WO2019137489A1 - Dispositif et procédé de saisie de mot de passe, et support d'informations lisible par ordinateur - Google Patents
Dispositif et procédé de saisie de mot de passe, et support d'informations lisible par ordinateur Download PDFInfo
- Publication number
- WO2019137489A1 WO2019137489A1 PCT/CN2019/071412 CN2019071412W WO2019137489A1 WO 2019137489 A1 WO2019137489 A1 WO 2019137489A1 CN 2019071412 W CN2019071412 W CN 2019071412W WO 2019137489 A1 WO2019137489 A1 WO 2019137489A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- icon
- password
- user
- icons
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
Definitions
- the present invention relates to the field of user information security technologies, and in particular, to a password input method, device, and computer readable storage medium.
- embodiments of the present invention are intended to provide a password input method, apparatus, and computer readable storage medium.
- an embodiment provides a password input method, including:
- each of the first icon groups includes a plurality of different icons
- An icon in each of the first icon groups is a user-preset password icon
- an embodiment provides a password input device, the device comprising:
- a first generating unit configured to generate a plurality of first icon groups and generate different random character segments for each icon in each first icon group; wherein each of the first icon groups includes multiple Each of the different icons, each of the icons in the first icon group is a user-preset password icon;
- a display unit configured to sequentially display the plurality of first icon groups, and display random segments corresponding to the respective icons in the first icon group in a preset position in the corresponding icon; wherein each Each icon in the first icon group is arranged according to a preset position rule;
- the input unit receives the character segment input by the user during each first icon group display process
- a data processing unit configured to compare a character segment input by the user with a random character segment corresponding to the password icon in the currently displayed first icon group, determine a comparison result, and trigger the display module to display the next first
- the icon group is also used when all the first icon groups are displayed, and the character segments input by the user in each of the first icon group display are the same as the passwords in the first icon group displayed at the time.
- the random character segment corresponding to the icon is the same, it is determined that the user input password is correct.
- a computer readable storage medium comprising a program for execution by a processor to implement the first aspect and any of the above The method described in the item.
- the icon form password used in the embodiment of the present invention has at least the following advantages:
- the password consists of graphic icons such as “eggplant”, “monkey”, “racquet” and “bike”. It is not only easy to remember, but also easy to remember in the process of password verification many times, and it is easy to remember for a long time. Even if you can't think of it for a while, it is easy to recall the icon in the icon group when you enter the password authentication step, recalling the memory and recalling it.
- the password in the form of an icon is very simple to remember, and the security of the icon password is very high due to the special password input method. This is because each time the password is entered, the system will All the icons in the code generate a random character segment, and the user can only be determined by the system to select the correct password icon when inputting the same character segment as the random character segment of the password icon. In this case, due to the limitation of the physiological ability of the human eye, the same person cannot simultaneously observe and record the finger movements when the user inputs the password and all the random character segments of each icon group on the screen, and thus cannot be accurately observed and recorded. Which icon on the screen corresponds to the random character segment that the user enters each time.
- the technical solution provided by the embodiment of the present invention can completely eliminate the possibility of malicious voyeurism of others, thereby avoiding the personal information, data leakage and property loss caused by the password leakage to the user, and is difficult for the traditional password.
- Forgetting voyeurism this long-disturbing world puzzle has provided a powerful means of cracking.
- 1 is a flow chart of an encryption input method of the present invention in an embodiment
- FIG. 2 is a partial flow chart of another embodiment of the password input method of the present invention.
- FIG. 3 is a structural block diagram of a password input device of the present invention in an embodiment
- FIG. 4 is a structural block diagram of a password input device of the present invention in a second embodiment
- FIG. 5 is a schematic diagram showing the basic structure of a password input device of the present invention in an embodiment
- FIG. 6 is a schematic diagram showing the basic structure of a password input device of the present invention in a second embodiment
- FIG. 7 is a schematic diagram showing the basic structure of a password input device of the present invention in a third embodiment
- FIG. 8 is a schematic diagram showing the basic structure of a password input device of the present invention in a fourth embodiment
- FIG. 9 is a schematic diagram showing the basic structure of a password input device of the present invention in a fifth embodiment.
- FIG. 10 is a schematic diagram showing the basic structure of a password input device of the present invention in a sixth embodiment
- FIG. 11 is a schematic diagram showing the basic structure of a password input device of the present invention in a seventh embodiment
- FIG. 12 is a schematic diagram showing the basic structure of the cipher input device of the present invention in the eighth embodiment.
- a first embodiment of the present invention provides a password input method. Referring to FIG. 1, the method includes:
- Step 101 Generate a plurality of first icon groups, and generate different random character segments for each icon in each first icon group;
- Each of the first icon groups includes a plurality of different icons, and one icon in each of the first icon groups is a password icon preset by the user;
- the icon is a still image or a moving image.
- icon group refers to a set of icons that are displayed at the same time, which are distributed in an ordered or unordered manner, or a static or dynamic picture that contains a plurality of virtual regions that serve as icons;
- the picture referred to here may even be a blank picture in which each virtual area acting as an icon has a fixed specific position.
- each icon in the first icon group includes but is not limited to the following types or combinations of multiple types:
- Each of the first icon groups consists of a plurality of partial regions in the image that have no exact boundaries and shapes but have exact approximate positional features.
- the first icon group is a plurality of partial regions constituting a whole picture, and the shape of each of the partial regions may be regular or irregular.
- the random character segment may be a track composed of a straight line and/or a curve
- the character segment may also be a combination of characters. Specifically, it may be a combination of at least one type of characters including but not limited to:
- the trajectory composed of the straight line and/or the curve is displayed on or near the area where each icon in the first icon group is located, and is used to indicate that the user inputs the same or similar trajectory through the touch screen or the electronic drawing board.
- the character segment must contain at least one character. Of course, in order to increase the difficulty of voyeurism, it is best to use multiple characters.
- the random character segment refers to a character segment that is randomly generated and has a corresponding relationship with a specific icon in only one display; when the specific icon is displayed again, another random character segment that still has only one correspondence with each other is generated. . That is to say, each time the password authentication is entered, these random segments are regenerated and only valid during the current authentication process.
- step 101 before or after step 101, the following password icon setting or modification steps are also included:
- each second icon group includes multiple icons that are different from each other;
- steps S201-S204 only distinguish different steps, and are not used to limit the sequence of execution of each step.
- first icon group and the second icon group are only used to distinguish the icon groups in different operation steps, and are not used to define or distinguish the first icon group and the second.
- the contents of the drawing group and the arrangement position of the icons are only used to distinguish the icon groups in different operation steps, and are not used to define or distinguish the first icon group and the second.
- each first icon group and each second icon group of the corresponding order may be identical, corresponding to each icon content and position in each icon group. It is also identical.
- first icon group and the second icon group may also be different, and each second icon group only needs to include at least one password icon appearing in the corresponding one of the first icon groups. Just fine.
- each icon in the second icon group includes but is not limited to the following types or combinations of multiple types:
- Each of the second icon groups may be composed of a plurality of partial regions of the image that have no exact boundaries and shapes but have exact approximate positional features.
- the second icon group is a plurality of partial regions constituting a whole picture, and the shape of each of the partial regions may be regular or irregular.
- the user can set a password.
- the password set by the user is composed of a plurality of icons selected by the user.
- the order of the multiple icons is set as needed.
- the order in which the icons are determined may be used as the order of the icons in the icon password, or the order may not be specified; if the order is not specified It is necessary to ensure that the various icons that make up the icon password are different from each other.
- each icon in the icon password may have the same icon or may be different.
- all the icons of all the icon groups are preferably different from each other, and grouped into the same icon group according to the content characteristics of the icon. For example, all animal icons are classified into one icon group containing only animals, and no animals in other icon groups.
- the icons in each second icon group generated in step S201 are different, but allowed in different icon groups.
- the user can select the appropriate icon as the password icon in the second icon group currently displayed according to his own needs, so that the password icon selected by the user may have two or more pictures. In the same case, the selected icons may be different.
- the icons in each second icon group generated in step S201 are different, and the different icon groups are not in the same. Allow the same icon to appear, so that when the user selects the appropriate icon as the password icon in the second icon group currently displayed according to his own needs, each icon in the selected password icon does not The same, the same situation does not exist.
- Step 102 Display a plurality of first icon groups in sequence, and display a random character segment corresponding to each icon in the first icon group in a preset position in the corresponding icon; wherein each first Each icon in the icon group is arranged according to a preset position rule;
- the plurality of first icon groups may be displayed in a random order, or may be displayed in a preset order, depending on whether the password icon set by the user has a sequence requirement. If the password icon set by the user has an order requirement, the password icons in the plurality of first icon groups correspond to the order of the password icons constituting the user password, and at this time, the plurality of first icon groups Must be displayed in the order of the password icon. If the password icons set by the user are not sequentially required, the password icons in the plurality of first icon groups may be displayed in a random order, or may be displayed in any prescribed order.
- the first icon group is identical to the second icon group, and the user cannot change the order and content of the icon group.
- the password icon is selected, and the position of any icon cannot be changed. All users are faced with the same standard icon group that cannot be changed.
- the random character segment corresponding to each icon may be displayed as close as possible to the peripheral position of the icon to which it belongs or directly to the region where the icon is located.
- the size of the random character segment can be designed to be significantly smaller than the display size of the icon, as long as the user can recognize it by the naked eye.
- Step 103 Receive a character segment input by a user in each first icon group display process
- the "input” mentioned here may be input through a physical keyboard or a virtual keyboard, or may be a pen, a finger click on a touch screen, a stroke drawing or a gesture drawing input, or may be input through a voice, or may be passed through The movement and positioning input of the observation focus of the human eye detected on the screen by the photoelectric recognition and sensing device.
- the character segment input by the user may be a letter, a number, a symbol typed on a physical keyboard or a virtual keyboard, a sliding track input by a pen or a finger on a touch screen, or a letter corresponding to a note input by voice.
- the user when the user inputs the random character segments that are observed above or next to each password icon, the user can input the correct password input result.
- each random character segment typed by the user during the password operation process may be observed and recorded by the person next to it, since these random character segments are only valid once, it is useless to write down.
- the next time the user enters the password input operation he can still enter the other set of random character segments displayed next to each of the password icons observed by the user in the eyes of the public, without worrying about the voyeur record of others.
- Passwords with unrestricted digits are used as passwords. There is no problem that traditional passwords are limited by the number of digits. Therefore, when applied in highly confidential situations such as military finance, a very high level of password security can be obtained. For example, if each first icon group contains 20 lines and 20 columns and a total of 400 icons, and a set of passwords contains 8 password icons, the encryption level can reach an astronomical number of 6.5536e+20, and 8 have The icon of meaning is still easy to remember. Of course, the more important thing is that you are not afraid of voyeurism.
- Step 104 Compare the character segment input by the user with the random character segment corresponding to the password icon in the currently displayed first icon group, determine the comparison result, and send the next first icon group to the user. ;
- the user selects an icon corresponding to the icon password set by himself (that is, the password icon in the currently displayed page) in the currently displayed first icon group, and inputs the figure.
- the character corresponding to the current random character segment when the icon corresponding to the random character segment input by the user is a password icon, it is determined that the user input is correct this time, but unless the user has correctly input all the character segments, the system will not Make any prompts to the user, but continue to send the next first icon group to the user before the user's full icon password is entered.
- the character segment input by the user is different from the random character segment corresponding to the password icon in the currently displayed first icon group, it is determined that the user inputs the password error, but displays in all the first icon groups. Before the completion, the next first icon group is still sent to the user and the character segment input by the user is received. Only when the last first icon group is displayed and the user ends the password input operation, the user returns a password input error message.
- Step 105 When the character segment input by the user in each first icon group display process is the same as the random character segment corresponding to the password icon in the first icon group displayed at the time, the user is determined to input the password. correct.
- steps 103-105 are only used to distinguish different steps, and are not used to limit the sequence of execution of each step; in fact, there is no strict sequence between the three steps.
- the method further includes:
- the random character segments corresponding to the respective icons are divided into a plurality of parts, and the respective parts are sequentially displayed according to a preset time interval.
- the display interval of each part can be set according to actual needs, and the dwell time of each part during display can also be set according to actual needs.
- each random character segment can be decomposed into a plurality of different parts, and each of the decomposed characters is displayed in different time periods.
- the complete temporary character segment can still be observed by the visual persistence phenomenon, and the electronic camera device used for the sneak shot is difficult to take a full picture due to the limitation of the progressive or interlaced scanning principle of the camera device. Or record a random character segment.
- the password in the form of an icon is very simple to remember, and the privacy of the icon password is very high due to the special password input method.
- the system will map each figure in the password.
- the character will generate a random character segment, and the user can input the correct password icon only when the input character segment is correct.
- the same person cannot simultaneously observe and record the finger when the user inputs the password.
- the action and all the random segments of each icon group on the screen cannot accurately observe and record which icon on the screen corresponds to the random segment that the user inputs each time. Therefore, the technical solution provided by the embodiment of the present invention can almost completely eliminate the possibility of malicious peek of others, thereby avoiding personal information, data leakage and property loss caused by the password leakage to the user.
- a second embodiment of the present invention provides a password input device, where the device includes:
- a first generating unit 31 configured to generate a plurality of first icon groups and generate different random character segments for each icon in each first icon group; wherein each of the first icon groups includes multiple Each of the different icons, one of the icons in the first icon group is a user-preset password icon;
- a display unit 32 configured to sequentially display the plurality of first icon groups, and display random character segments corresponding to the respective icons in the first icon group in a preset position in the corresponding icon;
- Each icon in a first icon group is arranged according to a preset position rule;
- the input unit 33 receives the character segment input by the user during each first icon group display process
- the data processing unit 34 is configured to compare the character segment input by the user with the random character segment corresponding to the password icon in the currently displayed first icon group, determine the comparison result, and trigger the first display module 32 to display The next first icon group; also used when all the first icon groups are displayed, and the character segments input by the user in each of the first icon group display are the same as the first icon displayed at the time. When the random character segment corresponding to the password icon in the group is the same, it is determined that the user input password is correct.
- the device further includes:
- a second generating unit 35 configured to generate a plurality of second icon groups; wherein each second icon group includes multiple icons;
- the display unit 32 is configured to sequentially display the plurality of second icon groups
- the input unit 33 is configured to receive, during each second icon group display process, selection information of the user for any one of the second icon groups;
- the setting unit 36 is configured to determine each icon selected by the user as a password icon, and form a plurality of password icons into the password of the user.
- the data processing unit 34 is configured to determine that the character segment input by the user is different from the random character segment corresponding to the password icon in the first icon group displayed at the time. At the same time, it is determined that the user inputs a password error, and determines whether all of the first icon groups are all displayed. If not, the next first icon group is sent to the user, and the last first icon group is displayed and ends. After the segment receiving step, the user sends a prompt message indicating that the password is entered incorrectly;
- the character segment is a track composed of a straight line and/or a curve, or includes but is not limited to the following combinations of at least one type of character:
- the display unit 32 is specifically configured to split the random character segments corresponding to the respective icons into a plurality of parts, and sequentially display the respective parts according to a preset time interval.
- the icon is a static image or a dynamic image
- the content included in the icon includes but is not limited to the following types or a combination thereof:
- Each of the first icon group or the second icon group may be composed of a plurality of partial regions in the image that have no exact boundaries and shapes but have exact approximate positional features.
- the password input device provided by the embodiment of the present invention further includes the following technical features:
- the display unit 32 is a display unit that provides only a single viewing angle.
- a display unit that provides only a single viewing angle includes the "anti-spy screen” technology that is covered in front of the electronic display screen in the prior art, and also includes a well-shaped deep hole grid covering the front of the electronic display screen.
- the prior art of narrowing the viewing angle formed by the screen also includes an electronic display technology that itself has a narrow viewing angle.
- Fig. 5 is a schematic diagram showing the basic structure of a password input device.
- the device includes a display screen 1 as a display unit and a keyboard 2 as an input unit.
- Display 1 shows an icon group of icon 3 containing 30 graphic symbols.
- a random character segment 4 is displayed next to each icon 3.
- the keyboard 2 includes a 10-digit character button 5 of 0 to 9 and an enter key 6 and a backspace key 7.
- the password set by the user in advance through the setting unit is four optional icons 3. These four icons 3 are selected by the user from the four icon groups. The icon 3 in all icon groups is not repeated.
- the four icon groups 3 are displayed to the user four times in a predetermined fixed order, and the corresponding random character segment 4 is displayed at the lower right corner of the area where each icon 3 is located.
- the 30 random character segments 4 displayed on the same screen are non-repeating 3-digit numbers.
- the user visually observes and determines a random character segment in the lower right corner of the first password icon that is preset in the icon group, and presses the random character segment on the keyboard 2 and presses Enter key 6. If you feel that the input is wrong, you can press the backspace key 7 to modify it.
- the system automatically swipes and displays the second icon group.
- the user repeats the previous operation, and types a random character segment that is considered to belong to the lower right corner of the second password icon that he presets, and then presses the enter key 6 to call up the third icon group. .
- the user repeats the previous operation, types the random character segment next to the third password icon that he thinks belongs to him, and presses the enter key 6 to call up the fourth icon group.
- the user repeats the previous operation, typing a random character segment next to the fourth password icon that he/she thinks belongs to him, and then pressing the Enter key 6.
- the system will determine that the user password is entered correctly and enter the normal program afterwards. If the user's previous input has an error, the system will display a prompt message indicating that the password is not entered correctly.
- the display screen and the keyboard may be separate electronic components that are connected to each other by wired or wireless communication, or may be virtual keyboards that are displayed on the same screen in the same touch screen.
- the icon 3 is a variety of graphics and icons that have unique features that are easy to identify, distinguish, and remember. These graphics or icons can be static or dynamic.
- the user can set the display rule of the random character segment by setting the unit.
- the setting can be made: when the user types the first numeric character, the system makes the current icon group All random characters that are being displayed disappear immediately, or all the contents of the current icon group disappear together until they press the preset number of digits or press the Enter key to display the next icon group. For example, when the user presses the third number, instead of pressing the enter key 6, the system automatically displays the next icon group.
- FIG. 6 is a schematic diagram showing the basic structure of a second type of password input device.
- the icon 3 displayed by the password input device is composed of Chinese characters. Of course, it can also be composed of words in other languages, such as English words.
- the advantage of this type of text icon is that it is easy to describe, document, and inform others.
- password content is easy to tell others, and sometimes it is a disadvantage.
- FIG. 7 is a schematic diagram of the basic structure of a third type of password input device, and the icon 3 is in the form of an English letter. This method is relatively simple, but because of the limited number of letters, the encryption strength of the password is relatively low, which is more suitable for the access control environment of ordinary buildings.
- FIG. 8 is a schematic diagram showing the basic structure of a fourth type of password input device. Similar to FIG. 7, the icon 3 is also in the form of an English letter. However, the random character segment next to the icon adopts a single gesture pattern, and the password input device adopts a touch input panel with a touch-slidable input gesture pattern. Obviously, multiple gesture patterns can also be used to form a random character segment.
- a single artwork can also be used as the icon group, and the screen regions where some random character segments at a plurality of fixed positions are arranged in an irregular distribution manner are used as icons.
- This icon has no exact boundary range and relies solely on the picture content characteristics of the location as a condition for user memory and search. This kind of icon is more in line with the physiological memory characteristics of the human brain. Because people mark tokens in specific locations in their familiar picture environment, it's easier to remember and search. When entering the password input step, the user only needs to search for a random character segment of the screen position belonging to his "password icon" in his memory, and then accurately input the content of the random character segment.
- the password input device uses a keyboard containing 26 English letters and an enter key and a backspace key.
- the original keyboard is the keyboard used to operate the password.
- the advantage of this full-letter keyboard is that it is more suitable for entering random segments in a fast and accurate way.
- the fast blind play method is less likely to be sneaked and memorized by bystanders.
- the random character segment in this embodiment adopts a multiple display manner with a time difference.
- the display state of the second time of all the random character segments in the above icon group picture is displayed, and all the random character segments display only the second letter.
- the display state of the third time of all the random character segments in the above icon group picture is displayed, and all the random character segments only display the third letter.
- the interval between the above three times can be set to about 0.3 seconds, and is continuously displayed for about 0.1 second each time. Thus, a random segment of text will display a full cycle in approximately 1 second.
- the advantage of this is that it is more difficult to observe, memorize or capture and capture the complete content of all random segments displayed on one screen, whether by the eye of the bystander or by the camera of the sneak shot.
- each letter of each random character segment can also be displayed as a time difference of a plurality of frames in pixels of different blocks, so that the limitation of the principle of progressive scanning of digital images will make the digital camera more difficult. Capture complete and accurate content of random segments.
- the operation of calling up the next icon group can be set to press a specific key such as the enter key or the space key, or can be set to the current icon group display, after the number of times exceeds the number of words of the set random character segment, Auto Steering displays the next icon group.
- Step 1301 Generate three icon groups; each icon group includes multiple icons; the icons in each icon group are distributed according to a preset position rule;
- Step 1302 Determine a display order of the three icon groups
- Step 1303 displaying the first icon group in order
- Step 1304 Receive selection information of a user for an icon in the first icon group.
- Step 1305 determining the first icon selected by the user as the first password icon
- Step 1306 Receive user selection information for one icon in the second icon group.
- Step 1307 Determine the second icon selected by the user as the first password icon.
- Step 1308 Receive user selection information for an icon in the third icon group.
- Step 1309 Determine a third icon selected by the user as the first password icon.
- Step 1310 Generate and save as a user password according to three icons selected by the user;
- Each icon selected by the user is defined as a password icon
- the password icon selected by the user forms the password of the user in a preset order rule
- Step 1311 Enter a password input process to generate multiple icon groups
- Each icon group contains a plurality of mutually different icons and one of them is a password icon preset by the user;
- Step 1312 Display the first icon group in a preset order, and generate a random character segment corresponding to the first icon group;
- Step 1313 Receive a first character segment input by a user.
- Step 1314 comparing the first character segment input by the user with the random character segment corresponding to the first icon group, and determining the comparison result, proceeding to step 1315;
- Step 1315 Display a second icon group in a preset order, and generate a random character segment corresponding to the second icon group;
- Step 1316 Receive a second character segment input by a user.
- Step 1317 comparing the second character segment input by the user with the random character segment corresponding to the second icon group, and determining the comparison result, proceeding to step 1318;
- Step 1318 Display a third icon group in a preset order, and generate a random character segment corresponding to the third icon group;
- Step 1319 Receive a third character segment input by a user.
- Step 1320 comparing the third character segment input by the user with the random character segment corresponding to the third icon group, and determining the comparison result, proceeding to step 1321;
- Step 1321 it is determined whether the character segments input by the user three times are the same as the random character segments corresponding to the password characters in the character group displayed at the time, if yes, go to step 1322, if not, proceed to step 1323;
- Step 1322 determining that the user inputting the password is correct
- Step 1323 Determine that the user inputs a password error, and returns a prompt information indicating that the password is incorrectly input to the user.
- a third embodiment of the present invention provides a computer readable storage medium comprising a program for execution by a processor to implement the method of any of the above first aspects.
- the program may be stored in a computer readable storage medium, and the storage medium may include: a read only memory, a random access memory, a magnetic disk, an optical disk, a hard disk, etc.
- the computer executes the program to implement the above functions.
- the program is stored in the memory of the device, and when the program in the memory is executed by the processor, all or part of the above functions can be realized.
- the program may also be stored in a storage medium such as a server, another computer, a magnetic disk, an optical disk, a flash disk or a mobile hard disk, and may be saved by downloading or copying.
- the system is updated in the memory of the local device, or the system of the local device is updated.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
L'invention concerne un procédé de saisie de mot de passe, un dispositif de saisie de mot de passe et un support d'informations lisible par ordinateur ; dans ledit procédé, l'utilisateur utilise un mot de passe se présentant sous la forme d'une icône, ce qui est facile à retenir pour l'utilisateur. Lors de l'exécution d'une authentification de mot de passe, un système génère un segment de caractères aléatoires à côté de toutes les icônes, y compris des icônes de mot de passe. Si l'utilisateur voit et saisit correctement les segments de caractères aléatoires apparaissant en séquence à côté de chaque icône de mot de passe, alors le système détermine que la présente authentification de mot de passe a réussi ; sinon, il détermine que l'authentification a échoué. Les segments de caractères aléatoires saisis à chaque fois qu'une authentification réussit sont différents et valables une seule fois ; par conséquent, même si lesdits segments sont volés, le mot de passe ne sera pas divulgué ; en conséquence, la force de confidentialité du mot de passe est considérablement améliorée et la probabilité qu'une autre personne regarde subrepticement le mot de passe est presque complètement éliminée, ce qui supprime les défauts, présents dans des moyens d'authentification de mot de passe classiques, de la crainte des indiscrétions, de la difficulté de mémorisation du mot de passe et de la facilité d'oubli du mot de passe.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810043313.3 | 2018-01-12 | ||
| CN201810043313.3A CN108133156A (zh) | 2018-01-12 | 2018-01-12 | 一种密码输入方法及设备 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019137489A1 true WO2019137489A1 (fr) | 2019-07-18 |
Family
ID=62399953
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2019/071412 Ceased WO2019137489A1 (fr) | 2018-01-12 | 2019-01-11 | Dispositif et procédé de saisie de mot de passe, et support d'informations lisible par ordinateur |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN108133156A (fr) |
| WO (1) | WO2019137489A1 (fr) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108133156A (zh) * | 2018-01-12 | 2018-06-08 | 于君 | 一种密码输入方法及设备 |
| CN109117844B (zh) * | 2018-08-08 | 2020-08-18 | 中央民族大学 | 一种密码确定方法和装置 |
| CN112101947A (zh) * | 2020-08-27 | 2020-12-18 | 江西台德智慧科技有限公司 | 一种提高语音支付安全性的方法 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101162489A (zh) * | 2007-11-26 | 2008-04-16 | 唐荣华 | 用于保密输入的伪装图片产生方法及其使用方法 |
| CN101655768A (zh) * | 2009-09-23 | 2010-02-24 | 谭立彦 | 一种防偷窥的密码输入方法 |
| CN105631297A (zh) * | 2016-01-13 | 2016-06-01 | 青岛海信移动通信技术股份有限公司 | 一种多用户解锁的方法及装置 |
| CN108133156A (zh) * | 2018-01-12 | 2018-06-08 | 于君 | 一种密码输入方法及设备 |
-
2018
- 2018-01-12 CN CN201810043313.3A patent/CN108133156A/zh active Pending
-
2019
- 2019-01-11 WO PCT/CN2019/071412 patent/WO2019137489A1/fr not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101162489A (zh) * | 2007-11-26 | 2008-04-16 | 唐荣华 | 用于保密输入的伪装图片产生方法及其使用方法 |
| CN101655768A (zh) * | 2009-09-23 | 2010-02-24 | 谭立彦 | 一种防偷窥的密码输入方法 |
| CN105631297A (zh) * | 2016-01-13 | 2016-06-01 | 青岛海信移动通信技术股份有限公司 | 一种多用户解锁的方法及装置 |
| CN108133156A (zh) * | 2018-01-12 | 2018-06-08 | 于君 | 一种密码输入方法及设备 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108133156A (zh) | 2018-06-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Jansen | Authenticating mobile device users through image selection | |
| CN101183941B (zh) | 随机隐询式密码认证技术 | |
| US20060174339A1 (en) | An arrangement and method of graphical password authentication | |
| KR101885836B1 (ko) | 이미지 패스워드 시스템을 이용한 사용자 인증 방법 및 부가서비스 제공 방법 | |
| JP2008004107A (ja) | パスワードを選択する方法および装置 | |
| WO2019137489A1 (fr) | Dispositif et procédé de saisie de mot de passe, et support d'informations lisible par ordinateur | |
| Yang | PassPositions: A secure and user-friendly graphical password scheme | |
| WO2019165976A1 (fr) | Procédé et appareil d'entrée de mot de passe | |
| Kwon et al. | SteganoPIN: Two-faced human–machine interface for practical enforcement of PIN entry security | |
| Ritter et al. | Miba: Multitouch image-based authentication on smartphones | |
| KR102014408B1 (ko) | 이미지 터치 패스워드를 이용한 사용자 인증 방법 및 이를 위한 컴퓨터 프로그램 | |
| Arun Kumar et al. | A survey on graphical authentication system resisting shoulder surfing attack | |
| Tabrez et al. | Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system | |
| WO2019165978A1 (fr) | Procédé et dispositif d'entrée de mot de passe utilisant une entrée indirecte d'une marque de champ de caractère aléatoire | |
| WO2019165979A1 (fr) | Procédé et équipement pour entrer un mot de passe ayant un symbole et une étiquette de segment de caractère aléatoire | |
| Hasan et al. | Multifactor pattern implicit authentication | |
| Alsuhibany et al. | Making PIN and password entry secure against shoulder surfing using camouflage characters | |
| Shankar et al. | IPCT: A scheme for mobile authentication | |
| WO2019210819A1 (fr) | Procédé et appareil d'authentification d'un mot de passe de type icône doté d'une marque de champ de caractère aléatoire | |
| Amruth et al. | Android smudge attack prevention techniques | |
| KR20180067082A (ko) | 다이얼식 가상 보안 키패드 및 이를 이용한 인증 방법 및 장치 | |
| Al-Husainy et al. | Using Emoji Pictures to Strengthen the Immunity of Passwords against Attackers | |
| KR20190133818A (ko) | 픽처 패스워드를 이용한 사용자 인증 방법 및 컴퓨터 프로그램 | |
| Choi et al. | Secure password-based authentication method for mobile banking services | |
| KR20170114955A (ko) | 캐릭터를 이용한 그래픽 사용자 인증 및 부가서비스 제공 방법 그리고 이를 실행하는 시스템 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19738255 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 19738255 Country of ref document: EP Kind code of ref document: A1 |