WO2009110363A1 - 認証方法および入力装置 - Google Patents

認証方法および入力装置 Download PDF

Info

Publication number
WO2009110363A1
WO2009110363A1 PCT/JP2009/053455 JP2009053455W WO2009110363A1 WO 2009110363 A1 WO2009110363 A1 WO 2009110363A1 JP 2009053455 W JP2009053455 W JP 2009053455W WO 2009110363 A1 WO2009110363 A1 WO 2009110363A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
input
password
unit
trajectory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2009/053455
Other languages
English (en)
French (fr)
Japanese (ja)
Inventor
加奈 見掛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sharp Corp
Original Assignee
Sharp Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sharp Corp filed Critical Sharp Corp
Priority to EP09718205A priority Critical patent/EP2251811A4/en
Priority to US12/918,601 priority patent/US8516571B2/en
Priority to CN2009801076768A priority patent/CN101960463A/zh
Publication of WO2009110363A1 publication Critical patent/WO2009110363A1/ja
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0354Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of two-dimensional [2D] relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
    • G06F3/03547Touch pads, in which fingers can move on a surface
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to an authentication method and an input device for authenticating a user.
  • Japanese Patent Laid-Open No. 61-142835 discloses a two-dimensional coordinate point registered by the user as a password in advance in an area surrounded by a closed curve indicated by the two-dimensional graphic information input by the user. By performing authentication based on whether or not the password is included, an authentication method is provided in which a user can easily remember a password, can easily perform an authentication operation, and is less likely to be seen by others.
  • Japanese Patent Application Laid-Open No. 61-142835 discloses two intermediate password methods.
  • the secret function is attached to the portable terminal, the secret function tends not to be used when the influence of information leakage is small due to the inconvenience of having to remember the password.
  • the password output by the figure locus is set to a character recognition level such as whether a circle or a triangle is inputted, or the user himself / herself performs an operation.
  • the recognition accuracy element of whether to recognize whether or not it is done is a problem.
  • This recognition accuracy element varies depending on the use scene. For example, in personal use mobile phones, there are many scenes where passwords are entered while walking, and considering entering graphical passwords in such scenes, passwords should be created unless they can be easily remembered. It is thought that it is not suitable for. In such a situation, even when “the size of the figure” is incorporated into the password, it is assumed that the user himself / herself cannot cancel the password.
  • the password that is output based on the figure trajectory is a simple one such as a circle or a triangle
  • the user can easily remember the password, Considering the situation of entering a password while moving in the presence of many strangers, there is a possibility that the chance of password leakage increases by being peeped by others during the operation of entering the figure password. is there.
  • the object of the present invention is that the password entered by the user can be easily reproduced because the password is simple and difficult to forget, and even if there are many strangers, the password leaks even if it is seen. It is to provide a difficult authentication method and input device.
  • the present invention is an authentication method for authenticating based on a password configured to include position specifying information arranged at an arbitrary position of an input unit of an input device capable of inputting information, Obtaining position specifying information corresponding to the first indicated position of the input trajectory input from the input unit of the input device; Based on the input trajectory, calculating trajectory information representing the repetition of the trajectory from the first designated position and movement information representing the moving direction with respect to the first designated position, In the authentication method, the acquired position specifying information, the calculated trajectory information, and movement information are compared with preset setting information to determine whether or not the setting information is supported.
  • the position of the input unit of the input device in which the position specifying information is arranged is set for each authentication.
  • the present invention is an input device that has an input unit capable of inputting information and can be authenticated based on a password composed of position specifying information arranged at an arbitrary position of the input unit, A position information allocation unit that uniquely allocates a plurality of the position specifying information to a plurality of predetermined positions of the input unit for each position; A storage unit for storing information; Acquiring position specifying information corresponding to the first indicated position of the input trajectory input from the input unit, Based on the input trajectory, calculating trajectory information representing the repetition of the trajectory from the first designated position and movement information representing the moving direction with respect to the first designated position, A determination unit that compares the acquired position specifying information, the calculated trajectory information, and movement information with preset setting information stored in the storage unit and determines whether or not the setting information is supported; , Including an input device.
  • the input device further includes an output unit, When the determination unit determines that the acquired position specifying information, the calculated trajectory information, and movement information do not correspond to the setting information, the determination unit determines completion of a series of input operations of the input unit After that, it is preferable to output warning information to the output unit.
  • the password is configured to include position specifying information arranged at an arbitrary position of the input unit of the input device, and the position specifying corresponding to the first designated position of the input trajectory input from the input unit is performed.
  • the trajectory information representing the repetition of the trajectory from the first designated position and the movement information representing the movement direction with respect to the first designated position are calculated, and the obtained position specifying information
  • the trajectory information and the movement information are compared with preset setting information, and authentication is performed by determining whether or not the setting information is supported. If a simple password, such as a circle or triangle, is entered in the figure password, the figure password can be seen by another person during the figure password input operation. However, according to the present invention, the password looks like a graphic trajectory when viewed from others, but the password is located at the first input location. Since it is composed of information, trajectory information, and movement information, it is difficult for a password to leak even if it is viewed in the presence of many strangers.
  • the password can be easily remembered by configuring the password from the simple three items of the position input information, the trajectory information, and the movement information that are first input, the situation in which the user cannot release the password It is possible to provide an authentication method particularly suitable for application to a product such as a mobile phone that is frequently used during movement because it is easy to input while moving.
  • FIG. 3 is a cross-sectional view of an input unit as viewed from a section line III-III in FIG. It is a figure which shows the specific example by which the circle pad was divided. It is a figure which shows the specific example by which the circle pad was divided. It is a figure which shows the specific example of a password. It is a figure which shows the specific example of a password. It is a flowchart which shows the operation processing of a control part. It is a flowchart which shows the operation processing of a control part.
  • FIG. 1 is a block diagram showing an electrical configuration of an input device 50 according to an embodiment of the present invention.
  • FIG. 2 is an external view of the input device 50 of FIG.
  • FIG. 3 is a cross-sectional view of the input unit 1 as viewed from the section line III-III in FIG.
  • the input device 50 includes an input unit 1 that can input information, a display unit 2 that is an output unit, a storage unit 3, a control unit 5 that is a position information allocation unit and a determination unit, buttons A group 4 and a power button 14 are included.
  • the input device 50 capable of inputting information performs authentication based on a password including position specifying information arranged at an arbitrary position of the input unit 1.
  • the input unit 1 includes a casing unit 11, a touch panel unit 12, and a sub display unit 13.
  • the casing unit 11 has a circular notch, and a circle is formed by a part included in the right cylinder including the region exposed from the notch of the casing unit 11 in the touch panel unit 12 and the sub display unit 13.
  • a pad 10 is formed.
  • the circle pad 10 is a part of the input unit 1 that is actually operated by a user's fingers.
  • the touch panel unit 12 and the sub display unit 13 are provided inside the housing unit 11.
  • the touch panel unit 12 includes a PET (polyethylene terephthalate) film, a transparent conductive film, an electrode, and the like.
  • the sub display unit 13 is provided below the touch panel unit 12 on the side opposite to the notch of the housing unit 11 and is realized by a liquid crystal display.
  • the sub display unit 13 displays a position to be touched as operation information, and the user touches the operation surface of the circle pad 10 based on this display, whereby the input locus input from the input unit 1 is specified.
  • the circle pad 10 is divided for each instruction content by an area that can be touched by the user. 4 and 5 are diagrams showing specific examples in which the circle pad 10 is divided. As shown in FIGS.
  • the circle pad 10 can be divided by, for example, dotted lines, colors, character displays, and the like.
  • areas to which four colors are given are arranged around an axis passing through the center of the circle pad 10 so as to be rotationally symmetric. Each region is spaced from each other about the axis.
  • the circle pad 10 shown in FIG. 5 is divided into 12 equal parts around the axis, and characters P1 to P12 are displayed in each area.
  • the display unit 2 is realized by a liquid crystal display or an organic EL (Electronic Luminescence) display, and displays information input by the input unit 1 and the button group 4, information stored in the storage unit 3, and the like. Also, warning information described later is displayed.
  • storage part 3 is comprised by memory
  • the storage unit 3 includes a data storage unit 15 that stores telephone directory data, a variable storage unit 16 that stores variables, and a password storage unit 17 that stores passwords. A setting password, which is setting information set in advance, is stored in the password storage unit 17.
  • the storage unit 3 also stores a control program for controlling the input device 50 and screen information displayed on the display unit 2.
  • the button group 4 includes keys for inputting numbers and characters, keys for performing various settings or function switching in the input device 50, and the like.
  • the power button 14 performs power ON / OFF switching.
  • the password is a mark indicating the position of the start point at the time of password input, which is position specifying information corresponding to the first designated position of the input locus input from the input unit 1, and the locus from the first designated position based on the input locus. Is composed of three elements: a rotation number that is trajectory information representing repetition of the above and a rotation direction that is movement information representing the movement direction with respect to the first designated position.
  • the position of the start point at the time of password input is specified by a mark such as a color for separating the circle pad 10 and a character display, and the display position of the mark is randomly displayed every time the password is input.
  • the number of rotations is determined by moving the indicated position around the central axis of the circle pad 10 in order from the position of the starting point when entering the password, and assuming that the time when returning to the original starting point or starting point area is one round. Represents the number of times.
  • the movement information is a direction when the user views the rotation direction moving from the starting point toward the operation surface, and represents clockwise or counterclockwise.
  • a trace that traces one round around the central axis of the circle pad 10 becomes a figure shape in which a predetermined start point and an end point match (can be drawn with one stroke), thereby generating a figure password.
  • the logic is much simpler than before.
  • 6A and 6B are diagrams showing specific examples of passwords.
  • 6A and 6B show passwords when the circle pad 10 is divided into four colors of green, red, blue, and pink.
  • 6A shows a password trajectory that makes two rounds in the right direction with the start point green
  • FIG. 6B shows a password trajectory that makes one round in the left direction with the start point being red.
  • the user has only to memorize “green, right, 2” as the password
  • the user has only to memorize “red, left, 1” as the password.
  • a password is input as preset setting information, it is stored in the password storage unit 17.
  • the control unit 5 is configured by, for example, a CPU (Central Processing Unit), and controls the input unit 1, the display unit 2, the storage unit 3, and the button group 4 by executing a control program stored in the storage unit 3. .
  • the control unit 5 functions as a position information allocation unit, and uniquely allocates a plurality of the position specifying information to a plurality of predetermined positions of the input unit 1 for each position.
  • the position specifying information corresponding to the first specified position of the input locus input from the input unit 1 is acquired by the control unit 5 based on the division of the circle pad 10 by the user. To do.
  • control unit 5 functions as a determination unit, calculates the rotation speed and the rotation direction based on the acquired position specifying information, and the position of the start point, the rotation speed and the rotation direction at the time of password input, and the set password Are compared, and it is determined whether or not the position input information, trajectory information, and movement information that are input first correspond to the set password. Then, when it is determined that the position of the starting point, the number of rotations, and the rotation direction at the time of password input do not correspond to the set password, for example, a series of the input unit such as when the user lifts his / her finger. After the completion of the input operation is determined, an error is displayed on the display unit 2 as warning information.
  • FIG. 7A, FIG. 7B, and FIG. 8 to FIG. 11 are flowcharts showing an operation process of the control unit 5 for setting a password in advance as setting information and for authenticating the password.
  • the control unit 5 receives a password setting instruction from the user via the button group 4, the process proceeds from step A0 to step A1.
  • the control unit 5 sets the display color of the divided area of the circle pad 10 to individual independent colors from among predetermined G (green), R (red), B (blue), and P (pink).
  • step A2 Each time password setting or authentication is started, the display color of the sorting area of the circle pad 10 is determined at random, so that password leakage is less likely to occur even if it is viewed.
  • step A2 it is determined whether or not a password has already been set. If it is determined in step A1 that the password has already been set, the process proceeds to step A10. If it is determined that the password has not been set, the process proceeds to step A3.
  • step A3 the control unit 5 displays a message prompting the initial input of the password on the display unit 2, and proceeds to step A4.
  • step A ⁇ b> 5 it is determined whether or not the user touches the color arrangement area of each section of the circle pad 10. If it is determined in step A5 that the color arrangement area is not touched, the process proceeds to step A5. If it is determined that the color arrangement area is touched, the process proceeds to step A6.
  • step A6 the control unit 5 initializes each variable.
  • V represents the rotation direction
  • 0 represents the presence at the start position
  • 1 represents the movement in the right rotation direction
  • -1 represents the movement in the left rotation direction.
  • Vc represents the rotation fraction and is incremented by 90 ° movement.
  • Cn represents the number of rotations.
  • Ca represents the currently touched area
  • Sa represents the first touched area.
  • step A ⁇ b> 7 it is determined whether or not the user has lifted his / her finger from the circle pad 10. If it is determined in step A7 that the finger is released, the process proceeds to password setting or password authentication control in step A24 in FIG. If it is determined that the finger has not been released, the process proceeds to step A8.
  • the input device 50 of the present invention determines that the control unit 5 has completed the input operation when the user lifts his / her finger. In Step A8, it is determined whether or not the current touched area is moved to the right adjacent area.
  • step A8 If it is determined in step A8 that the current touched area is moving to the right adjacent area, the process proceeds to step A12 in the flowchart of FIG. 8, and if it is determined that the area is not moving to the right adjacent area, Move on to step A9.
  • step A9 it is determined whether or not the current touched area is moving to the left adjacent area. If it is determined in step A9 that the current touched area is moving to the left adjacent area, the process proceeds to step A18 in the flowchart of FIG. 9, and if it is determined that the area is not moving to the left adjacent area, Move on to step A7.
  • step A10 the control unit 5 displays a message prompting input for password authentication on the display unit 2, and proceeds to step A11.
  • step A15 the control unit 5 sets the current touch area in Ca and proceeds to step A16.
  • step A16 it is determined whether or not the rotation fraction Vc is four. If it is determined in step A16 that the rotation fraction is 4, the process proceeds to step A17. If it is determined that the rotation fraction is not 4, the process proceeds to step A7 in the flowchart of FIG. 7B.
  • step A18 the control is performed.
  • the unit 5 determines whether or not the last operation is a clockwise operation. If it is determined in step A18 that the operation is clockwise, the process proceeds to step A33 of the flowchart shown in FIG. 11, and if it is determined that the operation is not clockwise, the process proceeds to step A19.
  • step A21 the control unit 5 sets the current touch area in Ca and proceeds to step A22.
  • Step A22 it is determined whether or not the rotation fraction Vc is ⁇ 4. If it is determined in step A22 that the rotation fraction is ⁇ 4, the process proceeds to step A23. If it is determined that the rotation fraction is not ⁇ 4, the process proceeds to step A7 in the flowchart of FIG. 7B.
  • the control unit 5 determines that the finger has been released in step A7 in the flowchart of FIG. 7B, the process proceeds to step A24 in the flowchart of FIG.
  • step A26 it is determined whether or not the set password rotation speed Cn1 matches the password rotation speed Cn2 input for authentication. If it is determined in step A26 that Cn1 and Cn2 do not match, the process proceeds to step A31 in the flowchart of FIG. 11, and if it is determined that Cn1 and Cn2 match, the process proceeds to step A27.
  • step A27 it is determined whether or not the set password rotation direction V1 matches the password rotation direction V2 input for authentication. If it is determined in step A27 that V1 and V2 do not match, the process proceeds to authentication password input error control in step A31 of the flowchart of FIG. 11, and if it is determined that V1 and V2 match, the process proceeds to step A28. Move.
  • step A28 the terminal is activated to enable various buttons, control terminal data display, etc., and start the next process.
  • Md 0
  • step A29 it is determined whether the rotational speed Cn is 1 or more. If it is determined in step A29 that the rotation speed Cn is 1 or more, the process proceeds to step A30. If it is determined that the rotation speed Cn is not 1 or more, the input error control in step A31 of the flowchart of FIG. Move.
  • step A30 the password storage unit 17 stores the value of the variable Sc, which is the color code arranged in the area touched first, the variable Cn, which is the password rotation number, and the variable V, which is the password rotation direction. Then, the process proceeds to step A1 in the flowchart of FIG. 7A. If the control unit 5 makes a negative determination in any of steps A25, A26, A27, or A29 in the flowchart of FIG. 10, the process proceeds to step A31 in the flowchart of FIG. 11, and the control unit 5 enters the password input to the display unit 2. Is displayed, and the process proceeds to Step A32. In step A32, it is determined whether or not a predetermined time has elapsed.
  • step A32 If it is determined in step A32 that the predetermined time has not elapsed, step A32 is repeated. If it is determined that the predetermined time has elapsed, the process proceeds to step A1 in the flowchart of FIG. Encourage re-authentication.
  • the control unit 5 makes a positive determination in step A12 of the flowchart of FIG. 8 or step A18 of the flowchart of FIG. 9, that is, from the clockwise operation to the counterclockwise operation, or conversely, from the counterclockwise operation to the clockwise operation.
  • the transition operation is determined, the process proceeds to step A33 in the flowchart of FIG. 11. In step A33, it is determined whether the user has lifted his / her finger from the circle pad 10 or not.
  • step A33 If it is determined in step A33 that the user has released his / her finger from the circle pad 10, the process proceeds to step A34. If it is determined that the user has not released his / her finger, in step A34, the control unit 5 displays the display unit. 2 displays a password input error display, and proceeds to step A32. After the control unit 5 determines the completion of a series of input operations, that is, only when the user lifts his / her finger, the warning information is displayed on the display unit 2 so that the other person can touch the circle pad 10 with his / her finger. It can make it difficult to guess passwords while searching.
  • the password looks like a graphic trajectory when viewed from others, but the password is located at the first input position. Since it is composed of information, trajectory information, and movement information, even if there are a large number of strangers, it is difficult for passwords to leak even if they are peeped.
  • the password since the password consists of the simple three items of the position input information, the trajectory information, and the movement information that are input first, the correct password can be easily remembered, so the user himself / herself releases the password.
  • the input unit can be realized by a rectangular touch pad in addition to the touch panel, and the touch area and the display unit do not necessarily have to be integrated.
  • the touch pad normally functions as an element for moving the cursor, and when entering a mode for executing authentication, the touch pad may be able to achieve the same function as that of the above-described embodiment.
  • the input device can achieve the same effects as those of the above-described embodiment by including the same configuration as that of the above-described embodiment also in other forms of the input device such as a mobile phone and a mobile terminal.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
PCT/JP2009/053455 2008-03-04 2009-02-25 認証方法および入力装置 Ceased WO2009110363A1 (ja)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP09718205A EP2251811A4 (en) 2008-03-04 2009-02-25 AUTHENTICATION METHOD AND INPUT DEVICE
US12/918,601 US8516571B2 (en) 2008-03-04 2009-02-25 Authentication method and input device
CN2009801076768A CN101960463A (zh) 2008-03-04 2009-02-25 认证方法和输入装置

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2008054146A JP5238297B2 (ja) 2008-03-04 2008-03-04 認証方法および入力装置
JP2008-054146 2008-03-04

Publications (1)

Publication Number Publication Date
WO2009110363A1 true WO2009110363A1 (ja) 2009-09-11

Family

ID=41055923

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2009/053455 Ceased WO2009110363A1 (ja) 2008-03-04 2009-02-25 認証方法および入力装置

Country Status (6)

Country Link
US (1) US8516571B2 (https=)
EP (1) EP2251811A4 (https=)
JP (1) JP5238297B2 (https=)
KR (1) KR20100106622A (https=)
CN (1) CN101960463A (https=)
WO (1) WO2009110363A1 (https=)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105160234A (zh) * 2010-01-21 2015-12-16 华为终端有限公司 一种认证的方法和装置
US10870678B2 (en) 2016-04-11 2020-12-22 Arcuate Therapeutics, Inc. Chiral peptides

Families Citing this family (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0910545D0 (en) 2009-06-18 2009-07-29 Therefore Ltd Picturesafe
US9135426B2 (en) 2010-12-16 2015-09-15 Blackberry Limited Password entry using moving images
US8635676B2 (en) 2010-12-16 2014-01-21 Blackberry Limited Visual or touchscreen password entry
US9258123B2 (en) 2010-12-16 2016-02-09 Blackberry Limited Multi-layered color-sensitive passwords
US8863271B2 (en) 2010-12-16 2014-10-14 Blackberry Limited Password entry using 3D image with spatial alignment
US8631487B2 (en) * 2010-12-16 2014-01-14 Research In Motion Limited Simple algebraic and multi-layer passwords
US8650635B2 (en) 2010-12-16 2014-02-11 Blackberry Limited Pressure sensitive multi-layer passwords
US8650624B2 (en) 2010-12-16 2014-02-11 Blackberry Limited Obscuring visual login
US8769641B2 (en) 2010-12-16 2014-07-01 Blackberry Limited Multi-layer multi-point or pathway-based passwords
US8745694B2 (en) 2010-12-16 2014-06-03 Research In Motion Limited Adjusting the position of an endpoint reference for increasing security during device log-on
US8661530B2 (en) 2010-12-16 2014-02-25 Blackberry Limited Multi-layer orientation-changing password
US8931083B2 (en) 2010-12-16 2015-01-06 Blackberry Limited Multi-layer multi-point or randomized passwords
CN102739620A (zh) * 2011-04-14 2012-10-17 鸿富锦精密工业(深圳)有限公司 验证系统及方法
US8769668B2 (en) 2011-05-09 2014-07-01 Blackberry Limited Touchscreen password entry
US9223948B2 (en) 2011-11-01 2015-12-29 Blackberry Limited Combined passcode and activity launch modifier
JP5809963B2 (ja) * 2011-12-22 2015-11-11 京セラ株式会社 装置、方法、及びプログラム
GB2503417A (en) * 2012-04-24 2014-01-01 Nearfield Comm Ltd Controlling access according to both access code and user's action in entering the code
TWI522842B (zh) * 2012-06-15 2016-02-21 Pattern cryptographic track setting system and its method
CN103544426A (zh) * 2012-07-13 2014-01-29 深圳市腾讯计算机系统有限公司 一种触摸屏认证方法、装置及设备
TWI476626B (zh) 2012-08-24 2015-03-11 Ind Tech Res Inst 電子裝置之認證方法及密碼設定方法及認證系統
JP5986456B2 (ja) * 2012-08-29 2016-09-06 京セラ株式会社 携帯端末装置、プログラムおよびパスワード入力方法
JP6026186B2 (ja) * 2012-09-07 2016-11-16 フェリカネットワークス株式会社 情報処理装置および情報処理方法、並びにプログラム
KR20150005352A (ko) * 2013-07-05 2015-01-14 삼성전자주식회사 객체를 이용하여 잠금을 해제하는 전자 장치 및 방법
KR102160253B1 (ko) * 2014-01-06 2020-09-25 삼성전자주식회사 단말기 및 단말기의 잠금 상태 해제 방법
US9645731B2 (en) 2014-03-31 2017-05-09 Xiaomi Inc. Unlocking method and device using same
CN103971046B (zh) * 2014-03-31 2018-10-19 小米科技有限责任公司 一种解密的方法和装置
US20160042172A1 (en) * 2014-08-06 2016-02-11 Samsung Electronics Co., Ltd. Method and apparatus for unlocking devices
CN106406686A (zh) * 2015-07-31 2017-02-15 中兴通讯股份有限公司 一种密码认证的方法及其装置
JP6551351B2 (ja) * 2016-09-28 2019-07-31 京セラドキュメントソリューションズ株式会社 パスワード認証装置
CN109218312B (zh) * 2018-09-18 2019-11-26 深圳市思乐数据技术有限公司 一种安全认证方法、装置、系统及智能输入设备
US11526273B2 (en) * 2019-05-10 2022-12-13 Microsoft Technology Licensing, Llc Systems and methods of selection acknowledgement for interfaces promoting obfuscation of user operations
US11209979B2 (en) 2019-05-10 2021-12-28 Microsoft Technology Licensing, Llc Systems and methods for input interfaces promoting obfuscation of user navigation and selections
US11086514B2 (en) 2019-05-10 2021-08-10 Microsoft Technology Licensing, Llc Systems and methods for obfuscating user navigation and selections directed by free-form input
US11112881B2 (en) 2019-05-10 2021-09-07 Microsoft Technology Licensing, Llc. Systems and methods for identifying user-operated features of input interfaces obfuscating user navigation
US11301056B2 (en) 2019-05-10 2022-04-12 Microsoft Technology Licensing, Llc Systems and methods for obfuscating user selections
US11210431B2 (en) * 2019-06-07 2021-12-28 Dell Products L.P. Securely entering sensitive information using a touch screen device
CN113286305B (zh) * 2020-02-18 2023-02-24 深圳绿米联创科技有限公司 设备认证方法、装置、设备及存储介质

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60171560A (ja) 1984-02-17 1985-09-05 Toshiba Corp パスワ−ド方式
JPS61142835A (ja) 1984-12-14 1986-06-30 Nippon Telegr & Teleph Corp <Ntt> 利用者確認方式
JPH05324560A (ja) * 1992-05-15 1993-12-07 Brother Ind Ltd 情報処理装置のユーザ認証システム
JPH11149454A (ja) * 1997-09-10 1999-06-02 Fujitsu Ltd 認証装置、ユーザ認証方法、ユーザ認証用カード及び記憶媒体
JP2000029837A (ja) * 1998-07-08 2000-01-28 Toshiba Corp 個人認証方法、ユーザ認証装置、及び記録媒体
JP2001209615A (ja) * 2000-01-28 2001-08-03 Sony Corp 認証装置及び認証方法、プログラム格納媒体並びに情報処理装置
JP2002082734A (ja) * 2000-09-06 2002-03-22 Sony Corp 情報処理装置、情報処理方法、並びにプログラム格納媒体
JP2003051012A (ja) * 2001-08-03 2003-02-21 Nec Corp ユーザ認証方法及びユーザ認証装置
JP2004213117A (ja) 2002-12-27 2004-07-29 Falcon System Consulting Kk 認証システム

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6720860B1 (en) 2000-06-30 2004-04-13 International Business Machines Corporation Password protection using spatial and temporal variation in a high-resolution touch sensitive display
JP2004178584A (ja) * 2002-11-26 2004-06-24 Asulab Sa 機能、装置、又は所定の場所にアクセスするためのタッチスクリーンによるセキュリティコードの入力方法、及びその方法を実行するためのデバイス
JP2005202527A (ja) * 2004-01-14 2005-07-28 Fujitsu Component Ltd 入力装置およびユーザー認証方法
US20070030963A1 (en) * 2005-08-04 2007-02-08 Apple Computer, Inc. Securing and controlling access to digital data

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60171560A (ja) 1984-02-17 1985-09-05 Toshiba Corp パスワ−ド方式
JPS61142835A (ja) 1984-12-14 1986-06-30 Nippon Telegr & Teleph Corp <Ntt> 利用者確認方式
JPH05324560A (ja) * 1992-05-15 1993-12-07 Brother Ind Ltd 情報処理装置のユーザ認証システム
JPH11149454A (ja) * 1997-09-10 1999-06-02 Fujitsu Ltd 認証装置、ユーザ認証方法、ユーザ認証用カード及び記憶媒体
JP2000029837A (ja) * 1998-07-08 2000-01-28 Toshiba Corp 個人認証方法、ユーザ認証装置、及び記録媒体
JP2001209615A (ja) * 2000-01-28 2001-08-03 Sony Corp 認証装置及び認証方法、プログラム格納媒体並びに情報処理装置
JP2002082734A (ja) * 2000-09-06 2002-03-22 Sony Corp 情報処理装置、情報処理方法、並びにプログラム格納媒体
JP2003051012A (ja) * 2001-08-03 2003-02-21 Nec Corp ユーザ認証方法及びユーザ認証装置
JP2004213117A (ja) 2002-12-27 2004-07-29 Falcon System Consulting Kk 認証システム

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2251811A4

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105160234A (zh) * 2010-01-21 2015-12-16 华为终端有限公司 一种认证的方法和装置
CN105160234B (zh) * 2010-01-21 2019-02-05 华为终端(东莞)有限公司 一种认证的方法和装置
US10870678B2 (en) 2016-04-11 2020-12-22 Arcuate Therapeutics, Inc. Chiral peptides

Also Published As

Publication number Publication date
EP2251811A4 (en) 2012-01-04
US8516571B2 (en) 2013-08-20
EP2251811A1 (en) 2010-11-17
CN101960463A (zh) 2011-01-26
US20100333198A1 (en) 2010-12-30
JP5238297B2 (ja) 2013-07-17
KR20100106622A (ko) 2010-10-01
JP2009211436A (ja) 2009-09-17

Similar Documents

Publication Publication Date Title
JP5238297B2 (ja) 認証方法および入力装置
US10984089B2 (en) Unlocking a portable electronic device by performing multiple actions on an unlock interface
CA2990808C (en) Picture gesture authentication
US20110096997A1 (en) Graphical image authentication
US20110247065A1 (en) Simultaneous screen unlock and operation initiation
US20120127179A1 (en) Method, apparatus and computer program product for user interface
CN104142796B (zh) 一种终端的解锁方法及终端
WO2013120407A1 (zh) 解锁方法和装置以及密码设置方法和装置
KR101452704B1 (ko) 복수의 버튼을 갖는 휴대용 디바이스에서의 패스워드 설정방법 및 패스 워드 인증 방법
CN104883453B (zh) 迷宫解锁方法、系统及根据迷宫解锁启动的移动终端
CN105607894A (zh) 终端应用控制方法、装置及终端
WO2017143816A1 (zh) 一种智能终端的隐私保护方法及系统
CN104318137A (zh) 操作系统和/或应用程序的启动或切换方法、装置和终端
CN104267907A (zh) 多操作系统间应用程序的启动或切换方法、系统和终端
CN102799363A (zh) 一种实现图片锁屏的方法及移动终端
JP2014052837A (ja) 情報処理装置および情報処理方法、並びにプログラム
ES2948641T3 (es) Método, aparato y terminal de procesamiento de eventos de huellas dactilares
US10467393B2 (en) Method and device for triggering application
CN105825092A (zh) 手持式电子装置及其密码输入方法
CN107784211A (zh) 密码验证方法及装置
KR101627453B1 (ko) 암호 유출 방지를 위한 모바일 기기의 잠금 장치 및 그 잠금 해제 방법
KR20090044241A (ko) 버튼별 진동형태 설정방법 및 그 방법에 따른 단말기
JP5811987B2 (ja) 情報処理端末
JP6039130B2 (ja) 復号化方法、装置、プログラム及び記録媒体
US20150248545A1 (en) Sign shortcut

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980107676.8

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09718205

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 12918601

Country of ref document: US

REEP Request for entry into the european phase

Ref document number: 2009718205

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2009718205

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20107019708

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE