CN1722876A - Electronic device having composite picture cipher security mechanism and composite picture cipher security method - Google Patents

Electronic device having composite picture cipher security mechanism and composite picture cipher security method Download PDF

Info

Publication number
CN1722876A
CN1722876A CNA2004100528324A CN200410052832A CN1722876A CN 1722876 A CN1722876 A CN 1722876A CN A2004100528324 A CNA2004100528324 A CN A2004100528324A CN 200410052832 A CN200410052832 A CN 200410052832A CN 1722876 A CN1722876 A CN 1722876A
Authority
CN
China
Prior art keywords
electronic installation
password
picture
cryptosecurity
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2004100528324A
Other languages
Chinese (zh)
Inventor
陈旭东
何代水
蔡世光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Appliances Shanghai Corp
Original Assignee
Inventec Appliances Shanghai Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Appliances Shanghai Corp filed Critical Inventec Appliances Shanghai Corp
Priority to CNA2004100528324A priority Critical patent/CN1722876A/en
Publication of CN1722876A publication Critical patent/CN1722876A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

This invention relates to an electronic installation with pasteup code secret mechanism, which comprises: a interface, used for display several graphic expressions, wherein each graphic expression is associated with one figure; an input unit, used for selecting one graphic expression from the groups, and the input unit will output the figure associated to this graphic expression as the input code; a comparison unit, used for receiving the input code, and comparing whether the input code is coincident with the system code, if it is, then allowing the user to operate the electronic installation, if not, ask the user to select again.

Description

Electronic installation and picture mosaic cryptosecurity method with picture mosaic cryptosecurity mechanism
Technical field
The present invention is relevant for a kind of cryptosecurity mechanism, particularly relevant for a kind of electronic installation and picture mosaic cryptosecurity method with picture mosaic cryptosecurity mechanism.
Background technology
Current information society is the society that electronic product spreads unchecked, and also is the society that password spreads unchecked.Many electronic products, for example fiscard, mobile phone, PC or the like, all needing accesses to your password is protected.In general, most electronic product uses numeral or literal more than 4 to 10 to be used as password.Yet, when the user has a lot of electronic product simultaneously, often forget pairing correct digit of each electronic product or literal easily, so that can't normally use this electronic product.Its root problem is when numeral or literal are too much, and human brain can't clearly will all remember, thereby is easy to generate and obscures.
Summary of the invention
In view of this, purpose of the present invention just is to utilize human memory capability to image much larger than the principle to the memory capability of numeral or literal, one picture group shown with set of number be associated together, make the user under illustrated prompting, directly select with as the input password, thereby alleviate user's memory burden, reduce the password forgetting rate, and avoid forgeing the time waste that produces because of password.
The invention provides a kind of electronic installation, comprising with picture mosaic cryptosecurity mechanism: an interface, in order to show several diagrams, wherein each diagram joins with a digital correlation; One input unit is used for a user by selecting a picture group to show in these diagrams, and this input unit will show that the set of number that is associated is used as an input password and exported with this picture group; And a comparing unit, receive this input password, whether match in order to compare this an input password and a system password, if comparison coincide, then allow this user to operate this electronic installation, otherwise require this user to reselect.
The present invention also provides a kind of picture mosaic cryptosecurity method, in order to protect an electronic installation, may further comprise the steps: provide several diagrams, wherein each diagram and digital correlation connection; By selecting a picture group to show in these diagrams, and will show that the set of number that is associated is used as an input password with this picture group; Whether compare this an input password and a system password matches; And, then allow a user to operate this electronic installation, otherwise require this user to reselect if comparison coincide.
Description of drawings
For above-mentioned purpose of the present invention, feature and advantage can be become apparent, especially exemplified by preferred embodiment, and conjunction with figs., be described in detail below:
Fig. 1 has represented to have the mobile phone of picture mosaic cryptosecurity mechanism.
Fig. 2 has represented the element schematic diagram of mobile phone.
Fig. 3 has represented picture and cell phone keyboard correspondence table.
Fig. 4 has represented the operating process of picture mosaic cryptosecurity mechanism.
Fig. 5 has represented the operating process of picture mosaic password assisted memory pattern.
Embodiment
Main spirit of the present invention is a picture group shown with set of number and is associated together, and makes the user under illustrated prompting, directly selects with as the input password.
Fig. 1 represents to have the mobile phone 10 of picture mosaic cryptosecurity mechanism.Fig. 2 represents the element schematic diagram of mobile phone 10.Fig. 3 represents picture and cell phone keyboard correspondence table 15.As shown in Figure 2, mobile phone 10 of the present invention has a LCD screen (Liquid Crystal Display, LCD) 11, one microprocessor (Micro Processing Unit, MPU) 12 and one input unit 14.As shown in Figure 1, input unit 14 has a plurality of buttons 141, directionkeys 142, acknowledgement key 143 and cancel key 144, and each button 141 is represented a numeral (" 0 " arrives " 9 ") or symbol (" * " reaches " # ").Beneath operating process by picture mosaic cryptosecurity mechanism illustrates the present invention.
Fig. 4 represents the operating process of picture mosaic cryptosecurity mechanism.At first, when mobile phone 10 entered picture mosaic cryptosecurity mechanism, in step S1, several diagrams that microprocessor (MPU) 12 will provide in advance were presented on the LCD screen (LCD) 11 and select for the user.This picture group shows that arrangement mode when showing (as shown in Figure 1, in regular turn by upper left to the bottom right) is identical with the arrangement mode of button, and it is interrelated to be positioned at the diagram and the button of aligned identical position.That is, button " 1 " and picture 1 associated, button " 2 " and picture 2 associated ... and by that analogy, these relations are recorded in picture and the cell phone keyboard correspondence table, as shown in Figure 3.
Then, in step S2, the user according to one both definite sequence for example select picture 5, picture 7, picture 2 and picture 9 in regular turn by selecting a picture group to show in these diagrams.Need remark additionally herein, the user can be via pushing button 141, for example push button in regular turn " 5 ", button " 7 ", button " 2 " and button " 9 ", select required diagram, perhaps, via the four direction up and down of direction of operating key 142, and cooperate acknowledgement key 143 and cancel key 144, select required diagram.
Then, in step S3, input unit 14 shows the set of number that is associated by finding out with this picture group in picture and the cell phone keyboard correspondence table, with as the input password, and exports this input password to microprocessor (MPU) 12.When microprocessor (MPU) 12 received this input password, in step S4, microprocessor (MPU) 12 showed this input password to cover symbol (shown in the 1st figure it " * * * * ") on LCD screen 11.
Then, in judging formula C1, whether the user uses this input password via pressing acknowledgement key 143 or cancel key 144 with decision.If not, then get back to step S2 and allow the user reselect diagram, if, then continuing to carry out judgement formula C2, microprocessor (MPU) 12 judges whether system password exists.
If system password does not exist, the expression mobile phone was not set system password, and then in step S5, microprocessor (MPU) 12 is a system password with this input password setting.Get back to step S2 then, allow the user TRY ANOTHER SELECTION to confirm.If system password exists, then in judging formula C3, whether this input password of microprocessor (MPU) 12 comparisons and existing system password match.If match, then enter step S6, microprocessor (MPU) 12 allows the user to operate this mobile phone, arrives this, and picture mosaic cryptosecurity mechanism finishes, and the handset displays normal pictures is operated for the user.
If this input password is misfitted with existing system password, then in judgement formula C4, microprocessor (MPU) 12 judges that comparison result is whether the number of times of misfitting is above 3 times.If surpass 3 times, then get back to step S2 and allow the user reselect diagram, if surpass 3 times, then enter step S7, microprocessor (MPU) 12 persons of banning use of operate this mobile phone, use this mobile phone of protection and are used by not clear personage avoiding.
In addition, in the present invention, also can provide picture mosaic password assisted memory pattern, judging comparison results when microprocessor (MPU) 12 is that the number of times of misfitting is when having surpassed 3 times, then enter this picture mosaic password assisted memory pattern, help the user and regain system password.
Fig. 5 represents the operating process of picture mosaic password assisted memory pattern.When aforesaid picture mosaic cryptosecurity mechanism is carried out judgement formula C4, and judged result is true time, enters picture mosaic password assisted memory pattern.At first, in judging formula C101, microprocessor (MPU) 12 judges whether the user is the picture mosaic password assisted memory pattern that enters for the first time, if do not store the answer of any assisted memory problem in the expression mobile phone, then execution in step S101.In step S101, microprocessor (MPU) 12 is presented at assisted memory problem one on the LCD screen (LCD) 11, and in step S102, the user is via the answer of input unit 14 input assisted memory problems one.Then, in step S103, microprocessor (MPU) 12 is presented at assisted memory problem two on the LCD screen (LCD) 11, and in step S104, the user is via the answer of input unit 14 input assisted memory problems two.Then, in step S105, microprocessor (MPU) 12 stores above-mentioned two answers to answer as correct.Then, proceed to step S106.
Another kind of situation is that in judging formula C101, microprocessor (MPU) 12 judgements learn that the user enters picture mosaic password assisted memory pattern, then execution in step S106 for the first time.In step S106, microprocessor (MPU) 12 is presented at assisted memory problem one on the LCD screen (LCD) 11, and in step S107, the user answers assisted memory problem one via input unit 14.Then, in step S108, microprocessor (MPU) 12 is presented at assisted memory problem two on the LCD screen (LCD) 11, and in step S109, the user answers assisted memory problem two via input unit 14.Then, in judging formula C102, microprocessor (MPU) 12 judges whether twice answer of user be all correct, if, execution in step S110 then, microprocessor (MPU) 12 is presented at system password on the LCD screen (LCD), allows the user can regain this system password.Then, proceed to step S6, microprocessor (MPU) 12 allows the user to operate this mobile phone.
Incorrect as if having at least once in twice answer of user, then in judging formula C103, microprocessor (MPU) 12 judges that answering results is whether incorrect number of times is above 3 times.If surpass 3 times, then get back to step S106 and allow the user answer again, if surpass 3 times, then enter step S7, microprocessor (MPU) 12 persons of banning use of operate this mobile phone, use this mobile phone of protection and are used by not clear personage avoiding.
In these supplementary notes, this picture mosaic password assisted memory pattern can be got back to the picture mosaic cryptosecurity mechanism of the 3rd figure after execution of step S6 or S7.
In addition, can store an arbitrarily assisted memory problem in the mobile phone, for example one, more than five or ten, need look the user requirement on the system safety is decided.Will can moreover the assisted memory problem be designed to very intimate deal, for example: good classmate be in the time of your primary school? is your lunar calendar birthday? are you at favorite animal? so can guarantee can not cracked by not clear personage easily.
Among the present invention, the user does not need to remember any numeral or literal, as long as under illustrated prompting, directly selects required diagram, can finish the action of input password.Therefore, the present invention can alleviate user's memory burden, reduces the password forgetting rate, and avoids forgeing the time waste that produces because of password.
In addition, the diagram that mobile phone of the present invention is shown, can be one group to the significant picture of user, the user can be selected according to the personal like, make the operation ease of product and affinity promote significantly.
Though the present invention discloses as above with preferred embodiment; so it is not in order to limit scope of the present invention; anyly be familiar with present technique field person; without departing from the spirit and scope of the present invention; when can doing a little change and retouching, so protection scope of the present invention is as the criterion when looking accompanying the claim person of defining.

Claims (12)

1. electronic installation with picture mosaic cryptosecurity mechanism comprises:
One interface, in order to show several diagrams, wherein each diagram joins with a digital correlation;
One input unit is used for a user by selecting a picture group to show in these diagrams, and this input unit will show that the set of number that is associated is used as an input password and exported with this picture group; And
Whether one comparing unit receives this input password, match in order to compare this an input password and a system password, if comparison coincide, then allows this user to operate this electronic installation, otherwise requires this user to reselect.
2. the electronic installation with picture mosaic cryptosecurity mechanism as claimed in claim 1 is characterized in that, this electronic installation is a mobile phone.
3. the electronic installation with picture mosaic cryptosecurity mechanism as claimed in claim 1, it is characterized in that, this user is according to a both definite sequence, in these diagrams, select this picture group to show via this input unit, and this input unit will show that this group numeral that is associated is used as this input password and exported with this picture group.
4. the electronic installation with picture mosaic cryptosecurity mechanism as claimed in claim 1 is characterized in that, when this comparison result is the number of times of misfitting when surpassing a preset value, this comparing unit forbids that this user operates this electronic installation.
5. the electronic installation with picture mosaic cryptosecurity mechanism as claimed in claim 1 is characterized in that, when this system password did not exist, it was this system password that this comparing unit should be imported password setting.
6. the electronic installation with picture mosaic cryptosecurity mechanism as claimed in claim 1, it is characterized in that, this input unit has a plurality of digital keys, arrangement modes when these diagrams show are identical with the arrangement mode of these digital keys, and it is interrelated to be positioned at the diagram and the digital keys of aligned identical position.
7. picture mosaic cryptosecurity method in order to protect an electronic installation, may further comprise the steps:
Provide several diagrams, wherein each diagram and digital correlation connection;
By selecting a picture group to show in these diagrams, and will show that the set of number that is associated is used as an input password with this picture group;
Whether compare this an input password and a system password matches; And
If comparison coincide, then allow a user to operate this electronic installation, otherwise require this user to reselect.
8. picture mosaic cryptosecurity method as claimed in claim 7 is characterized in that this electronic installation is a mobile phone.
9. picture mosaic cryptosecurity method as claimed in claim 7, it is characterized in that, should be by selecting one group of illustrated step system in these diagrams according to a both definite sequence, by selecting this picture group to show in these diagrams, and will show that this group numeral that is associated is used as this input password with this picture group.
10. picture mosaic cryptosecurity method as claimed in claim 7 is characterized in that, when this comparison result is the number of times of misfitting when surpassing a preset value, forbids that this user operates this electronic installation.
11. picture mosaic cryptosecurity method as claimed in claim 7 is characterized in that, when this system password did not exist, should import password setting was this system password.
12. picture mosaic cryptosecurity method as claimed in claim 7, it is characterized in that, this electronic installation has a plurality of digital keys, and the arrangement modes when these diagrams show are identical with the arrangement mode of these digital keys, and it is interrelated to be positioned at the diagram and the digital keys of aligned identical position.
CNA2004100528324A 2004-07-14 2004-07-14 Electronic device having composite picture cipher security mechanism and composite picture cipher security method Pending CN1722876A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2004100528324A CN1722876A (en) 2004-07-14 2004-07-14 Electronic device having composite picture cipher security mechanism and composite picture cipher security method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2004100528324A CN1722876A (en) 2004-07-14 2004-07-14 Electronic device having composite picture cipher security mechanism and composite picture cipher security method

Publications (1)

Publication Number Publication Date
CN1722876A true CN1722876A (en) 2006-01-18

Family

ID=35912755

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2004100528324A Pending CN1722876A (en) 2004-07-14 2004-07-14 Electronic device having composite picture cipher security mechanism and composite picture cipher security method

Country Status (1)

Country Link
CN (1) CN1722876A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034798A (en) * 2012-12-14 2013-04-10 广东欧珀移动通信有限公司 Random password generation method and device
CN103061615A (en) * 2012-12-24 2013-04-24 许晓飞 Anti-theft method
CN103061616A (en) * 2012-12-23 2013-04-24 许晓飞 Electronic lock device
CN103425923A (en) * 2012-05-24 2013-12-04 巴法络股份有限公司 Authentication method and wireless connection device
CN103678963A (en) * 2012-09-11 2014-03-26 腾讯科技(深圳)有限公司 User interaction method, device and system based on graph
CN104091114A (en) * 2014-07-04 2014-10-08 泛意创作有限公司 Authentication password transmitting method and authentication password acquiring method for mobile terminal

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425923A (en) * 2012-05-24 2013-12-04 巴法络股份有限公司 Authentication method and wireless connection device
CN103425923B (en) * 2012-05-24 2017-08-04 巴法络股份有限公司 Authentication method and wireless connection device
CN103678963A (en) * 2012-09-11 2014-03-26 腾讯科技(深圳)有限公司 User interaction method, device and system based on graph
CN103034798A (en) * 2012-12-14 2013-04-10 广东欧珀移动通信有限公司 Random password generation method and device
CN103034798B (en) * 2012-12-14 2016-08-03 广东欧珀移动通信有限公司 A kind of generation method and device of random cipher
CN103061616A (en) * 2012-12-23 2013-04-24 许晓飞 Electronic lock device
CN103061616B (en) * 2012-12-23 2016-05-04 宁波优而雅电器有限公司 Electronic lock equipment
CN103061615A (en) * 2012-12-24 2013-04-24 许晓飞 Anti-theft method
CN104091114A (en) * 2014-07-04 2014-10-08 泛意创作有限公司 Authentication password transmitting method and authentication password acquiring method for mobile terminal

Similar Documents

Publication Publication Date Title
EP0969644B1 (en) Electronic apparatus with fingerprint recognition
US7203521B2 (en) Method of displaying speed dials on a screen of a mobile communication terminal
US7992202B2 (en) Apparatus and method for inputting graphical password using wheel interface in embedded system
KR100664243B1 (en) The apparatus and method for data management of mobile telecommunication terminal
CN104899056A (en) Mobile terminal of entering and restrictedly using application in screen locked state and method
US20110247065A1 (en) Simultaneous screen unlock and operation initiation
JP2012521170A (en) Biometric recognition scan configuration and method
CN1310567A (en) Locking method in mobile communication
CN1856141A (en) Method for displaying data in mobile terminal
JP2008165741A (en) Authentication device, authentication method, authentication program and computer-readable recording medium storing the same
JP2007124470A (en) Portable telephone, its user authentication method, and user authentication program
CN1722876A (en) Electronic device having composite picture cipher security mechanism and composite picture cipher security method
JP2006243938A (en) Password input device
KR100480290B1 (en) A dialing method using phone book of a portable phone
JP2008077159A (en) Input device and electronic apparatus having the same
JP2000182121A (en) Password number input device, method therefor and recording medium recorded with password input program
CN104049722B (en) A kind of information processing method and electronic equipment
KR20080071707A (en) Authorize data input apparatus for prevent secret number leakage
KR20120047684A (en) Mobile communication terminal providing idle screen by user authentication and method for providing idle screen or mobile communication terminal using the same
JP2003216578A (en) Electronic device
KR20050090102A (en) Number fade password input system
KR20040076639A (en) Mobile phone and method for quick dialing using fingerprint recognition
JP2002152368A (en) Method and system for storing password
KR20040021013A (en) Method for displaying instant messenger member status in idle state of cellular phone
JP3298533B2 (en) Apparatus and method for restricting caller ID display in telephone terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication