be made of a TN panel material, and adjustment of the gray scale value of the display screen is further facilitated, so that a display image of the first display screen can only be seen by the first user, the security of a user password is further improved, leakage of user information or the password is further prevented from a visual perspective, and the vacancy in the prior art is made up.
In the intelligent leakage-proof password input system, an arrangement sequence configuration program is configured in an interface encryption module, and the arrangement sequence configuration program is used for configuring a character value and password arrangement sequence matching table; the interface encryption module is used for detecting first touch information of the first password input interface, and the interface encryption module generates a second password input interface based on the character value and password arrangement sequence matching table and the first touch information; in the embodiment, the character value is 0-9 of Arabic numerals, so that the occupation of table data on a module memory is further reduced, and on the other hand, the configuration is convenient and the updating and the use are easy; correspondingly, 10 different password arrangement sequences are designed in the matching table of the character values and the password arrangement sequences, and the arrangement sequence configuration program can update the 10 password arrangement sequences at regular intervals; correspondingly, the refresh period is set to 12 hours in the present embodiment; correspondingly, the password arrangement sequence is 0-9, and the password arrangement sequence is in different shapes, and the shapes include but are not limited to: well-shaped, straight-shaped, X-shaped, T-shaped, Z-shaped, H-shaped, L-shaped and the like; correspondingly, the character value and password arrangement sequence matching table is mainly used for uninterruptedly disturbing the layout of the password in the password input interface, so that a peeper is further prevented from remembering the sequence or gesture of the password input by the user in the aspect of vision, and the password of the user is further cracked;
specifically, the interface encryption module includes: the system comprises a touch detection module, a character value calculation module and a password scrambling module; a digit information setting program is arranged in the character value calculation module and used for setting digit information; the touch detection module is used for acquiring the first touch information of the first password input interface on the first display screen, converting the first touch information into a first character value and sending a calculation signal to the character value calculation module; the first touch information is all touch information of a first user on the first password input interface captured on the first display screen; correspondingly, the first character value is a password character touched by the first user on the first password input interface; the calculation signal is an interaction signal between the touch detection module and the character value calculation module, and includes but is not limited to a pulse signal, a digital signal, an enable signal and the like;
the character value calculating module is used for acquiring a second time after receiving the calculating signal, wherein the second time is the current time point; the character value calculation module extracts a third character value matched with the digit information in the second time; the digit information is the digit of the time point, and the digit information is 1-4 bits; for example: when the second time point is 13:27, if the digit information is 1, the third character value is 1, if the digit information is 2, the third character value is 3, if the digit information is 3, the third character value is 2, and if the digit information is 4, the third character value is 7; the character value calculation module calculates an absolute value of a difference between the first character value and the third character value, and sets the absolute value as a fourth character value;
the password scrambling module is used for screening out a first password arrangement sequence matched with the fourth character value from the character value and password arrangement sequence matching table; the password scrambling module adjusts the password layout in the first password input interface on the first display screen according to the first password arrangement sequence to obtain a second password input interface; correspondingly, through the matching of the character value calculating module and the password scrambling module, the scrambling operation of the password input interface has no regularity, and the more irregular the scrambling operation, the safer the password protection relative to the user is, the first password input interface is used for inputting the first password of the first user, and the second password input interface is used for inputting the residual password of the first user; the basis of the password scrambling operation lies in the first password input by the user and the current time point, the password scrambling operation is continuously changed, the security is extremely high, the password scrambling operation is difficult to crack, the security of the system is further improved, and the password of the user is further prevented from being leaked.
In the intelligent leakage-proof password input system, a password processing module is used for acquiring keying-in completion degree information of the second password keying-in interface, and the password processing module executes password encryption operation based on the keying-in completion degree information and sends an interval detection signal to the password backup protection module; the password processing module has the main functions that after the user inputs the password, the password of the user on the first terminal is encrypted, so that the information of the user is protected at the bottom layer, and the leakage of the password of the user is further prevented;
specifically, the cryptographic processing module includes: the password completion degree detection module and the password encryption module; the second password input interface comprises a password input area and a password confirmation area; the password input area is an area for displaying password layout, and the password confirmation area is an area for submitting or confirming the password input by the user; the password completion detection module is used for acquiring second touch information of the first display screen for the second password input interface; the password completion detection module identifies whether the coordinate information in the second touch information belongs to the password input area; in this embodiment, the coordinate information is a coordinate value in a coordinate region that is vectorized with a display region of the entire first display screen as a boundary; the password input area and the password confirmation area are also provided with corresponding coordinate ranges for the coordinate areas; correspondingly, if the coordinate information belongs to the password entry area, it indicates that the first user is still performing the password entry stage, and no confirmation is performed, so the password completion detection module converts the second touch information into a second character value, and integrates the first character value and the second character value to obtain a user key, which is applied in subsequent biometric identification, and meanwhile, in this embodiment, the user key is used for verifying the identity of the user by the terminal device; the password completion detection module sets the keying completion information as that password keying is to be completed; if not, the password completion detection module identifies whether the coordinate information in the second touch information belongs to the password confirmation area, and if so, the password completion detection module sets the typing completion information as password typing completion; the password encryption module is used for executing the password encryption operation and sending an interval detection signal to the password backup protection module when the keying-in completion degree information is that the password keying-in is completed; correspondingly, in order to ensure the orderliness among the steps, the interval detection signal is sent to the backup protection module after the password encryption operation is finished;
specifically, the cryptographic module includes: the system comprises a data splitting module, a data integration module and an algorithm encryption module; a splitting algorithm compiling program is configured in the data splitting module, and the splitting algorithm compiling program is used for compiling a key splitting algorithm and a time character splitting algorithm; an integration algorithm compiling program is configured in the data integration module, and the integration algorithm compiling program is used for compiling a data integration algorithm; the algorithm encryption module is provided with an encryption algorithm configuration program and an encryption space division program; the encryption algorithm configuration program is used for configuring an encryption algorithm; the encryption space dividing program is used for dividing an encryption space in a virtual memory of the first terminal; the encryption algorithm comprises: an asymmetric encryption algorithm;
the cryptographic operation comprises: the data splitting module splits the user key through the key splitting algorithm to obtain a plurality of split keys; the data splitting module obtains a third time, and splits the third time through the time character splitting algorithm to obtain a plurality of encrypted characters; in this embodiment, the third time is the current time, and the key splitting algorithm and the time character splitting algorithm are both algorithms for splitting data according to the number of bits of the data to be split, for example: the user key is 5114, the third time is 12: 57, the split keys are: 5. 1, 4; the plurality of encrypted characters are respectively: 1. 2, 5, 7; the data integration module integrates the split keys and the encrypted characters through the data integration algorithm to obtain a first encrypted key;
in this embodiment, the data integration algorithm is to combine the split keys and the encrypted characters in a staggered and interspersed manner, and correspondingly, the split keys and the encrypted characters in the above example are integrated, so that the obtained first encryption key is: 51121547, respectively; correspondingly, in this embodiment, the key splitting algorithm, the time character splitting algorithm, and the data integration algorithm include, but are not limited to, the above algorithms, and may be improved based on the above algorithms; the algorithm encryption module encrypts the first encryption key by calling the asymmetric encryption algorithm to obtain a second encryption key; the algorithm encryption module stores the second encryption key into the encryption space; correspondingly, through the cooperation of the modules, the password of the user is prevented from being peeped in an all-round mode, algorithm encryption is carried out on the password input by the user in bottom layer logic, the whole encrypted logic cracking difficulty is large, the safety of the system is further improved, the password of the user is intelligently prevented from being exposed, and the defects of the prior art are overcome.
Correspondingly, the present embodiment not only relates to the process of inputting the password by the user, but also relates to the protection operation after the user leaves the terminal device: correspondingly, in the intelligent leakage-proof password input system, a time threshold setting program is configured in the password backup protection module, and the time threshold setting program is used for setting a time threshold; the password backup protection module is used for executing timing operation according to the interval detection signal to obtain first time; the password backup protection module acquires an abnormal user access condition based on the time threshold and the first time, and executes a biological identification operation based on the abnormal user access condition; in this embodiment, the time threshold is a comparison reference of the first time; specifically, the password backup protection module includes: the system comprises a time schedule controller, a user information comparison module and a biological authentication module; a time period setting program and a database building program are configured in the user information comparison module, wherein the time period setting program is used for setting a detection time period, and the database building program is used for building a terminal database; in this embodiment, the specific situation of the detection time period is specifically set, and the smaller the detection time period is, the stronger the real-time performance of the system is; correspondingly, when the terminal database is the terminal equipment used by the user, the verification information, the authentication information, the legal information and the like of the user registered on the terminal equipment are checked; the time schedule controller is used for executing the timing operation after receiving the interval detection signal to obtain the first time; the time schedule controller compares whether the first time reaches the time threshold value, and if so, the time schedule controller sends an abnormal user detection signal to the user information comparison module; in this embodiment, the timing operation is that the timing controller records a starting time point after receiving the interval detection signal, and then the timing controller repeatedly records a current time point, where the first time is a difference between the current time point and the starting time point, and when the first time reaches a time threshold, the difference reaches the time threshold; the purpose of this timing operation is: some persons who crack the password of the user and want to steal the property of the user by cracking the password can activate the terminal equipment through the forged identity information certificate or the interactive equipment after the user leaves for a period of time, and access the confidential information or the property of the user through cracking the password; correspondingly, the timing operation is a corresponding detection program, a backup protection measure is provided for the user, and even if the user leaves the terminal equipment, the system can protect the password and account or confidential information of the user; correspondingly, the time threshold should be set to be the middle value between the maximum value and the minimum value, in this embodiment, the time threshold should be set to be 3 hours, and the time threshold should be specifically set according to the use frequency of the terminal device; the user information comparison module is used for acquiring first user identification information matched with the user key in the terminal database after receiving the abnormal user detection signal, wherein the first user identification information comprises but is not limited to an ID identification number of a user and the like; the user information comparison module detects whether an access request matched with the first user identification information exists in a first terminal carried by the password input module every the detection time period; if the user information exists, the first user or other users access the equipment where the system is located by adopting the same identity information as the first user who leaves before, so for the safety of the users, the user information comparison module sets the abnormal user access condition as abnormal user access, although the operation has a certain misjudgment probability, the invention aims to maintain the information of the users, and even if the operation is misjudgment, the safety of the users can be improved; if the abnormal user access condition does not exist, the user information comparison module sets the abnormal user access condition as that the abnormal user access does not exist; the biometric authentication module is used for executing the biometric identification operation when the abnormal user access condition is that the abnormal user access exists.
Specifically, the biometric authentication module is provided with a fingerprint information acquisition module, a facial information acquisition module, a pickup comparison module, a second power amplifier module, an alarm module and a check information processing program; the alarm module is in communication connection with the first terminal; a regular expression matching algorithm is configured in the check information processing program; in this embodiment, the fingerprint information acquisition module adopts a fingerprint acquisition device; the face information acquisition module adopts an AI intelligent face recognition chip; the pickup comparison module adopts audio identification equipment with a comparison function; in this embodiment, the first power amplifier module and the second power amplifier module both adopt external devices; the verification information processing program is used for acquiring user verification information matched with the first user identification information in the terminal database; the user verification information comprises authentication information, biological identification information and the like stored by the first user for the terminal equipment;
specifically, the biometric identification operation is realized by the matching between the fingerprint information acquisition module, the facial information acquisition module, the pickup comparison module, the second power amplifier module, the alarm module and the check information processing program: the biological authentication module prompts a second user to select a fingerprint verification mode or a face verification mode through the second power amplification module; the biometric authentication module acquires first fingerprint information of the second user through the fingerprint information acquisition module when the second user selects the fingerprint verification mode; the biometric authentication module acquires first facial information of the second user through the facial information acquisition module when the second user selects the facial verification mode; the biological authentication module captures voice information output by the second user when the fingerprint verification mode or the face verification mode is selected through the pickup comparison module, and the biological authentication module identifies a first voice feature in the voice information through the pickup comparison module; the biometric authentication module extracts a second voice feature, second facial information and second fingerprint information in the user verification information through the verification information processing program; the biological authentication module calls the regular expression matching algorithm through the verification information processing program to compare whether the first voice feature is matched with the second voice feature; if the first terminal is not matched with the second terminal, the biological authentication module sends first alarm information to a management background of the first terminal through the alarm module; the management background comprises but is not limited to a network security center; if the first face information and the second face information are matched, the biological authentication module calls the regular expression matching algorithm through the verification information processing program to compare the first fingerprint information with the second fingerprint information, or compares the first face information with the second face information; in the embodiment, the regular expression matching algorithm is adopted for matching, the compiling difficulty is low, the screening and checking results are accurate, the operation is convenient, the memory occupancy rate is small, the checking efficiency is high, and whether abnormal users exist or not is determined at the first time; if the first fingerprint information is matched with the second fingerprint information when the second user selects the fingerprint verification mode, or the first face information is matched with the second face information when the second user selects the face verification mode, the biometric authentication module calls the password input module to output the first password input interface; if the first fingerprint information is not matched with the second fingerprint information when the second user selects the fingerprint verification mode, or the first face information is not matched with the second face information when the second user selects the face verification mode, the biometric authentication module sends second warning information to a management background of the first terminal through the warning module; correspondingly, the voice characteristic is difficult to imitate, so the voice verification is firstly carried out through the pickup comparison module, and it is conceivable that the voice adopted when the terminal equipment starts to input the verification information of the user should be the same as that for asking the user to speak and select the fingerprint verification mode and asking the user to speak and select the face verification mode, so that the voice characteristic capable of being compared exists under two different conditions, and the verification safety is further improved to a certain extent; correspondingly, in this embodiment, the second user is a user that accesses the terminal device by using the same information as the first user immediately after the first user leaves the terminal device, but at the same time, the second user includes but is not limited to the first user; correspondingly, the safety of the information of the user is further improved through a judgment mode combining voice verification and biological identification verification, and because the safety levels of fingerprint verification and face verification are relatively close, the two modes are not verified in one mode at the same time in the embodiment; in this embodiment, the first warning information is different from the second warning information; the first alarm information is alarm information made under the condition of different sounds, and the alarm level of the first alarm information is greater than that of the second alarm information; in the embodiment, the alarm level represents the threat of the abnormal user access condition to the first user; correspondingly, it is conceivable that, after the alarm information is sent out, the management background may contact other devices of the first user immediately and inform the first user to freeze an account or transfer information, and the like; correspondingly, through the password backup protection module, the information and the password of the user are further protected after the user leaves, the defects of the prior art are overcome, meanwhile, the user information is further prevented from being revealed by adopting a new framework and logic cooperation, and the practicability and the safety are high.
The intelligent password input system of preventing revealing that this embodiment described, can be through the password keying-in module, interface encryption module, mutually support between password processing module and the reserve protection module of password, when user input password, in the user input password, under three kinds of scenes behind the user input password, the omnidirectional has protected user's password and information, user privacy's disclosure has been prevented, very big improvement user's experience is felt and the degree of trust at terminal, the not enough of prior art has been compensatied, high market value and product competitiveness have.
Example 2
The embodiment provides an intelligent leakage-proof password input method, as shown in fig. 2 and 3, including the following steps:
s100, a first interface output step:
step S100 specifically includes:
s110, setting a sensing threshold value; acquiring sensing information; outputting a first password entry interface based on the sensing threshold and the sensing information;
specifically, a distance sensor and a first power amplifier module are configured; configuring an image sensor and an indicating module; calling the distance sensor to obtain first distance information between a first user and the distance sensor, setting the first distance information as the sensing information, and comparing whether the sensing information is not greater than the sensing threshold value; if the current state is not larger than the preset threshold value, the indicating module is adjusted to be in a lighting state, and the first user is prompted to face the indicating module through the first power amplifier module in a voice mode; calling the image sensor to acquire the face information detection condition of the first user; if the face information detection condition is that the face information of the first user is captured, outputting the first password input interface;
specifically, the step of outputting the first password entry interface further includes:
configuring a gray value set configuration program, and calling configuration parameters and a gray value matching set of the gray value set configuration program and distance information and the gray value matching set; configuring an interface construction program, and calling the interface construction program to construct the first password input interface; acquiring first display screen parameter information of a first terminal, screening first gray value information matched with the first display screen parameter information from the parameter and gray value matching set, and adjusting the gray value of the display screen of the first terminal according to the first gray value information;
after adjusting the gray value of the display screen of the first terminal according to the first gray value information, outputting a plurality of interface display areas to the first display screen of the first terminal, and prompting the first user to select the interface display areas; setting the interface display area selected by the first user as a first area; calling the image sensor to obtain second distance information between the face of the first user and the first display screen, screening second gray value information matched with the second distance information from the distance information and gray value matching set, adjusting the gray value of the display screen corresponding to the first area in the first display screen according to the second gray value information, and outputting the first password input interface to the first area after the gray value of the display screen is adjusted.
S200, a second interface output step:
step S200 specifically includes:
s210, configuring a character value and password arrangement sequence matching table; detecting first touch information of the first password input interface; generating a second password input interface based on the character value and password arrangement sequence matching table and the first touch information;
specifically, a digit information setting program is configured, and digit information is set through the digit information setting program; acquiring the first touch information of the first password input interface on the first display screen, converting the first touch information into a first character value, and acquiring second time; extracting a third character value matched with the digit information in the second time; calculating an absolute value of a difference between the first character value and the third character value, and setting the absolute value as a fourth character value; screening out a first password arrangement sequence matched with the fourth character value from the character value and password arrangement sequence matching table; and adjusting the password layout in the first password input interface on the first display screen according to the first password arrangement sequence to obtain the second password input interface.
S300, user password encryption:
step S300 specifically includes:
s310, obtaining the typing completion degree information of the second password typing interface; performing a password encryption operation based on the keying-in completion information and generating an interval detection signal;
specifically, a password entry area and a password confirmation area are identified in the second password entry interface; acquiring second touch information for the second password input interface on the first display screen; identifying whether the coordinate information in the second touch information belongs to the password input area; if the current password is the first touch information, converting the second touch information into a second character value, integrating the first character value and the second character value to obtain a user key, and setting the typing completion degree information as password typing to be completed; if not, identifying whether the coordinate information in the second touch information belongs to the password confirmation area, and if so, setting the keying-in completion degree information as password keying-in completion; and when the keying-in completion degree information is that the password keying-in is completed, executing the password encryption operation and generating the interval detection signal.
Specifically, the step of the cryptographic operation further includes: configuring a splitting algorithm compiling program, and calling the splitting algorithm compiling program to compile a key splitting algorithm and a time character splitting algorithm; configuring an integration algorithm compiling program, and calling the integration algorithm compiling program to compile a data integration algorithm; configuring an encryption algorithm configuration program and an encryption space dividing program; calling the encryption algorithm configuration program for configuring an encryption algorithm; calling the encryption space dividing program to divide the encryption space in the virtual memory of the first terminal; specifically, the encryption algorithm includes: an asymmetric encryption algorithm;
the cryptographic operation comprises: splitting the user key through the key splitting algorithm to obtain a plurality of split keys; acquiring third time, and splitting the third time through the time character splitting algorithm to obtain a plurality of encrypted characters; integrating the plurality of split keys and the plurality of encrypted characters through the data integration algorithm to obtain a first encrypted key; calling the asymmetric encryption algorithm to encrypt the first encryption key to obtain a second encryption key; and saving the second encryption key to the encryption space.
S400, backup identification protection:
step S400 specifically includes:
s410, setting a time threshold; executing timing operation based on the interval detection signal to obtain first time; acquiring an abnormal user access condition based on the time threshold and the first time, and executing a biological identification operation based on the abnormal user access condition;
specifically, a time period setting program and a database building program are configured, the time period setting program is called to set a detection time period, and the database building program is called to build a terminal database; after receiving the interval detection signal, executing the timing operation to obtain the first time; comparing whether the first time reaches the time threshold value or not, if so, acquiring first user identification information matched with the user key in the terminal database, and detecting whether an access request matched with the first user identification information exists in the first terminal every other detection time period; if so, setting the abnormal user access condition as the abnormal user access; if the abnormal user access condition does not exist, setting the abnormal user access condition as that the abnormal user access does not exist; when the abnormal user access condition is that abnormal user access exists, the biological recognition operation is executed;
specifically, the biometric operation further includes:
a fingerprint information acquisition module, a face information acquisition module, a pickup comparison module, a second power amplifier module, an alarm module and a check information processing program are configured; the alarm module is in communication connection with the first terminal; configuring a regular expression matching algorithm in the check information processing program; calling the verification information processing program to acquire user verification information matched with the first user identification information in the terminal database;
calling the second power amplification module to prompt a second user to select a fingerprint verification mode or a face verification mode through voice; calling the fingerprint information acquisition module to acquire first fingerprint information of the second user when the second user selects the fingerprint verification mode; calling the face information acquisition module to acquire first face information of the second user when the second user selects the face verification mode; calling the pickup comparison module to capture voice information output by the second user, and identifying a first voice feature in the voice information; calling the verification information processing program to extract a second voice feature, second face information and second fingerprint information in the user verification information;
calling the regular expression matching algorithm through the check information processing program to compare whether the first voice feature is matched with the second voice feature; if not, calling the alarm module to send first alarm information to a management background of the first terminal; if the first face information and the second face information are matched, calling the regular expression matching algorithm through the verification information processing program to compare the first fingerprint information with the second fingerprint information or compare the first face information with the second face information; if the first fingerprint information is matched with the second fingerprint information when the second user selects the fingerprint verification mode, or the first face information is matched with the second face information when the second user selects the face verification mode, calling the password input module to output the first password input interface; and if the first fingerprint information is not matched with the second fingerprint information when the second user selects the fingerprint verification mode, or the first face information is not matched with the second face information when the second user selects the face verification mode, calling the alarm module to send second alarm information to a management background of the first terminal.
The intelligent leakage-proof password input method described in this embodiment can protect the password and information of the user in all directions in the password input by the user and in the three situations after the password input by the user, thereby preventing the leakage of the privacy of the user, greatly improving the experience feeling of the user and the reliability of the terminal, making up the defects of the prior art, and having extremely high market value and product competitiveness.
Example 3
The present embodiments provide a computer-readable storage medium comprising:
the storage medium is used for storing computer software instructions for implementing the intelligent leakage-proof password input method described in embodiment 2, and includes a program for executing the intelligent leakage-proof password input method; specifically, the executable program may be embedded in the intelligent leakage-proof password input system described in embodiment 1, so that the intelligent leakage-proof password input system may implement the intelligent leakage-proof password input method described in embodiment 2 by executing the embedded executable program.
Furthermore, the computer-readable storage medium of the present embodiments may take any combination of one or more readable storage media, where a readable storage medium includes an electronic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof.
Different from the prior art, the intelligent leakage-proof password input system, the intelligent leakage-proof password input method and the intelligent leakage-proof password input medium can achieve the intelligent password input change rule through the system, the anti-peeping function is achieved through the image processing design, the password of the user is protected in multiple directions, the safety of the terminal device is improved in an all-round mode, a smart design concept is provided for the system through the method, the user experience is finally improved, the user reliability on the terminal device is finally improved, the defects of the prior art are overcome, and the intelligent leakage-proof password input system, the intelligent leakage-proof password input method and the intelligent leakage-proof password input medium have high market value and high product competitiveness.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, and a program that can be implemented by the hardware and can be instructed by the program to be executed by the relevant hardware may be stored in a computer readable storage medium, where the storage medium may be a read-only memory, a magnetic or optical disk, and the like.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. The utility model provides an intelligent password input system of preventing revealing which characterized in that includes: the password protection device comprises a password input module, an interface encryption module, a password processing module and a password backup protection module;
a sensing threshold value setting program is configured in the password input module and used for setting a sensing threshold value; the password input module is used for acquiring sensing information and outputting a first password input interface based on the sensing threshold and the sensing information;
the interface encryption module is provided with an arrangement sequence configuration program, and the arrangement sequence configuration program is used for configuring a character value and password arrangement sequence matching table; the interface encryption module is used for detecting first touch information of the first password input interface, and the interface encryption module generates a second password input interface based on the character value and password arrangement sequence matching table and the first touch information;
the password processing module is used for acquiring keying-in completion degree information of the second password keying-in interface, executing password encryption operation based on the keying-in completion degree information and sending interval detection signals to the password backup protection module;
a time threshold setting program is configured in the password backup protection module and used for setting a time threshold; the password backup protection module is used for executing timing operation according to the interval detection signal to obtain first time; and the password backup protection module acquires the abnormal user access condition based on the time threshold and the first time, and executes the biological identification operation based on the abnormal user access condition.
2. The intelligent anti-disclosure password input system of claim 1, wherein the password entry module comprises: the system comprises a user on-site detection module and an interface output module; the user on-site detection module is provided with a distance sensor and a first power amplifier module; the interface output module is provided with an image sensor and an indication module;
the image sensor and the indicating module are arranged outside the interface output module in parallel; the user presence detection module is in communication connection with the image sensor and the indication module;
the user in-place detection module is used for calling the distance sensor to acquire first distance information between a first user and the user in-place detection module, setting the first distance information as the sensing information by the user in-place detection module, and comparing whether the sensing information is not greater than the sensing threshold value; if the current state is not larger than the preset threshold value, the user in-place detection module adjusts the indication module to be in a lighting state, and the user in-place detection module prompts the first user to face the indication module through the first power amplifier module in a voice mode;
the user presence detection module is also used for calling the image sensor to acquire the face information detection condition of the first user; if the face information detection condition is that the face information of the first user is captured, the user in-place detection module sends a first interface output signal to the interface output module;
the interface output module is used for outputting the first password input interface according to the first interface output signal.
3. The intelligent anti-disclosure password input system of claim 2, wherein the interface output module comprises: the system comprises an image processing module, a region selection module and an interface release module; the interface delivery module is in communication connection with the image processing module and the image sensor;
a gray value set configuration program is configured in the image processing module, and the gray value set configuration program is used for configuring a parameter and gray value matching set and distance information and gray value matching set;
an interface construction program is configured in the interface release module, and the interface construction program is used for constructing the first password input interface;
the image processing module is used for acquiring first display screen parameter information of a first terminal carried by the user on-site detection module, screening out first gray value information matched with the first display screen parameter information from the parameter and gray value matching set by the image processing module, and adjusting the gray value of the display screen of the first terminal according to the first gray value information;
the area selection module is used for outputting a plurality of interface display areas to a first display screen of the first terminal after the image processing module adjusts the gray value of the display screen of the first terminal according to the first gray value information, and the area selection module prompts the first user to select the interface display areas; the area selection module sets the interface display area selected by the first user as a first area;
the interface releasing module is used for calling the image sensor to acquire second distance information between the face of the first user and the first display screen, screening second gray value information matched with the second distance information from the distance information and gray value matching set by the interface releasing module, calling the image processing module by the interface releasing module to adjust the gray value of the display screen corresponding to the first area in the first display screen according to the second gray value information, and outputting the first password input interface to the first area after the gray value of the display screen is adjusted by the interface releasing module.
4. The intelligent anti-disclosure password input system of claim 3, wherein the interface encryption module comprises: the system comprises a touch detection module, a character value calculation module and a password scrambling module; a digit information setting program is arranged in the character value calculation module and used for setting digit information;
the touch detection module is used for acquiring the first touch information of the first password input interface on the first display screen, converting the first touch information into a first character value and sending a calculation signal to the character value calculation module;
the character value calculating module is used for acquiring a second time after receiving the calculating signal; the character value calculation module extracts a third character value matched with the digit information in the second time; the character value calculation module calculates an absolute value of a difference between the first character value and the third character value, and sets the absolute value as a fourth character value;
the password scrambling module is used for screening out a first password arrangement sequence matched with the fourth character value from the character value and password arrangement sequence matching table; and the password scrambling module adjusts the password layout in the first password input interface on the first display screen according to the first password arrangement sequence to obtain the second password input interface.
5. The intelligent anti-disclosure password input system of claim 4, wherein the password processing module comprises: the password completion degree detection module and the password encryption module; the second password input interface comprises a password input area and a password confirmation area;
the password completion detection module is used for acquiring second touch information of the first display screen for the second password input interface; the password completion detection module identifies whether the coordinate information in the second touch information belongs to the password input area; if the user key is the password key, the password completion detection module converts the second touch information into a second character value, integrates the first character value and the second character value to obtain a user key, and sets the key input completion information as the password key to be input; if not, the password completion detection module identifies whether the coordinate information in the second touch information belongs to the password confirmation area, and if so, the password completion detection module sets the typing completion information as password typing completion;
and the password encryption module is used for executing the password encryption operation and sending an interval detection signal to the password backup protection module when the keying-in completion degree information is that the password keying-in is completed.
6. The intelligent anti-disclosure password input system of claim 5, wherein the password encryption module comprises: the system comprises a data splitting module, a data integration module and an algorithm encryption module;
a splitting algorithm compiling program is configured in the data splitting module, and the splitting algorithm compiling program is used for compiling a key splitting algorithm and a time character splitting algorithm;
an integration algorithm compiling program is configured in the data integration module, and the integration algorithm compiling program is used for compiling a data integration algorithm;
the algorithm encryption module is provided with an encryption algorithm configuration program and an encryption space division program; the encryption algorithm configuration program is used for configuring an encryption algorithm;
the encryption space dividing program is used for dividing an encryption space in a virtual memory of the first terminal; the encryption algorithm comprises: an asymmetric encryption algorithm;
the password encryption operation is realized by the mutual cooperation among the data splitting module, the data integration module and the algorithm encryption module:
the data splitting module splits the user key through the key splitting algorithm to obtain a plurality of split keys; the data splitting module obtains a third time, and splits the third time through the time character splitting algorithm to obtain a plurality of encrypted characters;
the data integration module integrates the split keys and the encrypted characters through the data integration algorithm to obtain a first encrypted key;
the algorithm encryption module encrypts the first encryption key by calling the asymmetric encryption algorithm to obtain a second encryption key; and the algorithm encryption module stores the second encryption key into the encryption space.
7. The intelligent anti-disclosure password input system of claim 6, wherein the password backup protection module comprises: the system comprises a time schedule controller, a user information comparison module and a biological authentication module; a time period setting program and a database building program are configured in the user information comparison module, wherein the time period setting program is used for setting a detection time period, and the database building program is used for building a terminal database;
the time schedule controller is used for executing the timing operation after receiving the interval detection signal to obtain the first time; the time schedule controller compares whether the first time reaches the time threshold value, and if so, the time schedule controller sends an abnormal user detection signal to the user information comparison module;
the user information comparison module is used for acquiring first user identification information matched with the user key in the terminal database after receiving the abnormal user detection signal, and detecting whether an access request matched with the first user identification information exists in the first terminal every other detection time period; if the abnormal user access condition exists, the user information comparison module sets the abnormal user access condition as the abnormal user access condition; if the abnormal user access condition does not exist, the user information comparison module sets the abnormal user access condition as that the abnormal user access does not exist;
the biometric authentication module is used for executing the biometric identification operation when the abnormal user access condition is that the abnormal user access exists.
8. The intelligent leakage-proof password input system according to claim 7, wherein the biometric authentication module is provided with a fingerprint information acquisition module, a facial information acquisition module, a pickup comparison module, a second power amplifier module, an alarm module and a check information processing program; the alarm module is in communication connection with the first terminal; a regular expression matching algorithm is configured in the check information processing program;
the verification information processing program is used for acquiring user verification information matched with the first user identification information in the terminal database;
the biological identification operation is realized by the mutual cooperation among the fingerprint information acquisition module, the facial information acquisition module, the pickup comparison module, the second power amplifier module, the alarm module and the check information processing program:
the biological authentication module prompts a second user to select a fingerprint verification mode or a face verification mode through the second power amplification module;
the biometric authentication module acquires first fingerprint information of the second user through the fingerprint information acquisition module when the second user selects the fingerprint verification mode;
the biometric authentication module acquires first facial information of the second user through the facial information acquisition module when the second user selects the facial verification mode;
the biological authentication module captures voice information output by the second user when the fingerprint verification mode or the face verification mode is selected through the pickup comparison module, and the biological authentication module identifies a first voice feature in the voice information through the pickup comparison module;
the biometric authentication module extracts second fingerprint information, second facial information and second voice characteristics in the user verification information through the verification information processing program;
the biological authentication module calls the regular expression matching algorithm through the verification information processing program to compare whether the first voice feature is matched with the second voice feature; if the first terminal is not matched with the second terminal, the biological authentication module sends first alarm information to a management background of the first terminal through the alarm module; if the first face information and the second face information are matched, the biological authentication module calls the regular expression matching algorithm through the verification information processing program to compare the first fingerprint information with the second fingerprint information, or compares the first face information with the second face information; if the first fingerprint information is matched with the second fingerprint information when the second user selects the fingerprint verification mode, or the first face information is matched with the second face information when the second user selects the face verification mode, the biometric authentication module calls the password input module to output the first password input interface; and if the first fingerprint information is not matched with the second fingerprint information when the second user selects the fingerprint verification mode, or the first face information is not matched with the second face information when the second user selects the face verification mode, the biological authentication module sends second warning information to a management background of the first terminal through the warning module.
9. An intelligent leakage-proof password input method is characterized by comprising the following steps:
a first interface output step: setting a sensing threshold value; acquiring sensing information; outputting a first password entry interface based on the sensing threshold and the sensing information;
a second interface output step: configuring a character value and password arrangement sequence matching table; detecting first touch information of the first password input interface; generating a second password input interface based on the character value and password arrangement sequence matching table and the first touch information;
a user password encryption step: acquiring the typing completion degree information of the second password typing interface; performing a password encryption operation based on the keying-in completion information and generating an interval detection signal;
backup identification and protection: setting a time threshold; executing timing operation based on the interval detection signal to obtain first time; and acquiring an abnormal user access condition based on the time threshold and the first time, and executing a biological identification operation based on the abnormal user access condition.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the intelligent, leak-proof password entry method of claim 9.
CN202111180630.8A 2021-10-11 2021-10-11 Intelligent leakage-proof password input system, method and medium Pending CN113918903A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111180630.8A CN113918903A (en) 2021-10-11 2021-10-11 Intelligent leakage-proof password input system, method and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111180630.8A CN113918903A (en) 2021-10-11 2021-10-11 Intelligent leakage-proof password input system, method and medium

Publications (1)

Publication Number Publication Date
CN113918903A true CN113918903A (en) 2022-01-11

Family

ID=79238876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111180630.8A Pending CN113918903A (en) 2021-10-11 2021-10-11 Intelligent leakage-proof password input system, method and medium

Country Status (1)

Country Link
CN (1) CN113918903A (en)

Similar Documents

Publication Publication Date Title
Shah et al. Recent trends in user authentication–a survey
US10635054B2 (en) Authentication system and method thereof
US10588017B2 (en) System and method for implicit authentication
US11057413B2 (en) System and method for behavioural biometric authentication using program modelling
US9652760B2 (en) Receiving fingerprints through touch screen of CE device
CN105447691A (en) E-card transaction authorization based on geographic location
CN105550557B (en) A kind of method and terminal device entering not homologous ray by fingerprint recognition
JP2017526095A (en) User authentication method and system using variable keypad and biometric authentication
CN107133993A (en) A kind of image processing method and device
US20180349588A1 (en) Remote fingerprinting sensor
CN105243306A (en) Biometric identification USB KEY apparatus and device
KR101451639B1 (en) Identification and theft prevention system using one times random key, and method thereof
CN108491713B (en) Safety reminding method and electronic equipment
CN105550626A (en) Iris identification method and apparatus
KR102160656B1 (en) Login Method Using Palm Vein
CN106534479A (en) Cell phone password protection system based on implicit code identification and implicit conversion
CN113918903A (en) Intelligent leakage-proof password input system, method and medium
CN107329678A (en) Unlocking method, device and the electric terminal of electric terminal
CN105550572A (en) Password modifying method and system
WO2018006319A1 (en) Alarm method and system
CN113163392A (en) Method and device for deleting user identity data file
WO2018006346A1 (en) Police calling method and system based on mobile terminal and ultrasound
CN112464196B (en) Bluetooth headset connection method, device and storage medium
WO2018006323A1 (en) Mobile terminal-based verification method and system
US20210303666A1 (en) Authentication system and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination