[go: up one dir, main page]

WO2019165979A1 - 有图符和随机字符段标记的密码输入方法及设备 - Google Patents

有图符和随机字符段标记的密码输入方法及设备 Download PDF

Info

Publication number
WO2019165979A1
WO2019165979A1 PCT/CN2019/076339 CN2019076339W WO2019165979A1 WO 2019165979 A1 WO2019165979 A1 WO 2019165979A1 CN 2019076339 W CN2019076339 W CN 2019076339W WO 2019165979 A1 WO2019165979 A1 WO 2019165979A1
Authority
WO
WIPO (PCT)
Prior art keywords
icon
password
character segment
input
random character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2019/076339
Other languages
English (en)
French (fr)
Inventor
于君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2019165979A1 publication Critical patent/WO2019165979A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Definitions

  • the invention relates to the interaction technology between a user and a computer, in particular to a password input method with an icon and a random character segment mark and a device applying the same.
  • the system when users input passwords on various types of computer devices, in order to prevent the input content from being seen by others, the system generally adopts a non-meaningful special character instead of the input password in the password input box on the screen.
  • users in order to increase the confidentiality intensity, users often set the password to a meaningless long string that is not easy to be accurately and quickly blinded.
  • the special character of the substitute password is displayed in the password input box on the screen, the user It will be difficult to find errors in the input in time.
  • what is hidden is only the password on the screen, but it cannot cover the action when the user inputs the password with the finger on the keyboard at the same time, and the password is still obtained by the others by observing and analyzing the finger action when the user operates the button.
  • the present invention provides a password input method and device having an icon and a random character segment mark, which is convenient for the user to memorize and has high password security.
  • the present invention has made the following improvements:
  • an embodiment provides a password input method with an icon and a random character segment mark, the steps of which include:
  • each random character segment includes at least one character; at least 2 random character segment marks are assigned to each icon, and each random character segment mark of each icon is randomly rotated and displayed;
  • the currently received input character segment is compared with all the random character segment marks of the password icon, and the current password input is determined according to the comparison result.
  • an embodiment provides a password input device having an icon and a random character segment mark, including:
  • a display unit for displaying information related to a password input operation
  • a data processing unit for analyzing and processing information related to the password input operation
  • An input unit configured to send information related to the password input operation to the data processing unit
  • the display unit is further configured to display at least one set of the first icon group including the password icon; and display a random character segment of each icon at a position corresponding to each icon;
  • the input unit is configured to obtain a currently received character segment of the user input, and send the input character segment to the data processing unit;
  • the data processing unit is further configured to allocate each random character segment mark for each icon in the first icon group, and send the random character segment mark of each icon to the display unit, where each random character segment includes at least a character; the data processing unit is further configured to allocate at least 2 random character segment marks for each icon, and each random character segment mark of each icon is randomly rotated; the data processing unit is further configured to input the currently received input characters. The segment is compared with all random segment markers of the password icon, and the current password input is determined to be correct according to the comparison result.
  • the password is set by the icon that is convenient for the user to remember and the random character segment mark corresponding to each icon, and each icon is assigned. At least 2 random character segment marks, each random character segment mark of each icon is randomly rotated and displayed, and the password icon can not be determined by observing and recording each random character segment mark typed by the user, thereby enhancing the security of the password. Sex, while easy to remember password icon reduces the user's memory burden.
  • FIG. 1 is a schematic diagram of an icon group and a set of random character segment marks of an embodiment
  • FIG. 2 is a schematic diagram of four password icons set by a user in an embodiment
  • 3 is a set of correct random character segments typed by a user of an embodiment
  • FIG. 4 is a schematic diagram of another set of random character segment marks after an icon group and a rotation change according to an embodiment
  • FIG. 5 is a schematic diagram of four password icons set by a user in another embodiment
  • Figure 6 is another set of correct random character segments that a user can type in an embodiment.
  • the present application provides a password input method and device with an icon and a random character segment mark.
  • the method sets a password by an icon convenient for the user to memorize and a random character segment mark corresponding to each icon, each icon
  • Each random character segment mark random rotation display by inputting a character segment corresponding to the password icon in at least one set of the first icon group to perform password matching, and randomly changing the displayed random character segment mark to enhance the difficulty of the password being peeped , enhanced password security.
  • interconnect may be static or dynamic characters, numbers, symbols, icons, logos, graphics, tiles, or a combination thereof, or may be included in dynamic or static images or drawings. Multiple local areas with exact boundaries and shapes but with exact approximate positional features.
  • icon group refers to a set of icons including a plurality of icons arranged in an ordered or unordered manner and displayed at the same time; or a static group containing a plurality of virtual regions serving as icons or Dynamic picture, this picture can even be a blank picture, in which each virtual area acting as an icon has a fixed specific position.
  • the virtual area in an icon group can display the same picture, or display different pictures, or display a blank picture, as long as the position of each virtual area serving as an icon is fixed, when the icon is a virtual area, In fact, the location information is used to distinguish different icons.
  • the "input” referred to in the present application may be input through a physical keyboard or a virtual keyboard, or may be input by a pen, a finger on a touch screen, a stroke drawing or a gesture drawing input, or may be input through a voice. It may be the movement and positioning input of the viewing focus of the human eye on the screen detected by the photoelectric recognition and sensing device.
  • the "character" referred to in the present application may be a letter, a number, a symbol typed on a physical keyboard or a virtual keyboard, a sliding track input by a pen or a finger on a touch screen, or a note input by voice.
  • the corresponding letters, numbers, and symbols may also be letters, numbers, and symbols corresponding to and triggered by the observation focus of the human eye input on the screen through the photoelectric recognition and sensing device.
  • character segment includes at least one character.
  • characters Of course, in order to increase the difficulty of voyeur recording, it is best to use multiple characters. The more characters the character segment contains, the higher the security level of the password, but the amount of calculation of the system will also increase. In actual operation, the number of characters contained in the character segment should be selected as needed.
  • random character segment refers to a character segment that is randomly assigned and has a corresponding relationship with a specific icon in only one display; when the specific icon is displayed again, it is randomly assigned another one and still only A random segment of a correspondence.
  • random character segment mark refers to a random character segment that follows the area of the position where the "icon" is located.
  • display unit includes an electronic display, or a combination of electronic displays, or a combination of an electronic display and a static graphic display.
  • a password input device having an icon and a random character segment mark, the device comprising a display unit, a data processing unit and an input unit, wherein the data processing unit is connected to the display unit and the input unit, In some embodiments, the display unit is also coupled to the input unit signal.
  • the input unit is configured to acquire an input character segment currently input by the user, and then send the received input character segment to the data processing unit.
  • the input unit may send the input character segments to the data processing unit in batches, or may send all the input character segments to the data processing unit after the user inputs.
  • a data processing unit configured to receive an input character segment sent by the input unit, and to allocate each of the different random segment marks for each icon in the first icon group currently displayed by the display unit, and each icon Each random segment marker is randomly rotated for display. After receiving the input character segment, the input character segment is compared with the random character segment mark of the password icon, and according to the comparison result, it is determined whether the user's password input is correct. It should be noted that the data processing unit can compare each input character segment with the random character segment mark of the password icon in batches, or after inputting all the input character segments together with the password icon. Random character segment marks are used for comparison.
  • the judgment result can be given after all the input is completed, so that the password thief will have difficulty judging that there are several input character segments and that the input character segments have errors. Increased the difficulty of password cracking.
  • the display unit is configured to display a first icon group including an icon, and a random segment label assigned to each icon by the data processing unit, and the random segment mark corresponding to the icon can be displayed beside the icon , can also be displayed in other one-to-one correspondence.
  • the method further includes: a setting unit connected to the data processing unit, wherein the setting unit is configured to set the password icon, and send the set password icon to the data processing unit, that is, when the password is set,
  • the setting unit is configured to obtain a set of password icons, and the password icon is at least two icons selected by the user from at least one set of the second icon group including the plurality of icons currently displayed by the display unit.
  • the setting unit is further configured to set the number of icons in the first icon group displayed by the display unit; or the setting unit is further configured to set the number of icons in the password icon;
  • the unit may also be configured to set the number of random segment markers assigned for each icon; or the setting unit may be further configured to set a time interval for displaying random random segments of the random character segments of the icon, the time interval The time interval that can be set for the system, or the time interval manually set by the user.
  • the random rotation display of each random character segment of the icon can also be set by an input action, for example, when After a random segment marker input is completed, each random segment marker of the icon changes randomly.
  • FIG. 1 is a schematic diagram of a first icon group and a set of random character segment marks, including a display screen 1 as a display unit and a keyboard 2 as an input unit.
  • the display screen 1 and the keyboard 2 may be independent electronic components connected to each other by wired or wireless communication, or may be virtual keyboards displayed on the same screen in the same touch screen.
  • the display screen 1 displays a first icon group including the icon 3 of the set number graphic symbol, wherein the set number may be a system setting, or may be manually set by the user as needed, in this embodiment.
  • the first icon group contains 30 icons 3.
  • a random character segment mark 4 composed of at least one character is displayed next to each icon 3.
  • the random character segment mark 4 includes three characters, and the characters are composed of numbers.
  • the number of characters in each random segment mark 4 may also be one, two or more.
  • the characters may not be limited to numbers, may be symbols, letters, etc., and are random in a specific embodiment.
  • the keyboard 2 includes a plurality of character buttons, wherein the character buttons include all the characters constituting the random character segment marks 4.
  • the keyboard further includes the function buttons shown in the figure, and the function buttons are used for the reversal when an input error occurs.
  • the character button is a 10-digit character button 5 including 0 to 9, and the function button includes an enter key 6 and a backspace key 7.
  • the icon in order to facilitate the user to memorize and search, the icon preferably has various unique features, graphics, icons that are easy to identify, distinguish, and memorize, and may be static or dynamic.
  • the present application also provides a password input method with an icon and a random character segment mark.
  • the password is first set by the setting unit. First, at least two icons are obtained as a set of password icons in the displayed second icon group of the second icon group containing multiple icons.
  • the figure shows a password icon set by the user in advance through the setting unit, which includes four optional icons. These four icons are selected by the user from the icon group displayed in the password setting step.
  • the second icon group that sets the password icon in the password setting step may also have multiple groups. At this time, the user selects the favorite icon as the password by selecting all the second icon groups. Icon. After the password is set, when the user needs to enter the password protection device or view related information, the password or the information page needs to be opened by entering the password.
  • the password input method is as follows:
  • the display unit will display a set of the first icon group including the password icon, and display the different random segment marks assigned to each icon, and display the random character segments of each icon in the Each icon forms a position of a corresponding relationship, each random character segment includes at least one character; at least 2 random character segment marks are assigned to each icon, and each random character segment mark of each icon is randomly rotated and displayed, and the user visually displays Observing and determining the random segment mark corresponding to the four password icons preset in the first icon group, and typing four random character segment marks of the four password icons on the input unit, for example, typing as shown in the figure 3 shows the four number fields and press Enter.
  • the icon in the first icon group displayed by the unit and the icon in the second icon group may be completely identical, and the icon in the first icon group may also be only the second icon group. Part of the middle icon, but all the password icons must be included in the first icon group.
  • the icons in the first icon group may be different or partially repeated, and the same group of random segment marks are shared for the repeated icons.
  • the data processing unit After the data processing unit obtains the input character segment, the input character segment is compared with the random character segment mark of the password icon, and the current password input is determined according to the comparison result.
  • the data processing unit can compare each input character segment with the random character segment mark of the password icon in batches, or mark all the input character segments together with the random character segment of the password icon after the input is completed. Compared. In a preferred embodiment, for the two comparison methods, it is preferable to wait until all the inputs are completed to give a judgment result, so that the password thief will have difficulty judging that there are several input segments and that the input segments have appeared. The error increases the security of the password.
  • the system will determine that the user password is entered correctly and enter the normal program afterwards. If the character segment input by the user does not completely match the password icon, the system will send a prompt message to the user that the password input is incorrect.
  • the prompt may be a prompt mode for indicating a voice, a text or a pattern.
  • the user may be allowed to select a sequence rule for typing a random character segment mark in the password setting step.
  • a sequence rule for typing a random character segment mark is input according to the specified order rule to calculate the password.
  • Successful matching increases the difficulty of the thief to crack the password through voyeurism or other means.
  • Such an operation although lowering the encryption level, is more convenient for the user to remember the password and password input operations, because the user only needs to remember the four password icons, without having to remember the order.
  • each icon is automatically assigned multiple by the system, such as 30 random character segment marks, and is randomly rotated and displayed at intervals of about 1 second.
  • the user can type any random segment marker for each password icon it sees.
  • the ever-changing random segment mark greatly improves the difficulty of the voyeur's complete record of the random segment mark displayed by the display unit. Even if the technique of sneak shot screen is used, it is difficult to accurately determine which user typed the content.
  • Four icons are automatically assigned multiple by the system, such as 30 random character segment marks, and is randomly rotated and displayed at intervals of about 1 second.
  • the user can type any random segment marker for each password icon it sees.
  • the ever-changing random segment mark greatly improves the difficulty of the voyeur's complete record of the random segment mark displayed by the display unit. Even if the technique of sneak shot screen is used, it is difficult to accurately determine which user typed the content.
  • each icon has a plurality of random segment marks displayed by random rotation, only a small part of all random segment marks are displayed at the same time, and the user inputs a random character segment,
  • the random segment marks for each icon in the display unit are in alternating rotations. In this way, even if this small part is photographed by someone else with the camera, it is difficult to determine which icons each of the random character segments typed by the legitimate user points to.
  • the user can input the correct password input result to the data processing unit by simply inputting any random character segment mark appearing next to each of the password icons observed by the user in accordance with the prescribed order.
  • each random character segment typed by the user with the finger for the password operation process is easily observed and recorded by the person next to it, since these random character segments are only random segments of the rotation displayed next to the password icon.
  • the simple repetition of the mark is only valid once. If the voyeur only writes down the character segments typed by the user and does not have all the random segment marks of the full record icon, it is still difficult to know which icons belong to the password icon.
  • the distribution position of the icons in the first icon group is randomly changed during the process of receiving the character segments input by the user.
  • the user Due to the randomly changing icon position, the user is forced to perform the gaze action of the search in the first icon group, and the position of the gaze point is different each time the password is input, and the icons of the first icon group are The location also changes each time a password is entered, which significantly increases the difficulty of the voyeur's recording and guessing.
  • the user and the voyeur After adopting the measure of randomly changing the position of the icon, each time the user performs the next password input operation, the user and the voyeur will find that all the icon positions in the first icon group have been re-sorted. The user can search for the password icon in the public view and enter the other set of random character segment marks of the previously observed password icon, without worrying about the voyeur record.
  • the icon group contains 100 icons and a complete password is composed of 3 password icons, if a random character segment mark of the password icon is required to be entered in a specific order rule, 1 million can be formed. A possible combination of passwords, it is almost impossible for others to crack passwords by guessing.
  • the icons in the icon group can be distinguished by a few background colors, and there are only a few icons having the same background color. In this way, when the user searches for the password icon, the password icon can be found only in the icon with a specific background color.
  • any tangible, non-transitory computer readable storage medium may be utilized, including magnetic storage devices (hard disks, floppy disks, etc.), optical storage devices (CD-ROM, DVD, Blu Ray disks, etc.), flash memory, and/or the like.
  • These computer program instructions can be loaded onto a general purpose computer, special purpose computer or other programmable data processing device to form a machine such that the instructions executed on the computer or other programmable data processing device can generate means for performing the specified function.
  • the computer program instructions can also be stored in a computer readable memory, which can instruct the computer or other programmable data processing device to operate in a particular manner such that the instructions stored in the computer readable memory can form a single piece Manufacturing, including implementations that implement specified functions.
  • Computer program instructions can also be loaded onto a computer or other programmable data processing device to perform a series of operational steps on a computer or other programmable device to produce a computer-implemented process for execution on a computer or other programmable device. Instructions can provide steps for implementing a given function.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

一种有图符和随机字符段标记的密码输入方法及设备,该方法包括:显示包含有密码图符在内的第一图符组;为第一图符组中的每个图符分配各不相同的随机字符段标记,并将各图符的随机字符段显示在与各图符形成对应关系的位置,每一随机字符段包含至少一个字符;为每个图符分配至少2个随机字符段标记,每个图符的各个随机字符段标记随机轮换显示;获取当前接收到的用户输入的字符段;将当前接收到的输入字符段与密码图符的所有随机字符段标记作对比,根据对比结果确定当前的密码输入是否正确。因每个图符的各个随机字符段标记随机轮换显示,使得通过观察和记录用户键入的各随机字符段标记都无法确定密码图符,增强了密码的安全性。

Description

有图符和随机字符段标记的密码输入方法及设备 技术领域
本发明涉及用户与计算机之间的交互技术,尤其涉及一种有图符和随机字符段标记的密码输入方法及应用这种方法的设备。
背景技术
随着信息化时代的到来,人们为了保护自己的身份、财产等安全,通常会对存有个人信息的各类计算机设备、手机以及各种账号等设置密码。又由于密码一旦被不法分子偷窥到往往会给用户带来不可挽回的损失,故如何有效防止用户输入密码时被不法分子偷窥到,已经成为急需解决的社会问题。
目前,用户在各类计算机设备输入密码时,为了防止输入内容被他人看到,系统一般采取在屏幕上的密码输入框内用无意义的特殊字符来代替输入的密码。同时,为了增加保密强度,用户往往将密码设置成不容易准确快速盲打的没有意义的长字符串,但是,采用这么方式,若屏幕上的密码输入框内只显示替代密码的特殊字符,用户会难以及时发现输入上的差错。并且,被隐藏的只是屏幕上的密码,却不能同时遮盖用户在键盘上用手指输入密码时的动作,仍然会被旁人通过观察分析用户操作按键时的手指动作来获取密码。
对此,在银行环境中常用的措施,是在键盘上设置遮挡手指操作动作的遮罩。但遮罩的遮挡效果与用户操作难度之间存在矛盾。遮盖角度越大,隐秘效果越好,但操作难度也越高,影响用户体验。
同时,在家庭和办公环境中,普通台式电脑、笔记本电脑的键盘上显然不便于设置遮罩,但这类环境中仍然有经常性的密码输入操作。 在手机屏幕上,也由于更难以隐藏手指的动作,使得更容易泄露密码或者锁屏图案。
并且,在隐蔽摄像设备很容易得到的现代社会中,不法分子采用高技术手段偷窥密码已经让人防不胜防,一般性的措施已经难以招架。为了提高破解难度,设置各类密码一般都被要求采用长字符段,并且可能还要包括大小写、特殊字符的组合。但这样复杂抽象的密码如何记忆,一直是让人们头痛的难题。
综上所述,在目前的各种密码输入环境中,不仅都存在密码容易泄露的问题。而且,密码所有者还难以确定自己的密码在输入操作时是否曾经被不法分子偷窥盗取,只能采用经常更换密码的方式来补救和预防。可是,符合破解难度要求的密码本来就不容易记忆,频繁更换的结果会增加人们的记忆负担,使人更加苦恼。
技术问题
针对上述现有技术的缺陷,本发明提供了一种有图符和随机字符段标记的密码输入方法及设备,该方法便于用户记忆,且密码安全性高,
技术解决方案
为了加大密码被偷窥的难度,本发明作出了如下的改进:
根据第一方面,一种实施例提供了一种有图符和随机字符段标记的密码输入方法,其步骤包括:
显示包含有密码图符在内的第一图符组;为第一图符组中的每个图符分配各不相同的随机字符段标记,并将各图符的随机字符段显示在与各图符形成对应关系的位置,每一随机字符段包含至少一个字符;为每个图符分配至少2个随机字符段标记,每个图符的各个随机字符段标记随机轮换显示;
获取当前接收到的用户输入的字符段;
将当前接收到的输入字符段与密码图符的所有随机字符段标记作对比,根据对比结果确定当前的密码输入是否正确。
根据第二方面,一种实施例提供了一种有图符和随机字符段标记的密码输入设备,包括:
显示单元,用于显示与密码输入操作相关的信息;
数据处理单元,用于分析和处理与密码输入操作相关的信息;
输入单元,用于向数据处理单元发送与密码输入操作相关的信息;
显示单元还用于显示至少一组包含有密码图符的第一图符组;并在与各图符形成对应关系的位置显示各图符的随机字符段;
输入单元用于获取当前接收到的用户输入的字符段,并将输入字符段发送给数据处理单元;
数据处理单元还用于为第一图符组中的每个图符分配各不相同的随机字符段标记,并将各图符的随机字符段标记发送至显示单元,每一随机字符段包含至少一个字符;数据处理单元还用于为每个图符分配至少2个随机字符段标记,每个图符的各个随机字符段标记随机轮换显示;数据处理单元还用于将当前接收到的输入字符段与密码图符的所有随机字符段标记作对比,根据对比结果确定当前的密码输入是否正确。
有益效果
依据上述实施例的有图符和随机字符段标记的密码输入方法及设备,通过便于用户记忆的图符和与各个图符对应的随机字符段标记对密码进行设置,且为每个图符分配至少2个随机字符段标记,每个图符的各个随机字符段标记随机轮换显示,通过该方法使得通过观察和记录用户键入的各随机字符段标记都无法确定密码图符,增强了密码的安全性,同时便于记忆的密码图符减轻了用户的记忆负担。
附图说明
图1是一种实施例的图符组和一组随机字符段标记的示意图;
图2是一种实施例的用户设置的四个密码图符示意图;
图3是一种实施例的用户键入的一组正确的随机字符段;
图4是一种实施例的图符组和轮换变化后的另一组随机字符段标记的示意图;
图5是另一种实施例的用户设置的四个密码图符示意图;
图6是是一种实施例的用户可键入的另一组正确的随机字符段。
本发明的实施方式
具体实施方式
下面通过具体实施方式结合附图对本发明作进一步详细说明。其中不同实施方式中类似元件采用了相关联的类似的元件标号。在以下的实施方式中,很多细节描述是为了使得本申请能被更好的理解。然而,本领域技术人员可以毫不费力的认识到,其中部分特征在不同情况下是可以省略的,或者可以由其他元件、材料、方法所替代。在某些情况下,本申请相关的一些操作并没有在说明书中显示或者描述,这是为了避免本申请的核心部分被过多的描述所淹没,而对于本领域技术人员而言,详细描述这些相关操作并不是必要的,他们根据说明书中的描述以及本领域的一般技术知识即可完整了解相关操作。
另外,说明书中所描述的特点、操作或者特征可以以任意适当的方式结合形成各种实施方式。同时,方法描述中的各步骤或者动作也可以按照本领域技术人员所能显而易见的方式进行顺序调换或调整。因此,说明书和附图中的各种顺序只是为了清楚描述某一个实施例,并不意味着是必须的顺序,除非另有说明其中某个顺序是必须遵循的。
本文中为部件所编序号本身,例如“第一”、“第二”等,仅用于区分所描述的对象,不具有任何顺序或技术含义。而本申请所说“连接”、“联接”,如无特别说明,均包括直接和间接连接(联接)。
本申请提供了一种有图符和随机字符段标记的密码输入方法及设备,该方法通过便于用户记忆的图符和与各个图符对应的随机字符段标记对密码进行设置,每个图符的各个随机字符段标记随机轮换显示,通过在至少一组第一图符组中输入与密码图符对应的字符段以进行密码匹配,随机轮换显示的随机字符段标记增强的密码被偷窥的难度,增强了密码的安全性。
本申请中用到的术语定义包括:
本申请所称的“图符”,可以是静态的或者动态的字符、数字、符号、图标、标志、图形、图块或者它们的组合,也可以是包含在动态或者静态图片、图画中的没有确切边界和形状但有确切的大致位置特征的多个局部区域。
本申请所称的“图符组”,是指包含有多个以有序或者无序方式分布的并同时显示的图符集合;也可以是包含了多个充当图符的虚拟区域的静态或者动态图画,这个图画甚至可以是空白的画面,在这幅空白的画面中,充当图符的每个虚拟区域具有固定的特定位置。一个图符组中的虚拟区域可以显示相同的画面,也可以显示不同的画面,或者是显示空白画面,只要充当图符的每个虚拟区域的位置固定即可,当图符为虚拟区域是,实际上是通过位置信息来区分不同的图符的。
本申请所称的“输入”,可以是通过实体键盘、虚拟键盘的输入,也可以是通过笔、手指在触摸屏幕上的点击、笔画绘制或者笔势绘制输入,也可以是通过语音的输入,还可以是通过光电识别和传感装置检测到的人眼在屏幕上的观察焦点的移动和定位输入。
本申请所称的“字符”,可以是通过实体键盘、虚拟键盘上键入的字母、数字、符号,也可以是笔、手指在触摸屏幕上输入的滑动轨迹,也可以是通过语音输入的音符所对应的字母、数字、符号,也可以是通过光电识别和传感装置输入的人眼在屏幕上的观察焦点所对应和触发的字母、数字、符号。
本申请所称的“字符段”,至少包含一个字符。当然,为了增加偷窥记录难度,最好采用多个字符。字符段包含的字符越多,密码的安全级别越高,但是系统的计算量也会随之增加,在实际操作中应根据需要选择字符段中包含的字符数量。
本申请所称的“随机字符段”,是指随机分配并且仅在一次显示中与特定图符具有对应关系的字符段;该特定图符被再次显示时,会被随机分配另一个与其仍然仅有一次对应关系的随机字符段。
本申请所称的“随机字符段标记”,是指跟随显示在“图符”所在位置区域的随机字符段。
本申请所称的“显示单元”,包括电子显示屏,或者电子显示屏的组合,或者电子显示屏与静态图文板的组合。
在本发明实施例中,提供了一种有图符和随机字符段标记的密码输入设备,该设备包括显示单元、数据处理单元和输入单元,其中数据处理单元与显示单元和输入单元信号连接,在有的实施例中,显示单元还与输入单元信号连接。
输入单元用于获取用户当前输入的输入字符段,然后将接收到的输入字符段发送至数据处理单元。在具体实施例中,输入单元可以分批次将输入字符段发送至数据处理单元,也可以待用户输入完毕后,集中将所有的输入字符段发送至数据处理单元。
数据处理单元,用于接收输入单元发送的输入字符段,以及用于为显示单元当前显示的第一图符组中的每个图符分配各不相同的随机字符段标记,且每个图符的各个随机字符段标记随机轮换显示。在接收到输入字符段后将输入字符段与密码图符的随机字符段标记作对比,并根据对比结果确定该用户的密码输入是否正确。需要说明的是,数据处理单元既可以分批次将每个输入字符段与密码图符的随机字符段标记作对比,也可以在输入完毕后,将所有的输入字符段一起与密码图符的随机字符段标记作对比。在优选的实施例中,无论哪种对比方式,可以等到所有输入完毕后才给出判断结果,这样密码盗窃者将很难判断有几个输入字符段出现了错误以及哪些输入字符段出现了错误,增加了密码被破解的难度。
显示单元,显示单元用于显示包含图符的第一图符组,以及数据处理单元分配给每个图符的随机字符段标记,与图符对应的随机字符段标记可以显示在图符的旁边,也可以以其他一一对应的方式显示。
在有的实施例中,还包括与数据处理单元信号连接的设置单元,设置单元用于对密码图符进行设置,并将设置的密码图符发送给数据处理单元,即在进行密码设置时,设置单元用于获取一组密码图符,密码图符为用户从显示单元当前显示的至少一组包含多个图符的第二图符组中选取的至少两个图符。在有的实施例中,设置单元还用于对显示单元显示的第一图符组中图符的数量进行设置;或者设置单元还用于对密码图符中图符的数量进行设置;另外设置单元还可以用于对为每个图符分配的随机字符段标记的数量进行设置;或者设置单元还可以用于对图符的各个随机字符段标记随机轮换显示的时间间隔进行设置,该时间间隔可以为系统设定的时间间隔,也可以为用户人工设定的时间间隔,在有的实施例中,也可以通过输入动作对图符的各个随机字符段标记随机轮换显示进行设置,例如,当完成一个随机字符段标记输入后,图符的各个随机字符段标记随机变化。
在一种实施例中,如图1所示为第一图符组和一组随机字符段标记的示意图,其包括作为显示单元的显示屏1和作为输入单元的键盘2。显示屏1和键盘2,可以是相互以有线或者无线通讯方式连接的独立的电子部件,也可以是在同一个触摸屏中同屏显示的虚拟键盘。
显示屏1显示了一个包含设定数量图形符号式的图符3的第一图符组,其中,设定数量可以是系统设定,也可以是用户根据需要人工设定,在本实施例中,如图1所示,第一图符组中包含30个图符3。在这个第一图符组中,每个图符3的旁边都显示了一个由至少一个字符构成的随机字符段标记4。在本实施例中,为了提高密码盗窃者的观察和记录难度,随机字符段标记4包括三个字符,字符由数字构成。在其他的实施例中,每个随机字符段标记4中字符的数量也可以为一个、两个或多个,字符可以不局限于数字,可以为符号、字母等,且在具体实施例中随机字符段标记4中字符的数量越多,密码的安全性越高。键盘2包括多个字符按键,其中字符按键包括组成随机字符段标记4的所有字符,在有的实施例中,键盘还包括图中所示的功能按键,功能按键用于出现输入错误时的退格操作和/或输入完成后的确认操作,在本实施例中,字符按键为包括0至9的10个数字的字符按键5,功能按键包括回车键6、退格键7。
在具体实施例中,为了便于用户记忆和查找,图符优选各种有独特特征的、便于识别、区分和记忆的图形、图标,可以是静态的,也可以是动态。
基于上述有图符和随机字符段标记的密码输入设备,本申请还提供了一种有图符和随机字符段标记的密码输入方法,
在输入密码之前首先通过设置单元对密码进行设置,首先需在显示的至少一组包含多个图符的第二图符组中获取至少两个图符作为一组密码图符。
请参见图2,图中所示为用户预先通过设置单元设置好的密码图符,其包括四个自选的图符。这四个图符是用户从密码设置步骤显示的图符组中选中的。在有的实施例中,在密码设置步骤对密码图符进行设置的第二图符组也可以有多组,此时用户通过从所有的第二图符组中自行选中中意的图符作为密码图符。待密码设置完成后,当用户需要进入密码保护设备或查看相关信息时,需要通过输入密码以打开设备或信息页面,密码输入方法的过程如下:
显示单元将显示一组包含密码图符在内的第一图符组,并同时显示分配给每个图符的各不相同的随机字符段标记,并将各图符的随机字符段显示在与各图符形成对应关系的位置,每一随机字符段包含至少一个字符;为每个图符分配至少2个随机字符段标记,每个图符的各个随机字符段标记随机轮换显示,用户目视观察并确定第一图符组中与他预先设置的四个密码图符对应的随机字符段标记,并在输入单元上键入这四个密码图符的四个随机字符段标记,例如键入如图3所示的四个数字段,然后按回车。
在具有实施例中,单元显示的第一图符组中的图符与第二图符组中的图符可以完全一致,第一图符组中的图符也可以只为第二图符组中图符的一部分,但在第一图符组中需包含所有的密码图符。另外,第一图符组中的图符可以各不相同,也可以有部分重复,对于重复的图符其共用同一组随机字符段标记。
数据处理单元获取输入字符段后,将输入字符段与密码图符的随机字符段标记作对比,并根据对比结果确定当前的密码输入是否正确。数据处理单元既可以分批次将每个输入字符段与密码图符的随机字符段标记作对比,也可以在输入完毕后,将所有的输入字符段一起与密码图符的随机字符段标记作对比。在优选的实施例中,针对两种对比方式,最好等到所有输入完毕后才给出判断结果,这样密码盗窃者将很难判断有几个输入字符段出现了错误以及哪些输入字符段出现了错误,增加了密码的安全性。
若用户输入的字符段与密码图符全部匹配成功,则系统会判定用户密码输入正确,进入之后的正常程序。若用户输入的字符段与密码图符没有完全匹配成功,则系统会向用户发出密码输入不正确的提示信息,该提示可以是用于表示密码错误的语音、文字或图案等提示方式。
本实施例中,可以在密码设置步骤中容许用户选择键入随机字符段标记的顺序规则,此时在输入密码时,只有按照指定的顺序规则输入与密码图符对应的随机字符段标记才算密码匹配成功,增加了盗窃者通过偷窥或其他手段破解密码的难度。若应用环境对加密级别要求不很高,可以不对键入随机字符段标记的顺序进行限定,此时按任意顺序键入与密码图符对应的随机字符段标记即为密码匹配成功。这样的操作,虽然会降低加密级别,但更便于用户对密码的记忆和密码输入操作,因为用户只要记住四个密码图符即可,无需记住顺序。
本实施例中,每个图符都被系统自动分配了多个,比如30个随机字符段标记,并以大约1秒间隔随机轮换显示。用户可键入其看到的每个密码图符的任意一个随机字符段标记。显然,不断变化的随机字符段标记,会极大提高偷窥者的对显示单元显示的随机字符段标记的完整记录的难度,即便采用偷拍屏幕的技术手段,也难以准确判断用户键入内容究竟对应哪四个图符。
就如图4所示的那样,相对于图1所有随机字符段标记都已经轮换变化过了,但用户仍然可以从观察到的密码图符旁的新的随机字符段标记来键入。比如,键入图6中的四段数字后,也可以正确选定图5所示的四个密码图符,从而被确定为密码输入正确。因用户在键入四段随机字符段的一段时间内,显示屏中显示的所有图符的随机字符段标记已经多次刷新变化过,这就让偷窥者难以同时准确记录所有显示的随机字符段标记,从而难以获知密码内容。
采用了上述方法,由于每个图符都有多个随机轮换显示的随机字符段标记,同一时刻显示出来的仅仅是所有随机字符段标记中的一小部分,用户键入随机字符段的过程中,显示单元中的每个图符的随机字符段标记都在不停的轮换交替变化中。这样,即便这一小部分被别人用相机瞬间偷拍,也难以确定该合法用户键入的每段随机字符段分别指向哪些图符。
本发明在应用时,用户只需按着规定的次序规则输入其观察到的每个密码图符旁出现的任何一个随机字符段标记,就能向数据处理单元传送正确的密码输入结果。在这个过程中,虽然用户用手指进行密码操作过程键入的每条随机字符段很容易被旁边的人观察到和记录下来,但因这些随机字符段仅仅是密码图符旁轮换显示的随机字符段标记的简单重复,只一次性有效,若偷窥者仅仅记下用户键入的这些字符段而没有完整记录图符的所有随机字符段标记,仍然难以获知哪些图符属于密码图符。
为了增加他人窥视密码的技术难度,在本发明的另一实施例中,设置第一图符组中的图符的分布位置在先后接收用户输入的字符段过程中随机变化。
由于随机变化的图符位置,会迫使用户在第一图符组内做搜寻的目光动作,每次输入密码时的目光注视点位置都不同,并且,第一图符组内的各个图符的位置也在每次输入密码时候有所变化,这就显著提高了偷窥者的记录和猜测难度。
采用了随机变化图符位置的措施后,每当用户进行下一次密码输入操作时,用户和偷窥者都会发现第一图符组中的所有图符位置已经重新进行了随机排序。用户可以在众目睽睽下搜寻密码图符,并从容输入其观察到的密码图符的不同于前次的另一组随机字符段标记,而仍然不用担心别人的偷窥记录。
本发明在应用中,若图符组包含100个图符,一个完整密码由3个密码图符组成,那么,若要求按特定顺序规则输入密码图符的随机字符段标记,就可形成100万个可能的密码组合,他人通过猜测来破解密码几乎不可能。
在有的实施例中,为了降低用户搜寻密码图符的难度,可以将图符组内的图符用很少的几种背景颜色来区分,具有相同背景颜色的图符只有数个。这样在用户搜寻密码图符时,可以只在具有特定背景颜色的图符中寻找密码图符。
同理,也可以用特殊轮廓之类的其他容易区分的形状特征来区分图符,比如用方形、菱形、圆形、星型轮廓来区分多组图符。因人眼的生理能力限制,同一个人无法同时观察和记录用户输入密码时的手指动作和屏幕上的每个图符组的所有随机字符段标记,也就无法确切观察和记录下用户每次输入的随机字符段究竟对应屏幕上的哪一个图符。尤其是当每个图符都有轮换交替显示的多个随机字符段标记、和/或图符的分布位置随机变化时,即便被人偷拍屏幕也难以破解密码。
本文参照了各种示范实施例进行说明。然而,本领域的技术人员将认识到,在不脱离本文范围的情况下,可以对示范性实施例做出改变和修正。例如,各种操作步骤以及用于执行操作步骤的组件,可以根据特定的应用或考虑与系统的操作相关联的任何数量的成本函数以不同的方式实现。
另外,如本领域技术人员所理解的,本文的原理可以反映在计算机可读存储介质上的计算机程序产品中,该可读存储介质预装有计算机可读程序代码。任何有形的、非暂时性的计算机可读存储介质皆可被使用,包括磁存储设备(硬盘、软盘等)、光学存储设备(CD-ROM、DVD、Blu Ray盘等)、闪存和/或诸如此类。这些计算机程序指令可被加载到通用计算机、专用计算机或其他可编程数据处理设备上以形成机器,使得这些在计算机上或其他可编程数据处理装置上执行的指令可以生成实现指定的功能的装置。这些计算机程序指令也可以存储在计算机可读存储器中,该计算机可读存储器可以指示计算机或其他可编程数据处理设备以特定的方式运行,这样存储在计算机可读存储器中的指令就可以形成一件制造品,包括实现指定功能的实现装置。计算机程序指令也可以加载到计算机或其他可编程数据处理设备上,从而在计算机或其他可编程设备上执行一系列操作步骤以产生一个计算机实现的进程,使得在计算机或其他可编程设备上执行的指令可以提供用于实现指定功能的步骤。
虽然在各种实施例中已经示出了本文的原理,但是许多特别适用于特定环境和操作要求的结构、布置、比例、元件、材料和部件的修改可以在不脱离本披露的原则和范围内使用。以上修改和其他改变或修正将被包含在本文的范围之内。
前述具体说明已参照各种实施例进行了描述。然而,本领域技术人员将认识到,可以在不脱离本披露的范围的情况下进行各种修正和改变。因此,对于本披露的考虑将是说明性的而非限制性的意义上的,并且所有这些修改都将被包含在其范围内。同样,有关于各种实施例的优点、其他优点和问题的解决方案已如上所述。然而,益处、优点、问题的解决方案以及任何能产生这些的要素,或使其变得更明确的解决方案都不应被解释为关键的、必需的或必要的。本文中所用的术语“包括”和其任何其他变体,皆属于非排他性包含,这样包括要素列表的过程、方法、文章或设备不仅包括这些要素,还包括未明确列出的或不属于该过程、方法、系统、文章或设备的其他要素。此外,本文中所使用的术语“耦合”和其任何其他变体都是指物理连接、电连接、磁连接、光连接、通信连接、功能连接和/或任何其他连接。
具有本领域技术的人将认识到,在不脱离本发明的基本原理的情况下,可以对上述实施例的细节进行许多改变。因此,本发明的范围应根据以下权利要求确定。

Claims (6)

  1. 有图符和随机字符段标记的密码输入方法,其特征在于包括:
    显示包含有密码图符在内的第一图符组;为第一图符组中的每个图符分配各不相同的随机字符段标记,并将各图符的随机字符段显示在与各图符形成对应关系的位置,每一随机字符段包含至少一个字符;为每个图符分配至少2个随机字符段标记,每个图符的各个随机字符段标记随机轮换显示;
    获取当前接收到的用户输入的字符段;
    将当前接收到的输入字符段与密码图符的所有随机字符段标记作对比,根据对比结果确定当前的密码输入是否正确。
  2. 如权利要求1所述的方法,其特征在于:所述第一图符组中的各个图符的分布位置在先后接收用户输入的字符段过程中随机变化。
  3. 如权利要求1所述的方法,其特征在于:还包括密码设置步骤,具体包括:显示至少一组包含多个图符的第二图符组,将用户在第二图符组中选择的至少两个图符作为一组密码图符。
  4. 有图符和随机字符段标记的密码输入设备,包括:
    显示单元,用于显示与密码输入操作相关的信息;
    数据处理单元,用于分析和处理与密码输入操作相关的信息;
    输入单元,用于向数据处理单元发送与密码输入操作相关的信息;
    其特征在于,
    显示单元还用于显示至少一组包含有密码图符的第一图符组;并在与各图符形成对应关系的位置显示各图符的随机字符段;
    输入单元用于获取当前接收到的用户输入的字符段,并将输入字符段发送给数据处理单元;
    数据处理单元还用于为第一图符组中的每个图符分配各不相同的随机字符段标记,并将各图符的随机字符段标记发送至显示单元,每一随机字符段包含至少一个字符;数据处理单元还用于为每个所述图符分配至少2个随机字符段标记,每个图符的各个随机字符段标记随机轮换显示;数据处理单元还用于将当前接收到的输入字符段与密码图符的所有随机字符段标记作对比,根据对比结果确定当前的密码输入是否正确。
  5. 如权利要求4所述的设备,其特征在于,所述第一图符组中的各个图符的分布位置在先后接收用户输入的字符段过程中随机变化。
  6. 如权利要求4所述的设备,其特征在于,所述数据处理单元还用于将至少一组包含多个图符的第二图符组发送至显示单元显示,并将用户在第二图符组中选择的至少两个图符作为一组密码图符。
PCT/CN2019/076339 2018-02-28 2019-02-27 有图符和随机字符段标记的密码输入方法及设备 Ceased WO2019165979A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810165913.7A CN108345784A (zh) 2018-02-28 2018-02-28 有图符和随机字符段标记的密码输入方法及设备
CN201810165913.7 2018-02-28

Publications (1)

Publication Number Publication Date
WO2019165979A1 true WO2019165979A1 (zh) 2019-09-06

Family

ID=62959120

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/076339 Ceased WO2019165979A1 (zh) 2018-02-28 2019-02-27 有图符和随机字符段标记的密码输入方法及设备

Country Status (2)

Country Link
CN (1) CN108345784A (zh)
WO (1) WO2019165979A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108345784A (zh) * 2018-02-28 2018-07-31 于君 有图符和随机字符段标记的密码输入方法及设备
CN110851814B (zh) * 2019-10-29 2023-04-25 南京航空航天大学 一种基于图像进行用户登陆的验证方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101800644A (zh) * 2010-01-11 2010-08-11 上海众烁信息科技有限公司 一种基于动态口令的计算机安全保护系统及方法
CN103034798A (zh) * 2012-12-14 2013-04-10 广东欧珀移动通信有限公司 一种随机密码的生成方法及装置
CN103413103A (zh) * 2013-08-30 2013-11-27 任建军 一种图形密码输入系统及方法
CN105406965A (zh) * 2015-11-21 2016-03-16 徐江锋 一种明文密码的加密方法
CN108345784A (zh) * 2018-02-28 2018-07-31 于君 有图符和随机字符段标记的密码输入方法及设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101800644A (zh) * 2010-01-11 2010-08-11 上海众烁信息科技有限公司 一种基于动态口令的计算机安全保护系统及方法
CN103034798A (zh) * 2012-12-14 2013-04-10 广东欧珀移动通信有限公司 一种随机密码的生成方法及装置
CN103413103A (zh) * 2013-08-30 2013-11-27 任建军 一种图形密码输入系统及方法
CN105406965A (zh) * 2015-11-21 2016-03-16 徐江锋 一种明文密码的加密方法
CN108345784A (zh) * 2018-02-28 2018-07-31 于君 有图符和随机字符段标记的密码输入方法及设备

Also Published As

Publication number Publication date
CN108345784A (zh) 2018-07-31

Similar Documents

Publication Publication Date Title
US11055394B2 (en) Password pattern recognition authentication method
RU2589397C2 (ru) Аутентификация графических жестов
US10176315B2 (en) Graphical authentication
US20060174339A1 (en) An arrangement and method of graphical password authentication
EP2763070B1 (en) Graphical user interface (GUI) that receives directional input to change face for receiving passcode
KR101885836B1 (ko) 이미지 패스워드 시스템을 이용한 사용자 인증 방법 및 부가서비스 제공 방법
CN101587398A (zh) 密码保护方法
WO2019165976A1 (zh) 一种密码输入方法和装置
US20160188865A1 (en) 3d pass-go
Kwon et al. SteganoPIN: Two-faced human–machine interface for practical enforcement of PIN entry security
Ritter et al. Miba: Multitouch image-based authentication on smartphones
Yang PassPositions: A secure and user-friendly graphical password scheme
WO2019165979A1 (zh) 有图符和随机字符段标记的密码输入方法及设备
WO2019137489A1 (zh) 一种密码输入方法、设备及计算机可读存储介质
WO2019165978A1 (zh) 以随机字符段标记间接输入的密码输入方法及设备
KR102014408B1 (ko) 이미지 터치 패스워드를 이용한 사용자 인증 방법 및 이를 위한 컴퓨터 프로그램
WO2019210819A1 (zh) 带随机字符段标记的图符式密码认证方法和装置
Rajarajan et al. GRAMAP: Three stage graphical password authentication scheme.
Gao et al. Usability and security of the recall-based graphical password schemes
KR20180067082A (ko) 다이얼식 가상 보안 키패드 및 이를 이용한 인증 방법 및 장치
Verma et al. Biometric based user authentication in smart phones
US20180121668A1 (en) Method and an apparatus for activating a predetermined function
KR102325833B1 (ko) 그래픽 오티피를 이용한 사용자 인증방법 및 인증시스템
KR20190133818A (ko) 픽처 패스워드를 이용한 사용자 인증 방법 및 컴퓨터 프로그램
KR20170114955A (ko) 캐릭터를 이용한 그래픽 사용자 인증 및 부가서비스 제공 방법 그리고 이를 실행하는 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19760052

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19760052

Country of ref document: EP

Kind code of ref document: A1