201249156 六、發明說明: 【發明所屬之技術領域】 本發明係有關於一種密碼管理系統,尤指一種使用 視覺密碼之密碼管理系統及其方法。 【先前技術】 隨著多媒體時代的來臨,對於眾多生活安全管理及 網路服務的註冊需要,多數使用者對於密碼的使用方式 以方便記憶與簡易使用為主,常使用相同或相似的密碼 於多組不同的安全防護設備與網路服務,這種不良的使 用習慣使得大部分的密碼都擁有類似的形式;但若要安 全防護設備與網路服務達到高安全性,勢必須要多組不 同的密碼與不定期地變更密碼,這都會造成使用者設定 與解密的困擾,不良的密碼使用習慣更有遭受盜用、擷 取、遺失或更改的風險,安全防護出現漏洞讓使用者會 有很大的損失。因此對於密碼設定與管理是一個很重要 的議題。 目前已有的密碼管理系統(請參照[1]王欣薇,“高 效率的金鑰密碼管理系統之設計與應用”,國立臺中技 術學院資訊科技與應用研究所碩士論文2008 ; [2]謝文 均,“個人密碼管理系統”,國立交通大學資訊科學與工 程研究所碩士論文,2007 ; [3]Keep It Secret ! Keep It Safe !,http://kiskis.sourceforge.net/ ; [4]Password Safe, http://passwordsafe.sourceforge.net/ ; [5]KeePass Password Safe, http://keepass.info/ ;以及 [6]Universal Password Manager, http://upm.sourceforge. net/),主要是應用在多種網 路服務,使用上是以密碼登入系統去進行多種密碼與資 201249156 =官=’而這方面的密碼管理使用者必須先記憶系統的 ^入碼^還是有遺失與變更的風險。在管理密碼的部 f 1^/己憶管理的密碼雖然有使用AES、Blowf ish、CAST5 等廣算法進行加密,但加密後的資訊要儲存於系統中, 還是有被截取以及破解的風險存在。 針對上述習知密碼管理系統之缺點,本發明提供一 種使用視覺密碼之密碼管理系統及其方法,以改善上述 之缺點。 【發明内容】 /本發明之一目的係提供一種使用視覺密碼之密碼管 理系,及其方法,其根據輸入單元所輸入之密碼產生第 :分享圖像及至少—第二分享圖像,並將該第一分享圖 ,存於可攜式裝置中,將該第二分享圖像儲存於安全 防^裝置中,讓使用者擁有單__的分享圖像即可管理多 典本發明之另一目的係提供一種使用視覺密碼之密碼 f統及其方法,其使用視覺密碼,不需複雜的運算。 管理目的?提供一種使用視覺密碼之密碼 八 > 国你、其方法其單獨一方的第一分享圖像或第二 刀旱圖像被截取也不擔心機密資訊洩漏。 月之另—目的係提供—種使用視覺密碼之密碼 :婵方法,在多組密碼管理上,可攜式裝置不 而增加資料量,可降低使用上的複雜度。 碼管=述: 使:視覺密碼之密 元,一舛笪二匕括.彳攜式裝置,其具有-輸入單 m a十兀、一顯示單元、一儲存單元及-第-盔 組二該輸入單元可供輸入-組密碼,該計算單元根 康以組费碼產生一第一分享圖像及至少一第二分享圖 201249156 ί亓該第—分享圖像及第二分享圖像疊合於該顯示 "Tt用者確認後將該第—分享圖像儲存於該儲存 綠:及一安全防護裝置’其亦有-儲存裝置及- 至兮^ 2組’其中4第二無線模組可以無線方式連接 至該第一無線模組,以便接收該 ,存裝置中;俾使用者可接收該安全防 於該第:分ί圖像上’即可於該可攜式 置。♦"不裝置上呈現该組密碼,以開啟該安全防護襄 碼設ίίΐ述==之-ί使用視覺密碼之密 該可攜式裝置判斷該組㈣是否為初次 :,c·右疋,則產生一第一分享圖像及至少一第二八 旱圖像;d.將該第-分享圖像儲存於該可攜式裝^刀 e.將該第二分享圖像儲存於—安全防護裝置中’201249156 VI. Description of the Invention: [Technical Field] The present invention relates to a password management system, and more particularly to a password management system using a visual password and a method thereof. [Prior Art] With the advent of the multimedia era, for the registration of many life safety management and Internet services, most users use passwords to facilitate memory and easy use, often using the same or similar passwords. Different sets of security devices and network services, this bad habit makes most passwords have a similar form; but to achieve high security of security devices and network services, it is necessary to have different sets of different Passwords and password changes from time to time, this will cause user settings and decryption problems, bad password usage habits are more risk of misappropriation, retrieval, loss or change, security protection loopholes will make users have a big loss. Therefore, it is an important issue for password setting and management. Currently existing password management system (please refer to [1] Wang Xinwei, “Design and Application of High-Efficiency Key Password Management System”, Master Thesis of National Institute of Information Technology and Application, Taichung Institute of Technology, 2008; [2] Xie Wenjun, “ Personal Password Management System, Master's Thesis, Institute of Information Science and Engineering, National Chiao Tung University, 2007; [3] Keep It Secret ! Keep It Safe !, http://kiskis.sourceforge.net/ ; [4]Password Safe, http ://passwordsafe.sourceforge.net/ ; [5]KeePass Password Safe, http://keepass.info/ ; and [6]Universal Password Manager, http://upm.sourceforge. net/), mainly applied in A variety of network services, the use of password login system to carry out a variety of passwords and resources 201249156 = official = ' and this aspect of password management users must first remember the system's ^ code ^ or loss and change risk. In the management password section, the passwords managed by the memory management system are encrypted by AES, Blowfish, CAST5, etc., but the encrypted information is stored in the system, and there is still a risk of being intercepted and cracked. In view of the shortcomings of the above conventional password management system, the present invention provides a password management system using a visual password and a method thereof to improve the above disadvantages. SUMMARY OF THE INVENTION An object of the present invention is to provide a password management system using a visual password, and a method thereof, which generates a first sharing image and at least a second sharing image according to a password input by an input unit, and The first sharing map is stored in the portable device, and the second shared image is stored in the security device, so that the user has a shared image of the single__ The purpose is to provide a password and method for using a visual password, which uses a visual password without complicated operations. Management purpose? Provide a password using a visual password. Eight, the country you, its method, the first share image of the individual party or the second knife image is intercepted and does not worry about confidential information leakage. Another month - the purpose is to provide a password using a visual password: 婵 method, in the management of multiple sets of passwords, the portable device does not increase the amount of data, which can reduce the complexity of use. Code tube = description: make: the secret code of the visual password, the 彳 匕 彳 彳 彳 彳 彳 彳 , , , , , , , , , , , , , , , , 彳 彳 彳 彳 彳 彳 彳 彳 彳 彳 彳 彳 彳 彳 彳 彳 彳The unit is configured to input a group password, and the computing unit generates a first shared image and at least a second shared image by the group fee code 201249156. The first shared image and the second shared image are superimposed on the unit Display "Tt user confirms to store the first-shared image in the storage green: and a security guard 'it also has - storage device and - to 兮^ 2 group' 4 of which the second wireless module can wirelessly The method is connected to the first wireless module to receive the storage device, and the user can receive the security protection on the first image. ♦"Do not present the set of passwords on the device to enable the security protection code setting ίί = == - ί using the visual password to the portable device to determine whether the group (four) is the first time: c. And generating a first shared image and at least one second eight drought image; d. storing the first shared image in the portable device e. storing the second shared image in the security protection In the device'
Ln攜内存之該第一分享圖像,:產 於該安全防^置中 及g•將該第二分享圖像儲存 满猶Ϊίΐ述之目的,本發明之一種使用視覺密碼之密 取括下列步驟:a.使用-可攜式裝置讀 =存之一第一分享圖像;b.該可攜式 ; 式讀取-安全防護裝置令之一第二分享圖像;以;線: ^第一分享圖像及該第二分享圖像疊合以獲取—組ί : 為使貴審查委員能進一步瞭解本發明之姓 =其目的,兹附以圖式及較佳具體實施例之;細說: 【實施方式】 201249156The first shared image of the memory carried by Ln, which is produced in the security device, and the storage of the second shared image, the purpose of using a visual password is as follows Step: a. use-portable device read=store one of the first shared images; b. the portable type; read-safety protection device to make one of the second share images; to; line: ^ A shared image and the second shared image are superimposed to obtain a group ί : in order to enable the reviewing committee to further understand the last name of the present invention = its purpose, the drawings and preferred embodiments are attached; : [Embodiment] 201249156
Naor和Shamir (請參照M. Naor,and A. Shamir, “Visual cryptography,”)兩位學者於1994年提出視覺 密碼學,一種以圖像加密的機制,將一張蘊含機密資訊 的黑白圖像分享出η張的分享(Share)圖像,再從η張的 分享圖像中取出t張(2StS η)進行疊合即可使用肉眼視 覺直接讀取顯示於疊合圖上的機密資訊。 請參照圖1,其繪示根據(2x2)的基底圖像之示意 圖。如圖所示,蘊含機密資訊圖像上的每一個點,都以 一個(2x2)的基底矩陣做擴展分享,而產生的圖像以(2x2) 矩陣為基底的基底圖像合成一張不蘊含機密資訊的分享 圖像,基底矩陣則如公式(1)所示。 Γοο"Naor and Shamir (please refer to M. Naor, and A. Shamir, "Visual cryptography,"). Two scholars proposed visual cryptography in 1994, a mechanism for image encryption, which would contain a black and white image containing confidential information. Share the shared image of η, and then take t (2StS η) from the shared image of η to superimpose and use the visual Vision to directly read the confidential information displayed on the overlay. Referring to Figure 1, there is shown a schematic diagram of a base image according to (2x2). As shown in the figure, each point on the confidential information image is extended and shared by a (2x2) base matrix, and the resulting image is synthesized without a base image based on the (2x2) matrix. The shared image of confidential information, the base matrix is shown in formula (1). Γοο"
Block1=Block1=
Block2 = L〇 1.Block2 = L〇 1.
Block3= ο οBlock3= ο ο
Block4=[i 0_Block4=[i 0_
Block5= 1.0 (公式1)Block5= 1.0 (Equation 1)
Block6=oi 201249156 如圖1所示,將基底矩陣中的“ 〇 代表白點,形成基底圖像。當竣含一 ' ^夺,將(2x2)的基底矩陣做隨機選取,並產生於第一分 享圖像與第二分享圖像上;而當蘊含機密資訊圖像上為 黑點時,隨機選取的(2x2)基底矩陣只會產生於第一分享 圖像上’第二分享圖像則產生與第一分享圖像互斥的 (2x2)基底矩陣。將第一分享圖像與第二分享圖像進行疊 合’即可獲得以(2x2)基底矩陣做及閘處理後的疊合圖 像’其疊合效果與方法如表1。 201249156 表1 機密 資訊 □ 第一 分享 圖像 B E u a S 第二 分享 圖像 B B B a s 疊合 圖像 η E U a s 機密 資訊 第一 分享 圖像 m E U a s 第二 分享 圖像 a m E s 疊合 圖像 請一併參照圖2a i圖2d,其分別繪示將.第一分享 圖像與第二分享圖像疊合以獲得原資訊之示意圖。如圖 2a所示,將含有“明志電機”資訊的圖像,進行視覺密碼 分享成如圖2b所示之第一分享圖像及如圖2c所示之第 二分享圖像,當第一分享圖像與第二分享圖像疊合後即 201249156 可獲得如圖2d所示之原資訊“明志電機”。每一 圖像由隨機的(2x2)基底矩陣產生而成,所以每張 像都也都不薇含任何機密;訊。 實施例之使用視覺密碼之密碼管理系統之架構干=佳 本案一較佳實施例之密碼管理系統之執:結果 ”所示,本發明之使用視覺密碼之密碼管理系 所.“可攜式裝置1〇;以及-安全防護裝置3〇 一上’”式裝f 10進-步具有-輸入單元Η, 二Sf、―顯示單元13、—第—無線模組Η及 叶Π =垃單元U可供輸入-組密碼,該 = = = =密碼產 該第-分享圖像16及第二分享圖像 = 若正確則將該第-”圖= 線方式以無 単兀15例如但不限於為㈣記憶體,該可攜式裝 限於為手機、平板電腦或筆記型電腦二本實 施例中係以手機為彻Λ 甘不貫· 丁俄马例加以說明,但並不以此為限。 卜、,5亥輸入單元U例如但不限於為一鍅般 例如但不限於為一微控制器:該顯示裝置^ 不限於為一觸控式液晶顯示器,且該輸入單元Π 可放置於該觸控式液晶顯示器 Ί Π 二例如但不限於編,一h、ZiX=^ 201249156 置、例如但不限於為-家庭門禁裝 門禁裝置為例加以說明 例:係以家庭 存裝置31及-第二此為限’其亦有一儲 限於為GSM、Bluet0C)th 7. k :線模、、且32例如但不 線方式連接至該或簡模組’可以無 像並儲存於該“便接收該第二分享圖 上輸,使用者可於該輸入單元11 代巧密碼之-機密圖像,接著據此:密將圖此: 第-分车關Λ 第二分享圖像17,並將該 置13上,鹿-u第二分享圖像17疊合於該顯示裝 分享圖像16從Ϊ該機密圖像,若密碼正確,則將該第-刀子圖像16儲存於該儲存單元15中, 八古 圖像二^以方式傳送至該安全防護裝置30中儲^ 了 時,可= 以家庭門禁裝置為例,使用者回家 :至可攜式裝置10 ’例如手機,以無線方式連 護裝置3G以讀取其中儲存之該第二分享 享圖像16 ::其本身儲存單元15中所儲存之第-分 置13上,者將兩者疊合’並將結果顯示於該顯示裝 987的_ 使用者即可從該顯示裝置13上得到 後,即可進’於?入該密碼至該家庭門禁裝置30 、豕中。因單獨的第一分享圖像16或第二分 :尤摘17並未具有任何特殊意義,因此縱使單獨被截取 也不擔心機密資訊洩漏。 絲以一其繪示本案一較佳實施例之密碼管理系 、 为享圖像配合複數個第二分享圖像之示意 201249156 圖。 -分=用配視合覺複密數碼 J個ΐ全防護裝置3。,例如同時裝官置理複气 2金ι§或電腦φ碼鎖之密碼。如圖所示,當 擇第2次輸入密碼時,該可攜 〜 行密-管理二=::: =存的第-》旱圖像16作視覺密碼分享出新的第二分 f圖像17b儲存於新的安全防護裝f 3〇上,例如汽車防 以及= 第二分享圖像17c儲存於新的 裝置30上’例如電腦密碼鎖。於❹時,如上所述,口 要將該可擴式裝置10中的第—分享圖像一 ίίΓ=17Λ及17c4合,即可分別取得該上 ^裝置30的密碼進人。因此,本發明之使用視覺密碼之 被碼管理系統在多組密碼管理上,可攜 資料量,可降低使用上的複雜度。 个南《加 請參照圖6,其繪示本案另一較佳實施例之使用視 覺密碼之密碼設定方法之流程示意圖。如圖所示,本發 明之使用視覺密碼之密碼設定方法,其包括下列步驟: 輸入一組密碼至一可攜式裝置10中(步驟a);該可攜式 裝置10判斷該組密碼是否為初次設定(步驟b);若是, 則產生一第一分享圖像16及至少一第二分享圖像17^步 驟c);將該第一分享圖像16儲存於該可攜式裝置1〇中 (步驟d);將該第二分享圖像π儲存於一安全防護裝置 30中(步驟e);若否’則該可攜式裝置10讀取内存^該 第一分享圖像16’並產生至少一第二分享圖像17b(步驟 Ο,以及將該第一分孕圖像17b儲存於該安全防護束置 30中(步驟g)。 201249156 令;攜中ά:密碼至-可攜式裝置1。 型電腦,_且其進—步具有—輪人單元〜, i疒:疋ι / 一顯不單70 13、一第一無線模組"及- 該輸入單元11例如但不限於為-鍵盤, 該计异早兀12例如但不限於為一微控制器,該 13例如但不限於為一觸控式液晶顯示器,且“幹二“ =置於該觸控式液晶顯示器13中,該第」無線早: =歹如但不限於為GSM、Bluet〇〇th、z^e或、 才、、、且’該儲存單元15 <列如但不限於為快閃記憶體。 ^該^驟b及c中’該可攜式裝置1〇判斷該組密碼 =否,=定,若是,則產生—第—分享圖像心 > 一第二分旱圖像17。 ^該步驟d中,將該第一分享圖像16儲存於該可攜 工裝置10中,其詳細原理請參照上述之說明,在此不 重複贅述。 於該步驟e中,將該第二分享圖像17儲存於一安全 防護裝,30中;其中,該安全防護裝置30例如但不限 於為一豕庭門禁裝置、汽車防盜器或電腦密碼鎖亦有一 儲存裝置31及一第二無線模組32,該第二無線模組32 例如但不限於為GSM、Bluetooth、Zigbee或WiFi模組, I以無線方式連接至該第一無線模組,以便接收該第二 刀子圖像17並儲存於該儲存裝置中,其詳細原理請參照 上述之說明,在此不再重複贅述。 於該步驟f中,若否’則該可攜式裝置1〇讀取内存 之該第一分享圖像16,並產生至少一第二分享圖像17b 及17c ;若不是新設,則該可攜式裝置1〇將得知使用者 欲設定第2組甚至第3組密碼,因此,將讀取其内存之 12 201249156 該第一分享圖像16並於加密後分別產生第二分享圖像 17b及17c ’並於步驟g中將該第二分享圖像17b及i7c 分別以無線方式傳送至其對應之安全防護裝置3〇中儲 存0 於使用時,只要將該可攜式裝置10中的第一分享圖 像16刀另〗與第一.分旱圖像17、17b及17c疊合,即可分 ,取得該安全防護裝置3〇,例如家庭門禁裝置、汽車防 盜器或電腦密碼鎖的密碼進入。因此,本發明之使用視 覺密碼之密碼設定方法在多組密碼管理上,可攜式裝置 不需增加資料量,可降低使用上的複雜度。 —明參…、圖7,其繪示本案另一較佳實施例之使用視 覺密碼之密碼獲得方法之流程示意圖。如圖所示,本發 明之使用視覺密碼之密碼獲得方法,其包括下列步驟: 一式裝置1G讀取其内存之—第-分享圖像 16(步驟a);該可攜式裝置1〇以無線方式讀取一 護裝乂,中之-第二分享圖像1?(步驟b);以及將“ 刀子圖像I6及该第二分享圖像1? 碼(步驟c)。 、、且在 -第使用一可攜式裝置10讀取其内存之 圖像6,其中,該可攜式裝置10例如但不 =於為手機、平板電腦或筆記 ^ 元Η,一計算單元12、一顯示單元進13步一具有一 二及一二存,元15,該輸入單元11例二 再重其料相請參照上狀朗,在此不 於該步驟b中,該可攜式裝置1〇以盔 安全防護裝置30 _之一第-八古因备…、線方式讀取一 全防護裝置30例如但不限^子=17 ;其中’該安 +丨民於為一家庭門禁裝置、汽車防 13 201249156 盜器或電腦密碼鎖亦有一儲存裝置3 =,其詳細相請參照上述之朗,在 於該步驟C中,將該第一分享圖像16及該八 圖像17疊合以獲取一組密碼,使 二 =;門禁裝置、汽車防盜器:電腦密: 及其=之=本=吏用視覺密碼之密碼管理系統 產峰莖一八ί其具有h根據輸入單元所輸入之密碼 八至少一第二分享圖像,並將該第-二圖像儲存於可攜式裝置t ’將該第二分享圖像 裝置中,讓使用者擁有單一的分享圖像即可 =夕2.使用視覺密碼,不需複雜的運算;3· 分享圖像或第二分享圖像被截取也不擔 =以及4·在多組密碼管理上,可攜式裝 此料量’可降低使用上的複雜度等優點,因 性。t確實較習知之密碼管理系統具有新穎性及進步 攸你本案所揭示者,乃較佳實施例,舉凡局部之變更或 =而=於本案之技術思想而為熟f該項技藝之人所易 ;推知者,俱不脫本案之專利權範疇。 綜上所陳’本案無論就目的、手段與功效,在在顯 :二,異於習知之技術特徵,且其首先發明合於實用, =符合發明之專利要件’懇請貴審查委員明察, 、;早日賜予專利,俾嘉惠社會,實感德便。 【圖式簡單說明】 圖1為示意圖,其繪示根據(2x2)的基底圖像之示意 圃。 圖2a至圖2d為示意圖,其分別繪示將分享圖像工 201249156 與分享圖像2疊合以獲得原資訊之示意圖。 覺密===系===佳實施例之使用視 理系==示;:示本案-較佳實施— 理系统以為;意5▲其繪不本案一較佳實施例之密碼管 ^ ㈣像配合複數個第二分享圖像之示 、圖6為示意圖,其繪示本案另一較佳實施例之 視覺猎碼之密碼設定方法之流程示意圖。 、圖7為示意圖,其繪示本案另一較佳實施例之使用 視覺密碼之密碼獲得方法之流程示意圖。 【主要元件符號說明】 可攜式裝置10 計算單元12 第一無線模組14 第一分享圖像16 安全防護裝置30 輸入單元11 顯示單元13 儲存單元15 第二分享圖像17、17b、17c 儲存裝置31 第二無線模組3 2 15Block6=oi 201249156 As shown in Figure 1, ““ represents a white point in the base matrix to form a base image. When 竣 contains a ', the base matrix of (2x2) is randomly selected and generated first. Sharing the image with the second shared image; and when the black information is contained on the confidential information image, the randomly selected (2x2) base matrix will only be generated on the first shared image. A (2x2) base matrix mutually exclusive with the first shared image. The first shared image and the second shared image are superimposed to obtain a superimposed image with the (2x2) base matrix and the gate processed 'The superimposed effect and method are shown in Table 1. 201249156 Table 1 Confidential Information □ First Shared Image BE ua S Second Shared Image BBB as Superimposed Image η EU as Confidential Information First Shared Image m EU as Second sharing image am E s superimposed image, please refer to FIG. 2a, FIG. 2d, which respectively shows a schematic diagram of superimposing the first shared image and the second shared image to obtain the original information, as shown in FIG. 2a. As shown, the map containing the information of "Mingzhi Motor" will be included. The visual sharing is performed as a first shared image as shown in FIG. 2b and a second shared image as shown in FIG. 2c. When the first shared image is overlapped with the second shared image, 201249156 is obtained. The original information "Mingzhi Motor" shown in Figure 2d. Each image is produced by a random (2x2) base matrix, so each image does not contain any confidentiality. The use of visual passwords in the embodiment. The structure of the password management system is as follows: "The result of the password management system of a preferred embodiment of the present invention: the result" shows the password management system using the visual password of the present invention. "Portable device 1; and - security protection The device has an 'input unit', a second Sf, a display unit 13, a first wireless module, and a leaf unit, and an input unit password. = = = = The password produces the first-shared image 16 and the second shared image = if it is correct, the first - "picture = line mode is innocent 15 such as but not limited to (four) memory, the portable type The device is limited to a mobile phone, a tablet computer or a notebook computer. The example is not limited to this. However, the 5H input unit U is, for example but not limited to, for example, but not limited to being a microcontroller: the display device is not limited A touch-sensitive liquid crystal display, and the input unit Π can be placed on the touch-control liquid crystal display, such as, but not limited to, a h, ZiX=^ 201249156, such as but not limited to - home access control access control The device is exemplified by an example: the home storage device 31 and the second device are limited to a GSM, Bluet0C)th 7. k: line mode, and 32 is connected to the wire, for example but not in a line manner. Or the simple module 'can be imageless and stored in the "received to receive the second share map, the user can enter the secret image of the password in the input unit 11, and then according to this: the secret map: - the second sharing image 17 is shared, and the deer-u second sharing image 17 is superimposed on the display image to share the image 16 from the confidential image. If the password is correct, then The first knife image 16 is stored in the storage unit 15, and the image is transmitted to the security. When the protection device 30 is stored, the home access control device can be used as an example, and the user goes home: to the portable device 10', such as a mobile phone, wirelessly connects the device 3G to read the second share stored therein. Having the image 16 :: on the first-divided 13 stored in the storage unit 15 itself, the two are superimposed and the result is displayed on the display device 987 from the user of the display device 13 Once you get it, you can enter it. Enter the password into the home access control device 30, 豕. Since the first first shared image 16 or the second score: the special score 17 does not have any special meaning, it does not worry about confidential information leakage even if it is intercepted alone. The figure is shown in Fig. 201249156, which is a schematic diagram of a password management system according to a preferred embodiment of the present invention, and an image sharing a plurality of second shared images. - Minute = Reconcile the digital with the visual sensation. For example, at the same time, the password of the qi 2 or the computer φ code lock is installed. As shown in the figure, when the password is entered for the second time, the portable ~ line secret-management two =::: = stored first - "dry image 16" for visual password sharing a new second minute f image 17b is stored on a new security device f3, such as car protection and = second shared image 17c is stored on the new device 30 'eg a computer password lock. At the time of the ❹, as described above, the mouth-to-share image of the expandable device 10 is ί Γ Γ Λ 17 17 17 17 17 17 17 17 17 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 Therefore, the code management system using the visual password of the present invention can carry data amount in a plurality of sets of password management, which can reduce the complexity in use. Please refer to FIG. 6 , which is a flow chart showing a method for setting a password for using a visual password according to another preferred embodiment of the present invention. As shown in the figure, the password setting method using the visual password of the present invention comprises the following steps: inputting a set of passwords into a portable device 10 (step a); the portable device 10 determines whether the set of passwords is Initial setting (step b); if yes, generating a first shared image 16 and at least one second shared image 17^ step c); storing the first shared image 16 in the portable device 1 (Step d); storing the second shared image π in a security protection device 30 (step e); if not, the portable device 10 reads the memory ^ the first shared image 16' and generates At least one second shared image 17b (step Ο, and storing the first pregnancy image 17b in the security protection bundle 30 (step g). 201249156 order; carrying the middle: password to - portable device 1. A computer, _ and its advance step has a wheel unit unit, i疒: 疋ι / one display not only 70 13, a first wireless module " and - the input unit 11 is for example but not limited to - The keyboard, such as but not limited to being a microcontroller, such as, but not limited to, a touch-sensitive liquid crystal display, "Dry two" = placed in the touch-sensitive liquid crystal display 13, the "wireless" early: = for example but not limited to GSM, Bluet〇〇th, z^e or, only,, and 'the storage unit 15 <Listing, but not limited to, flash memory. ^ In the steps b and c, the portable device 1 determines the group of passwords = no, = fixed, and if so, generates - the first shared image heart < a second drought image 17. In the step d, the first shared image 16 is stored in the portable device 10. For the detailed principle, refer to the above description, and the detailed description is not repeated here. In the step e, the second shared image 17 is stored in a security guard 30, wherein the security guard 30 is, for example but not limited to, a court access control device, a car alarm or a computer password lock. There is a storage device 31 and a second wireless module 32. The second wireless module 32 is, for example but not limited to, a GSM, Bluetooth, Zigbee or WiFi module, and is wirelessly connected to the first wireless module for receiving. The second knife image 17 is stored in the storage device. For the detailed principle, please refer to the above description. In this step f, if no, the portable device 1 reads the first shared image 16 of the memory and generates at least one second shared image 17b and 17c; If it is not new, the portable device 1 will know that the user wants to set the second group or even the third group password, so the memory 12 will be read 12 201249156 the first shared image 16 and after encryption Generating the second shared images 17b and 17c' and wirelessly transmitting the second shared images 17b and i7c to their corresponding security devices 3 in step g, for storage, as long as the The first shared image 16 of the portable device 10 is superimposed with the first and the dry images 17, 17b and 17c, and can be divided to obtain the safety protection device 3, such as a home access control device and a car anti-theft device. The password of the device or computer password lock is entered. Therefore, in the password setting method using the visual password of the present invention, in the multi-group password management, the portable device does not need to increase the amount of data, and the complexity in use can be reduced. - Figure 7 is a flow chart showing a method for obtaining a password using a visual password in another preferred embodiment of the present invention. As shown in the figure, the method for obtaining a password using a visual password of the present invention comprises the following steps: a device 1G reads a - share image 16 of its memory (step a); the portable device 1 is wireless The method reads a protective device, the second share image 1 (step b); and the "knife image I6 and the second shared image 1 code (step c)., and at - The first portable device 10 reads an image 6 of the memory thereof, wherein the portable device 10 is, for example, but not for the mobile phone, the tablet computer or the notebook, a computing unit 12, and a display unit. 13 steps one has one two and one two, element 15, the input unit 11 case two re-materials please refer to the upper shape, in this step b, the portable device 1 is safe with a helmet Guard device 30 _ one of the first - eight ancients for the preparation of ..., line mode to read a full protection device 30, for example, but not limited to ^ = = 17; which 'The An + 丨 people in a family access control device, car defense 13 201249156 The thief or computer password lock also has a storage device 3 =, please refer to the above for details, in the step C, the first point The image 16 and the eight images 17 are superimposed to obtain a set of passwords, so that two=; access control device, car alarm device: computer secret: and its ===== password management system with visual password Eight 其 having h at least one second shared image according to the password input by the input unit, and storing the second-second image in the portable device t 'the second shared image device, allowing the user Have a single shared image = eve 2. Use visual passwords, no complicated calculations; 3) Share images or second shared images are intercepted and not = and 4. In multiple sets of password management, Carrying this amount of material can reduce the complexity of use, etc., and it is indeed more novel and advanced than the conventional password management system. As disclosed in this case, it is a preferred embodiment. Or = and = in the technical thinking of the case is familiar with the skill of the person; inferred, not in the scope of the patent right of the case. In summary, the case of this case, regardless of the purpose, means and efficacy, in the show : Second, different from the technical characteristics of the prior, and its first invention is practical, = In accordance with the patent requirements of the invention, please ask your review committee to inspect, and; as soon as the patent is granted, the company is in good faith. [Simplified illustration] Figure 1 is a schematic diagram showing the base image according to (2x2) 2a to 2d are schematic diagrams respectively showing a schematic diagram of superimposing the shared image worker 201249156 with the shared image 2 to obtain the original information. 密密===系===Use of the preferred embodiment The system is == shows;: shows the case - the preferred implementation - the system is considered; the meaning of 5 ▲ is not the case of a preferred embodiment of the cryptographic tube ^ (four) image with a plurality of second shared images, Figure 6 is a schematic FIG. 4 is a flow chart showing a method for setting a password of a visual hunting code according to another preferred embodiment of the present invention. FIG. 7 is a schematic diagram showing a flow chart of a method for obtaining a password using a visual password according to another preferred embodiment of the present invention. [Main component symbol description] Portable device 10 Computing unit 12 First wireless module 14 First shared image 16 Security guard 30 Input unit 11 Display unit 13 Storage unit 15 Second shared image 17, 17b, 17c Storage Device 31 second wireless module 3 2 15