TW201101086A - Method for password protection - Google Patents

Method for password protection Download PDF

Info

Publication number
TW201101086A
TW201101086A TW98121519A TW98121519A TW201101086A TW 201101086 A TW201101086 A TW 201101086A TW 98121519 A TW98121519 A TW 98121519A TW 98121519 A TW98121519 A TW 98121519A TW 201101086 A TW201101086 A TW 201101086A
Authority
TW
Taiwan
Prior art keywords
area
color
region
password
user
Prior art date
Application number
TW98121519A
Other languages
Chinese (zh)
Inventor
kui-jun Wang
Original Assignee
Hon Hai Prec Ind Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hon Hai Prec Ind Co Ltd filed Critical Hon Hai Prec Ind Co Ltd
Priority to TW98121519A priority Critical patent/TW201101086A/en
Publication of TW201101086A publication Critical patent/TW201101086A/en

Links

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

A method for password protection includes following steps: displaying a graphic region having color changeable on a display according to a predetermined form; recording a color parameter of the graphic region generated in response to a user's operation of selecting the color of the graphic region, and generating an input password information according to the recorded color parameter; and comparing the input information with predetermined password information for verifying the input password information.

Description

201101086 六、發明說明: 【發明所屬之技術領域】 [0001] 本發明涉及訊息安全領域,特別涉及一種密碼保護方法 〇 [先前技術] [0002] 密碼保護在日常生活當中隨處可見,如電腦密碼,密碼 門鎖,銀行密碼等。通常狀況下,用戶利用數位及字元 的組合來作為密碼。然而,利用數位及字元的組合來作 為密碼時,非法用戶可以利用密碼破解軟體來破解合法 〇 用戶的密碼,從而使得合法用戶的資訊得不到有效的保 護。 【發明内容】 [0003] 鑒於此,有必要提供一種保密性能更高的密碼保護方法 〇 [0004] 一種密碼保護方法,包括如下步驟: [0005] 以預設形式在顯示介面上顯示具有顏色的圖形區域,其 〇 中該圖形區域内的顏色可變換; [0006] 記錄因用戶選擇圖形區域上的顏色的操作而產生的該圖 形區域的顏色參數,生成輸入資訊; [0007] 接收用戶的確認操作; [0008] 回應該確認操作,將生成的輸入資訊與預設的密碼資訊 比較,進行密碼驗證。 [0009] 藉由上述密碼保護方法,用戶利用圖形區域内的顏色創 098121519 表單編號A0101 第3頁/共17頁 0982036571-0 201101086 建密碼。用戶只需利用滑鼠、觸摸板等輸入裝置選擇圖 形區域内的顏色,便可完成密碼的輸入操作。由於合法 用戶的密碼是由圖形區域的顏色參數構成’非法用戶無 法藉由密碼破解軟體破解合法用戶的密碼’從而使得用 戶的資訊得到有效保護。 【實施方式】 [0010] [0011] 本實施方式提供一種密碼保護方法,該密碼保護方法可 由存儲在電子設備的記憶體中的一組程式碼來表示’電 子設備在執行該密碼保護方法後,電子設備的顯示介面201101086 VI. Description of the Invention: [Technical Field] [0001] The present invention relates to the field of message security, and more particularly to a method for password protection. [Prior Art] [0002] Password protection can be seen everywhere in daily life, such as computer passwords. Password door lock, bank password, etc. Typically, users use a combination of digits and characters as a password. However, when a combination of digits and characters is used as the password, the illegal user can use the password cracking software to crack the password of the legitimate user, so that the information of the legitimate user cannot be effectively protected. SUMMARY OF THE INVENTION [0003] In view of this, it is necessary to provide a password protection method with higher security performance. [0004] A password protection method includes the following steps: [0005] Displaying a color on a display interface in a preset form a graphics area in which the color in the graphics area is transformable; [0006] recording a color parameter of the graphics area generated by the user selecting an operation on the graphics area to generate input information; [0007] receiving user confirmation [0008] The operation should be confirmed, and the generated input information is compared with the preset password information to perform password verification. [0009] With the above password protection method, the user creates a password by using the color in the graphic area 098121519 Form No. A0101 Page 3 of 17 0982036571-0 201101086. The user can select the color in the graphic area by using an input device such as a mouse or a touchpad to complete the password input operation. Since the password of the legitimate user is composed of the color parameters of the graphic area, the illegal user cannot crack the password of the legitimate user by the password cracking software, so that the user's information is effectively protected. [Embodiment] [0011] The present embodiment provides a password protection method, which may be represented by a set of code codes stored in a memory of an electronic device, after the electronic device performs the password protection method. Display interface of electronic device

I I 上顯示―可變換顏色的圖形區域,電子設備記錄用戶所 選擇的圖形區域内的顏色參數,並將記錄的顏色參數作 為輸入密碼,以此方式進行密碼保幾。其中,電子設備 可以為具有觸摸屏的手機、個人數位助理(PDA)、銀行 ATM櫃員機等。請參閱圖1,該密碼保護方法包括如下步 驟:I I displays the graphic area of the convertible color. The electronic device records the color parameters in the graphic area selected by the user, and uses the recorded color parameter as the input password. The electronic device may be a mobile phone with a touch screen, a personal digital assistant (PDA), a bank ATM teller machine, or the like. Referring to FIG. 1, the password protection method includes the following steps:

;:; J 步驟S100,以預設形式在瑪示介面上顧示密碼輸入介面 。該密碼輸入介面包括一個或多個.區域,每個區域分配 有獨立的變化的顏色。例如:該密碼輸入介面具有第一 區域、第二區域及第三區域。其中,該第一區域、第二 區域及第三區域中顯示的顏色週期性或者隨機地變化。 如圖2所示,電子設備10的觸摸屏20上顯示第一區域30、 第二區域32及第三區域34。該第一區域30為圓形區域’ 該第二區域32、第三區域34為與第一區域30同心之環形 區域。該第二區域32、第三區域34分別被劃分為均等的 四個子區域:子區域320、321、322、323及子區域340 098121519 表單編號A0101 第4頁/共π頁 0982036571-0 201101086 、341、342、343,每個子區域内填充有週期性或者隨 機性變換的顏色,例如,各區域中的顏色可以按照圖3所 示:由紅—黃—藍—綠—紫y白—紅的迴圈順序變化。 相應地’該第一區域3〇、第二區域32的子區域及第三區 域34的子區域具有週期性或者隨機性變化的顏色參數。 由於該第一區域30、第二區域32、第三區域34的各個子 區威的顏色參數存在多種不同的組合,因此,用戶可以 根據個人喜好’選擇各區域中的顏色來配置個人密碼。 [0012] Ο ο 步驟S102 ’記錄因用戶選擇各區域之顏色的輸入操作而 產生的顏色參數’生成輸入資訊。該輸入資訊作為待認 證的密碼資訊。在用戶選擇觸摸屏20顯示的第一區域30 、第二區域32及第三區域34的各子區域的顏色時,開始 記錄對應的顏色參數。其中,在選擇第二區域32及第三 區域34中各子區域的顏色參數時,不僅記錄子區域所包 令的顏色參數’還記錄該等子區域之間所填充的顏色的 組合參數。以第二區域32為例,其四個子區域320、321 、322、323年括紅色和黃色兩種顏色參數,而四個子區 域320、321、322、323填充的顏色分別為紅色、黃色、 紅色、黃色。當然,四個子區域320、321、322、323填 充的顏色也可以分別為黃色 '紅色、黃色、紅色或者紅 色、黃色、黃色、紅色。可以理解,記錄第三區域34各 子區域之的顏色參數時與第二區域32類似,在此不贅述 〇 [0013] 098121519 步驟S104,接收用戶的確認操作、即用戶密碼輸入完畢 的確認操作,該確認操作可以是藉由電子設備1〇的實體 表單編號A0101 第5頁/共π頁 098203657卜0 201101086 按鈕11實現,也可以是藉由觸摸屏20上的觸摸按鈕21實 現,還可以是藉由檢測停止輸入的時間是否達到預定時 間間隔來實現。本實施方式中,藉由觸摸屏20上的觸摸 確認按鈕21實現確認操作,藉由觸摸取消按耘22退出密 瑪輸入介面。 [0014] 步驟S106,回應該碡認操作,將生成的輸入資訊與預設 的密碼資訊比較,進行密碼驗證。該預設的密碼資訊藉 由提供一包含第一區域30、第二區域32及第三區域34的 密碼設置介面,由用戶預先按照特定的方式選擇第一區 _ 域30、第二區域32及第三區域34中變化的顏色來進行密 碼設置。預設的密碼資訊包掊:第一區域3〇、第二區域 32及第三區域34的顏色參數* [0015] 另外,可以為第一區域3〇、第二區域32、第三區域34及 第二區域32、第三區域34中的子區域分配不同的標號, 如此可以按照用戶操作第—區域3〇、第二區域32、第三 區域34順序記錄與各區域對應的標號,以記錄的標號作 為順序參數作為輸入資訊。例如,在步驟S102中,記錄 因用戶操作第-區域32各子區域顏色的輸人操作時,以 則之紙面為參照’用戶料針或者逆時針選擇四個子區 域320、321 322、323的顏色。在密碼驗證時,將按該 填時針或者逆時針錄的榡號作為密碼認證資訊,以此 來增加作為待…密碼資訊的輸人資訊的複雜性和多樣 性。 [0016] b 14所$ ^•為第—較佳實施方式的密碼保護方法流程 098121519 圖,該密碼保護方法包括如下步驟: 表單編號細1 第6頁/共U胃 0982036571-0 201101086 ‘ [0017] Ο 步驟S500,以預設形式在顯示介面上顯示具有顏色的第 一區域、第二區域及第三區域。該第一區域、第二區域 及第三區域中顯示的顏色週期性或者隨機地變化,且該 第二區域、第三區域可相對於第一區域轉動。如圖5所示 ,電子設備10的觸摸屏20上顯示第一區域33、第二區域 36及第二區域38。該第一區域33為圓形區域,該第二區 域36、第二區域38與第一區域30同心之圓環形區域。該 第二區域36、第三區域38分別被劃分為均等的三個子區 域360、361、362、380、381、382,每個子區域中顯 示的顏色也週期性或者隨機地變化。用戶可以根據個人 喜好,在觸摸养20上操作第二區域36、第三區域38相對 於第一區域33轉動,選擇第二區域36、第三區域38的旋 轉過的角度參數來配置成個人密碼。其中,角度參數包 括旋轉過的角度值及旋轉的方向。 [0018] Ο 步驟S502,記錄因用戶選擇各區域之顏色的輸入操作而 產生的顏色參數及記錄因用,戶旋轉第二區域、第三區域 的操作而產生的角度參數,根據記錄的顏色參數和角度 參數生成輸入資訊。該輸入資訊作為待認證的密瑪資訊 。例如,請同時參看圖6,在用戶操作觸摸屏2〇顯禾第^ 區域36、第三區域38相對於第一區域33轉動時’開始"己 錄第二區域36、第三區域38相對於第一區域33轉過的 度,相應的,在第一區域33上顯示一角度表39以’ 區域36、第三區域38旋轉過的角度值顯示給用戶在 戶停止操作第二區域36、第三區域38旋轉時,該角度表 39在觸摸屏20上隱藏。 〇982〇娜71-0 098121519 表單編號A0101 201101086 [0019] 步驟S504,接收用戶的確認操作。 [0020] 步驟S506,回應該確認操作,將生成的輸入資訊與預設 的密碼資訊比較,進行密碼驗證。例如,預設的密碼資 訊包括:第一區域33、第二區域36及第三區域38的顏色 參數及第二區域36及第三區域38的角度參數。 [0021] 上述密碼保護方法打破了傳統固定數位和字母的排列組 合方式,由於以區域中的顏色及選擇第一區域30、第二 區域32及第三區域34的先後順序作為密碼,用戶只需利 用滑鼠、觸摸板、觸摸屏等輸入裝置在第一區域30、第 二區域32及第三區域34上進行選擇顏色的操作,便可完 成密碼的輸入操作。由於合法用戶的密碼是由第一區域 30、第二區域32及第三區域34的顏色參數及順序參數構 成,非法用戶無法藉由密碼破解軟體破解合法用戶的密 碼,從而使得用戶的資訊得到有效保護。另外,相對於 傳統的固定的數位元和字母,上述密碼保護方法具有趣 味性。 [0022] 綜上所述,本發明符合發明專利要件,爰依法提出專利 申請。惟,以上所述僅為本發明之較佳實施方式,舉凡 熟悉本案技藝之人士,在援依本案創作精神所作之等效 修飾或變化,皆應包含於以下之申請專利範圍内。 [0023] 例如,以上實施方式也可以應用於臺式電腦及筆記本電 腦,用戶可以利用滑鼠或者觸摸板操作第一區域、第二 區域、第三區域。其中,第一區域 '第二區域、第三區 域也包括其他的幾何形狀,例如,橢圓形,矩形等。 098121519 表單編號A0101 第8頁/共17頁 0982036571-0 201101086 【圖式簡單說明】 [0024] 圖1為第一較佳實施方式之密碼保護方法步驟流程圖。 [0025] 圖2為圖1中密碼保護方法的密碼輸入介面示意圖。 [0026] 圖3為圖2中密碼輸入介面中第一區域、第二區域及第三 區域中顏色變化的示意圖。 [0027] 圖4為第二較佳實施方式的密碼保護方法步驟流程圖。 [0028] 圖5為圖4中密碼保護方法的密碼輸入介面示意圖。;:; J Step S100, in the default form, the password input interface is displayed on the display interface. The password input interface includes one or more .regions, each of which is assigned an independently varying color. For example, the password input interface has a first area, a second area, and a third area. The colors displayed in the first area, the second area, and the third area periodically or randomly change. As shown in FIG. 2, the first area 30, the second area 32, and the third area 34 are displayed on the touch screen 20 of the electronic device 10. The first region 30 is a circular region. The second region 32 and the third region 34 are annular regions concentric with the first region 30. The second area 32 and the third area 34 are respectively divided into four equal sub-areas: sub-areas 320, 321, 322, 323 and sub-areas 340 098121519 Form No. A0101 Page 4 / Total π page 0982036571-0 201101086, 341 342, 343, each sub-area is filled with a periodic or random color change, for example, the color in each area can be as shown in Figure 3: from red-yellow-blue-green-purple y-white-red back The order of the circles changes. Accordingly, the first region 3〇, the sub-region of the second region 32, and the sub-region of the third region 34 have color parameters that vary periodically or randomly. Since there are many different combinations of color parameters of the respective sub-areas of the first area 30, the second area 32, and the third area 34, the user can configure the personal password by selecting the color in each area according to personal preference. [0012] 步骤 ο Step S102' records the input of the color parameter generated by the user's selection of the color input operation of each region. This input information is used as the password information to be authenticated. When the user selects the colors of the respective sub-areas of the first area 30, the second area 32, and the third area 34 displayed on the touch screen 20, the corresponding color parameters are recorded. Wherein, when the color parameters of each of the sub-regions in the second region 32 and the third region 34 are selected, not only the color parameter 'encoded by the sub-regions' but also the combination parameters of the colors filled between the sub-regions are recorded. Taking the second area 32 as an example, the four sub-areas 320, 321, 322, and 323 include two color parameters of red and yellow, and the four sub-areas 320, 321, 322, and 323 are filled with colors of red, yellow, and red, respectively. ,yellow. Of course, the colors of the four sub-areas 320, 321, 322, and 323 may also be yellow 'red, yellow, red, or red, yellow, yellow, and red, respectively. It can be understood that when the color parameter of each sub-area of the third area 34 is recorded, it is similar to the second area 32, and is not described here [0013] 098121519. Step S104, receiving the confirmation operation of the user, that is, the confirmation operation of the user password input completion. The confirmation operation may be implemented by the physical form number A0101 page 5 of the electronic device 1 or the π page 098203657 0 201101086 button 11, or may be implemented by the touch button 21 on the touch screen 20, or may be It is achieved by detecting whether the time of stopping the input reaches a predetermined time interval. In the present embodiment, the confirmation operation is realized by the touch confirmation button 21 on the touch screen 20, and the key input interface is exited by the touch cancel button 22. [0014] Step S106, the response operation is confirmed, and the generated input information is compared with the preset password information to perform password verification. The preset password information is provided by a user to select a first area 30, a second area 32, and a third area 34, and the user selects the first area_domain 30 and the second area 32 in a specific manner. The changed color in the third area 34 is used for password setting. The preset password information package: color parameters of the first area 3〇, the second area 32, and the third area 34 [0015] In addition, the first area 3〇, the second area 32, the third area 34, and The sub-areas in the second area 32 and the third area 34 are assigned different labels, so that the labels corresponding to the respective areas can be sequentially recorded in accordance with the user operation of the first area 3 〇, the second area 32, and the third area 34 to record The label is used as a sequence parameter as input information. For example, in step S102, when the user inputs the color of each sub-area of the first region 32, the color of the four sub-regions 320, 321, 322, 323 is selected with reference to the user's pin or counterclockwise. . In the password verification, the nickname recorded in the hour or counterclockwise direction is used as the password authentication information, thereby increasing the complexity and diversity of the input information as the information to be encrypted. [0016] b 14 is $^• is the password protection method flow 098121519 of the first preferred embodiment. The password protection method includes the following steps: Form number fine 1 page 6 / total U stomach 0982036571-0 201101086 ' [0017] Ο Step S500, displaying the first region, the second region, and the third region having colors on the display interface in a preset form. The colors displayed in the first area, the second area, and the third area periodically or randomly change, and the second area and the third area are rotatable relative to the first area. As shown in FIG. 5, the first area 33, the second area 36, and the second area 38 are displayed on the touch screen 20 of the electronic device 10. The first region 33 is a circular region, and the second region 36, the second region 38 is concentric with the first region 30. The second area 36 and the third area 38 are respectively divided into equal three sub-areas 360, 361, 362, 380, 381, 382, and the colors displayed in each sub-area also change periodically or randomly. The user can operate the second area 36 on the touch raise 20, the third area 38 rotates relative to the first area 33 according to personal preference, and select the rotated angle parameter of the second area 36 and the third area 38 to configure the personal password. . Among them, the angle parameter includes the rotated angle value and the direction of rotation. [0018] Ο Step S502, recording the color parameter generated by the user's input operation of selecting the color of each area and recording the angle parameter generated by the operation of rotating the second area and the third area by the user, according to the recorded color parameter And angle parameters generate input information. This input information is used as the Mima information to be authenticated. For example, please refer to FIG. 6 at the same time, when the user operates the touch screen 2, the third area 36, and the third area 38 rotates relative to the first area 33, the 'starting' record of the second area 36 and the third area 38 is relative to The degree of rotation of the first region 33, correspondingly, is displayed on the first region 33. The angle table 39 is displayed with the angle value rotated by the region 36 and the third region 38, and the user is stopped to operate the second region 36, The angle table 39 is hidden on the touch screen 20 when the three regions 38 are rotated. 〇982〇娜71-0 098121519 Form No. A0101 201101086 [0019] Step S504, receiving a confirmation operation of the user. [0020] Step S506, the operation should be confirmed, and the generated input information is compared with the preset password information to perform password verification. For example, the preset cryptographic information includes color parameters of the first area 33, the second area 36, and the third area 38, and angle parameters of the second area 36 and the third area 38. [0021] The above password protection method breaks the traditional combination of fixed digits and letters. Since the color in the region and the order of selecting the first region 30, the second region 32, and the third region 34 are used as passwords, the user only needs to The input operation of the password is performed by performing an operation of selecting a color on the first area 30, the second area 32, and the third area 34 by using an input device such as a mouse, a touch panel, or a touch panel. Since the password of the legal user is composed of the color parameters and the sequence parameters of the first area 30, the second area 32, and the third area 34, the illegal user cannot crack the password of the legitimate user by using the password cracking software, so that the user's information is valid. protection. In addition, the above password protection method is interesting compared to conventional fixed digits and letters. [0022] In summary, the present invention complies with the requirements of the invention patent, and submits a patent application according to law. The above descriptions are only preferred embodiments of the present invention, and those skilled in the art will be able to include the equivalent modifications or variations in the spirit of the present invention. [0023] For example, the above embodiment can also be applied to a desktop computer and a notebook computer, and the user can operate the first area, the second area, and the third area using a mouse or a touch pad. Wherein, the first region 'the second region and the third region also include other geometric shapes, for example, an ellipse, a rectangle, and the like. 098121519 Form No. A0101 Page 8 of 17 0982036571-0 201101086 [Simple Description of the Drawings] [0024] FIG. 1 is a flow chart showing the steps of the password protection method of the first preferred embodiment. 2 is a schematic diagram of a password input interface of the password protection method of FIG. 1. 3 is a schematic diagram showing color changes in a first region, a second region, and a third region in the password input interface of FIG. 2. 4 is a flow chart showing the steps of the password protection method of the second preferred embodiment. 5 is a schematic diagram of a password input interface of the password protection method of FIG. 4.

[0029] 圖6為用戶操作第二區域、第三區域旋轉時的密碼輸入介 面示意圖。6 is a schematic diagram of a password input interface when the user operates the second area and the third area rotates.

【主要元件符號說明】 電子設備 10 觸摸屏 20 第一區域 30 第二區域 32 第三區域 34 子區域 320 ' 321 ' 322 ' 323、 子區域 340 、 341 、 實體按鈕 11 342 、 343 按鈕 21 取消按鈕 22 第一區域 33 第二區域 36 第三區域 38 子區域 360 ' 361、 362 子區域 380 、 381 、 角度表 39 382 098121519 表單編號A0101 第9頁/共17頁 0982036571-0[Main component symbol description] Electronic device 10 Touch screen 20 First area 30 Second area 32 Third area 34 Sub-area 320 '321 ' 322 ' 323, Sub-area 340, 341, Physical button 11 342, 343 Button 21 Cancel button 22 First region 33 second region 36 third region 38 sub-region 360 ' 361, 362 sub-region 380, 381, angle table 39 382 098121519 Form number A0101 Page 9 of 17 page 0982036571-0

Claims (1)

201101086 七、申請專利範圍: 1 . 一種费碼保護方法,包括如下步驟: 以預設形式在顯示介面上顯示具有顏色的圖形區域其中 該圖形區域内的顏色可變換; 記錄因用戶選擇圖形區域上的顏色的操作而產生的該圖形 區域的顏色參數,生成輸入資訊; 接收用戶的確認操作; 回應该確遇操作,將生成的輸入資訊與預設的密碼資訊比 較’進行密碼驗證。 2 ·如申請專利範圍第丨項所述之密碼保護方法,其中該顯示 介面為觸摸屏〇 3.如申請專利範圍第1項所述之密碼保護方法,其中該圖形 區域包括第一區域、第二區域及第三區域,且該第一區域 、第一區域及第三區域中顯示的顏色週期性或者隨機性地 變換; 且该記錄因用戶選擇圖形區域上的顏色的操作而產生的該 圖形區域的顏色參數’生成輸入資訊的具體步驟為: 記錄因用戶選擇第一區域中顏色的操作而產生的第一顏色 參數; 記錄因用戶選擇第二區域中顏色的操作而產生的第二顏色 參數; 記錄因用戶選擇第三區域中顏色的操作而產生的第三顏色 參數; 根據記錄的第一、第二、第三顏色參數生成輸入資訊。 4 .如申請專利範圍第3項所述之密碼保護方法,其中還包括 098121519 表單編號A0101 第10頁/共17頁 0982036571-0 201101086 • 以下步驟: 記錄因用戶操作第一區域、第二區域、第三區域而產生的 順序參數; 根據記錄的第一、第二、及第三顏色參數及順序參數生成 輸入資訊。 5 .如申請專利範圍第3項所述之密碼保護方法,其中該圖形 區域包括第一區域、第二區域及第三區域,且該第一區域 包括圓形區域,該第二區域、第三區域包括與第一區域同 心之圓環形區域。 Ο 6 .如申請專利範圍第5項所述之密碼保護方法,其中該第二 區域、第三區域包括多個子區域,每個子區域内具有週期 性或者隨機性變換的顏色。 7 .如申請專利範圍第1項所述之密碼保護方法,其中該第二 區域、第三區域可相對於第一區域轉動; 且還包括以下步驟: :: \ 記錄因用戶旋轉第二區域、第三區域的操孙而產生的角度 參數; 〇 根據記錄的顏色參數及角度參數生成輸入資訊。 8 .如申請專利範圍第7項所述之密碼保護方法,其中在用戶 對第二區域、第三區域進行旋轉操作時,該第一區域中顯 示一角度表,該角度表中顯示該第二區域、第三區域旋轉 過的角度值及旋轉方向。 098121519 表單編號A0101 第11頁/共17頁 0982036571-0201101086 VII. Patent application scope: 1. A fee code protection method, comprising the following steps: displaying a graphic area having a color on a display interface in a preset form, wherein a color in the graphic area can be changed; recording is performed on the graphic area by the user. The color parameter of the graphic area generated by the operation of the color generates input information; receives the confirmation operation of the user; and responds to the operation, and compares the generated input information with the preset password information to perform password verification. The password protection method according to the invention of claim 1, wherein the display interface is a touch screen. The password protection method according to claim 1, wherein the graphic area comprises a first area and a second a region and a third region, and the colors displayed in the first region, the first region, and the third region are periodically or randomly transformed; and the recording is generated by an operation of a color selected by the user on the graphic region The color parameter 'the specific step of generating the input information is: recording the first color parameter generated by the user selecting the color in the first area; recording the second color parameter generated by the user selecting the color in the second area; Recording a third color parameter generated by the user selecting an operation in the third region; generating input information according to the recorded first, second, and third color parameters. 4. The password protection method as described in claim 3, which further includes 098121519 Form No. A0101 Page 10 of 17 0982036571-0 201101086 • The following steps: recording the first area, the second area, Sequence parameters generated by the third region; input information is generated based on the recorded first, second, and third color parameters and the sequence parameters. 5. The password protection method of claim 3, wherein the graphic area comprises a first area, a second area, and a third area, and the first area comprises a circular area, the second area, the third area The area includes a circular area concentric with the first area. The password protection method of claim 5, wherein the second area and the third area comprise a plurality of sub-areas, each of which has a periodic or randomly transformed color. 7. The password protection method of claim 1, wherein the second area and the third area are rotatable relative to the first area; and further comprising the steps of: ::\ recording the second area being rotated by the user, The angle parameter generated by the grandson of the third area; 生成 The input information is generated according to the recorded color parameter and the angle parameter. 8. The password protection method according to claim 7, wherein when the user performs a rotation operation on the second area and the third area, an angle table is displayed in the first area, and the second table is displayed in the angle table. The angle value and the direction of rotation of the area and the third area. 098121519 Form No. A0101 Page 11 of 17 0982036571-0
TW98121519A 2009-06-26 2009-06-26 Method for password protection TW201101086A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW98121519A TW201101086A (en) 2009-06-26 2009-06-26 Method for password protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW98121519A TW201101086A (en) 2009-06-26 2009-06-26 Method for password protection

Publications (1)

Publication Number Publication Date
TW201101086A true TW201101086A (en) 2011-01-01

Family

ID=44836882

Family Applications (1)

Application Number Title Priority Date Filing Date
TW98121519A TW201101086A (en) 2009-06-26 2009-06-26 Method for password protection

Country Status (1)

Country Link
TW (1) TW201101086A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8806612B2 (en) 2011-02-23 2014-08-12 Quanta Computer Inc. Verification method and computer system using the same
US9552474B2 (en) 2013-10-31 2017-01-24 Globalfoundries Inc. Method and computer system for dynamically providing multi-dimensional based password/challenge authentication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8806612B2 (en) 2011-02-23 2014-08-12 Quanta Computer Inc. Verification method and computer system using the same
US9552474B2 (en) 2013-10-31 2017-01-24 Globalfoundries Inc. Method and computer system for dynamically providing multi-dimensional based password/challenge authentication

Similar Documents

Publication Publication Date Title
JP7137728B2 (en) Devices, methods, and graphical user interfaces for operating user interfaces based on unlock inputs
CN101930509A (en) Password protection method
CN101930511B (en) Password protection method
Jansen Authenticating mobile device users through image selection
CA2766019C (en) Computing device with graphical authentication interface
US8536978B2 (en) Detection of duress condition at a communication device
AU2014327031B2 (en) Secure passcode entry user interface
AU2014327030B2 (en) Scrambling passcode entry interface
GB2517879B (en) Authentication method and system
US20120005483A1 (en) Method for Image-Based Authentication
CN101930510A (en) Password protection method
US20140075547A1 (en) Information processing apparatus, information processing method, and computer readable medium
TW201101086A (en) Method for password protection
EP2463797A1 (en) Detection of duress condition at a communication device
CN106326703A (en) An encryption method, a decryption method and an electronic apparatus
TW201101095A (en) Method for password protection
CN106326712A (en) Method for processing pictures and mobile terminal
JP5317210B2 (en) Authentication apparatus, authentication method, and computer program
KR101648779B1 (en) Method for secure text input in information terminal
Kobayashi et al. Evaluation of Secure Pad Resilient to Shoulder Hacking
WO2015117364A1 (en) Mobile terminal and password input method therefor
TW201101777A (en) Method for password protection
Duncan et al. Visual security for wireless handheld devices
TW201039167A (en) Electronic device and method of password protection
TW201101094A (en) Method for password protection