[go: up one dir, main page]

WO2019210819A1 - Procédé et appareil d'authentification d'un mot de passe de type icône doté d'une marque de champ de caractère aléatoire - Google Patents

Procédé et appareil d'authentification d'un mot de passe de type icône doté d'une marque de champ de caractère aléatoire Download PDF

Info

Publication number
WO2019210819A1
WO2019210819A1 PCT/CN2019/084812 CN2019084812W WO2019210819A1 WO 2019210819 A1 WO2019210819 A1 WO 2019210819A1 CN 2019084812 W CN2019084812 W CN 2019084812W WO 2019210819 A1 WO2019210819 A1 WO 2019210819A1
Authority
WO
WIPO (PCT)
Prior art keywords
icon
mark
character segment
virtual keyboard
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2019/084812
Other languages
English (en)
Chinese (zh)
Inventor
于君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2019210819A1 publication Critical patent/WO2019210819A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Definitions

  • the present invention relates to an interaction technology between a user and a computer, and relates to a password authentication method and apparatus, and more particularly to an iconic password authentication method with a random character segment mark and a device applying the same.
  • Background technique
  • a common measure in the banking environment is to set a mask on the keyboard that blocks the finger operation.
  • the present invention mainly provides an icon-based password authentication method and apparatus with random character segment marks, which is convenient for users to memorize and has high password security.
  • a password setting step the display unit displays at least one set of icon groups including a plurality of icons;
  • each group of icon groups selecting at least one icon as a password icon
  • each password icon includes at least two icons
  • a password authentication step displaying an icon group including a password icon, and assigning and displaying different random character segment marks for each icon in each group of the icon group;
  • the method further includes:
  • the flag display implicit control unit is configured to obtain a random character segment mark of each icon, and display the random character segments of each icon in a position corresponding to each icon, each random character segment. Contains at least one character.
  • the display unit After entering the password authentication step, when the display unit is displaying the random character segment mark, if the mark display control unit is turned off, hiding the random character segment mark being displayed will be hidden, and displaying the virtual keyboard; [0021] the input character segment is from an operation event on a virtual keyboard;
  • the random character segment mark and the virtual keyboard are simultaneously displayed, and the random character segment mark overlaps and overlaps the upper layer of the virtual keyboard;
  • the input character segment is from an operation event of the user on the virtual keyboard
  • each icon is hidden when each random segment marker is being displayed.
  • the display unit displays at least one set of icon groups including a plurality of icons; in each group of icon groups, the user selects at least one icon as a password icon; each password icon At least two icons are included;
  • the data processing unit is configured to allocate each of the different random segment markers for each icon in each group of the icon group, and send the random segment flag of each icon to the display.
  • each random character segment contains at least one character
  • the display unit includes a mark display implicit control unit, and the display unit is further configured to display the icon group including the password icon, and after the mark display implicit control unit is turned on, in a position corresponding to each icon Display a random character segment of each icon;
  • the input unit is configured to enable the mark display implicit control unit, and acquire the currently received character segment of the user input, and send the input character segment to the data processing unit;
  • the data processing unit is further configured to compare each input character segment received successively with a random character segment mark of each password icon successively displayed by the display unit, and determine and finally prompt the current password authentication according to the comparison result. Whether it passed;
  • the display unit further includes a virtual keyboard
  • the input unit is further configured to close the mark display implicit control unit, and the display unit hides that the random character segment mark is being displayed, and displays the virtual keyboard;
  • the input character segment is from an operation event of the user on the virtual keyboard
  • the display unit automatically hides the virtual keyboard and redisplays the icon.
  • the display unit further includes a virtual keyboard
  • the display unit is configured to simultaneously display the random character segment mark and the virtual keyboard, and the random character segment mark overlaps and overlays the upper layer of the virtual keyboard;
  • the display unit automatically hides the random character segment mark
  • the input character segment is from an operation event of the user on the virtual keyboard
  • the display unit automatically hides the virtual keyboard and redisplays the icon.
  • the display unit is a touch display screen
  • the user operates the virtual keyboard by a touch action to obtain an input character segment.
  • the random character segment mark is displayed only when the mark display implicit control unit is turned on.
  • the unit displays, therefore, when the user performs password authentication, the user can first find the password icon set by the user, and then call the hidden control unit to call up the random character segment mark, which shortens the display time of the random character segment mark. Reduces the risk that the voyeur will happen to observe the location of the password icon.
  • FIG. 1 is a view showing a display state of a first group of icon groups displayed on the touch screen of Embodiment 1;
  • FIG. 2 is a display state diagram of the touch screen displaying a random character segment mark after pressing the mark display hidden control button of Embodiment 1;
  • FIG. 3 is a display state diagram when the touch screen displays a virtual numeric keypad after releasing the mark display hidden control button in Embodiment 1;
  • Embodiment 4 is a display state diagram of the second group of icon groups displayed on the touch screen after the three virtual numeric keypads are triggered in Embodiment 1;
  • Embodiment 5 is a display state diagram of the random character segment mark displayed on the touch screen after the mark display implicit control button is pressed again in Embodiment 1;
  • FIG. 6 is a display state diagram when the touch screen displays a virtual numeric keypad after releasing the mark display hidden control button in Embodiment 1;
  • Embodiment 7 is a display state diagram of the third group of icon groups displayed on the touch screen after the third virtual number keyboard is triggered again in Embodiment 1;
  • FIG. 8 is a display state diagram of the random character segment mark displayed on the touch screen after the third time the mark display hidden control button is pressed in the first embodiment
  • FIG. 9 is a display state diagram of the virtual numeric keypad when the touch screen is displayed after the marker display hidden control button is released again in Embodiment 1;
  • FIG. 10 is a view showing a display state of a first group of icon groups displayed on the touch screen of Embodiment 2; [0061] FIG.
  • FIG. 11 is a display state diagram when a random character segment mark and a virtual numeric keypad are displayed after the entire touch display screen of the second trigger mark display control unit of Embodiment 2 is displayed;
  • FIG. 12 is a display state diagram of the virtual numeric keypad displayed by the touch screen twice triggered by the second embodiment.
  • FIG. 13 is a display state diagram of the second group of icon groups displayed on the touch screen after the third trigger virtual number keyboard of Embodiment 2; [0064] FIG.
  • FIG. 14 is a display state diagram when a random character segment mark and a virtual numeric keypad are displayed after the second trigger of the second touch triggering control unit of Embodiment 2 is used as the mark display control unit;
  • FIG. 15 is a view showing a display state when the virtual numeric keypad displayed on the touch screen is triggered again by the second embodiment
  • FIG. 16 is a display state diagram of the third group of icon groups displayed on the touch screen after the virtual numeric keypad is triggered twice again in Embodiment 2;
  • FIG. 17 is a display state diagram when the third trigger of the second embodiment is used as the touch display screen of the mark display control unit, and the random character segment mark and the virtual numeric keypad are displayed;
  • 18 is a view showing a display state when the virtual numeric keypad displayed by the touch screen of the second embodiment is re-triggered;
  • FIG. 19 is a schematic diagram showing the appearance of a display screen and a physical keyboard of Embodiment 3;
  • the term “icon” as used in the present application may be static or dynamic characters, numbers, symbols, icons, signs, graphics, tiles, or a combination thereof, or may be included in dynamic or static pictures, pictures. A plurality of local regions in the absence of exact boundaries and shapes but with exact approximate positional features.
  • the term “icon group” as used in the present application refers to a plurality of icon sets that are distributed in an ordered or unordered manner and displayed at the same time, or may include a plurality of virtual regions that serve as icons. Static or dynamic picture; This picture can even be a blank picture in which each virtual area acting as an icon has a fixed specific position.
  • the virtual area in an icon group can display the same picture, or display different pictures, or display a blank picture, as long as the position of each virtual area serving as an icon is fixed, when the icon is a virtual area, In fact, the location information is used to distinguish different icons.
  • the term “input” as used in the present application may be input through a physical keyboard or a virtual keyboard, or may be a pen, a finger click on a touch screen, a stroke drawing or a gesture drawing input, or may be input through a voice. It can also be the movement and positioning input of the observation focus of the human eye on the screen detected by the photoelectric recognition and sensing device.
  • character as used in the present application may be a letter, a number, a symbol typed on a physical keyboard, a virtual keyboard, a sliding track input by a pen or a finger on a touch screen, or a voice input through a voice input.
  • the letters, numbers, and symbols corresponding to the notes may also be letters, numbers, and symbols corresponding to and triggered by the human eye's observation focus on the screen input by the photoelectric recognition and sensing device.
  • character segment includes at least one character. Of course, in order to increase the difficulty of voyeuristic recording, it is preferable to use multiple characters. The more characters a character segment contains, the higher the security level of the password, but the amount of calculation of the system will also increase. In practice, you should select the number of characters contained in the character segment as needed.
  • random character segment refers to a character segment randomly generated by a data processing unit and having a corresponding relationship with a specific icon in only one display; when the specific icon is displayed again, it will be The data processing unit randomly generates another random character segment that is still only once associated with it.
  • random character segment mark refers to a random character segment that follows the area where the "icon" is located.
  • display unit includes an electronic display screen, or a combination of electronic display screens, or a combination of an electronic display screen and a static graphic board.
  • marking explicit control unit refers to a process control event in which a screen display and a non-display state of a random character segment mark are operated by a user's operation action, for example, may be a virtual or physical button, Any set area of the screen can be physically triggered or triggered by the mouse cursor.
  • the opening and closing of the "marked display control unit" referred to in the present application may be used as a mark display control list.
  • the same button of ⁇ is completed by two pressing actions, or the same button is pressed and released to complete.
  • the present application provides an iconic password authentication apparatus with a random character segment mark, including a display unit, a data processing unit, and an input unit.
  • the display unit displays at least one set of icon groups including a plurality of icons; in each group of icon groups, the user selects at least one icon as a password icon; each password icon At least two icons are included;
  • the data processing unit is configured to allocate each of the different random segment markers for each icon in each group of the icon group, and send the random segment flag of each icon to the display.
  • each random character segment contains at least one character
  • the display unit includes a mark display implicit control unit, and the display unit is further configured to display the icon group including the password icon, and after the mark display implicit control unit is turned on, in a position corresponding to each icon Display a random character segment of each icon;
  • the input unit is configured to enable the mark display implicit control unit, and acquire the currently received character segment of the user input, and send the input character segment to the data processing unit;
  • the data processing unit is further configured to compare each input character segment received successively with a random character segment mark of each password icon successively displayed by the display unit, and determine and finally prompt the current password authentication according to the comparison result. Whether it passed;
  • the display unit further includes a virtual keyboard
  • the input unit is further configured to close the mark display implicit control unit, and the display unit hides that the random character segment mark is being displayed, and displays the virtual keyboard;
  • the input character segment is from an operation event of the user on the virtual keyboard
  • the display unit automatically hides the virtual keyboard and redisplays the icon.
  • the display unit further includes a virtual keyboard
  • the display unit is configured to simultaneously display the random character segment mark and the virtual keyboard. , and the random segment mark overlaps over the upper layer of the virtual keyboard;
  • the display unit automatically hides the random character segment mark
  • the input character segment is from an operation event of the user on the virtual keyboard
  • the display unit automatically hides the virtual keyboard and redisplays the icon.
  • the display unit is a touch display screen
  • the user operates the virtual keyboard by a touch action to obtain an input character segment.
  • the input character segment information may be a virtual keyboard from which the user operates by a touch action.
  • each icon may be hidden, so that the random character segment mark and the icon are alternately displayed.
  • the icon, the random character segment mark, and the virtual keyboard can be alternately displayed in the same display area of the touch screen, the maximum The limit compresses the area required for the password authentication interface.
  • the mark display implicit control unit since the random character segment mark is displayed by the display unit only after the mark display implicit control unit is turned on, when the user performs password authentication, the user may first find it. The set password icon, and then manipulate the mark display control unit to call out the random character segment mark, shortening the display time of the random character segment mark, and reducing the risk that the voyeur happens to observe the position of the password icon.
  • the user can autonomously control the display and hiding time of the random character segment mark by the manipulation action of the mark display implicit control unit. That is to say, when the user finds a password icon set by himself, first displays the random character segment mark by the manipulation action of the mark display implicit control unit, and then quickly remembers the random character segment of the key password icon. Immediately after the mark, the mark is hidden again. The meta-manipulation action hides the random segment markers. While the random segment marker is hidden, the virtual keyboard is also immediately displayed on the screen, simplifying the manipulation steps.
  • the random character segment mark and the virtual keyboard can be arranged alternately in the same display area, which provides conditions for compressing the physical area of the password authentication interface.
  • the random character segment mark and the virtual keyboard are simultaneously displayed, and the random character segment mark overlaps the upper layer of the virtual keyboard; when the virtual keyboard is triggered, the random character segment mark is automatically hidden; After the last input segment is completely input, the virtual keyboard is automatically hidden, and the display unit redisplays the icon.
  • Such a purpose is to make the virtual keyboard overlapped in the background of the random character segment mark, and when any button of the virtual keyboard is triggered, the random segment mark is immediately hidden, and only the virtual keyboard is separately displayed, thereby omitting The operation of the virtual keyboard is called up.
  • the display unit redisplays the icon, the operation of alternately displaying the virtual keyboard and the icon group is further omitted, and the user is reduced again. Steps.
  • each icon is hidden when each random segment mark is being displayed.
  • the advantages displayed when the random segment mark is different from the icon are:
  • the alternately displayed icon and the virtual keyboard are in the same display area, so that the icon and the keyboard button can be maximized without mutual interference.
  • the size display can further increase the difficulty of the observer to observe and record the content of the icon corresponding to the random segment mark, thereby improving the anti-spy performance.
  • Embodiment 1 is an iconic password authentication device with a random character segment mark, including a touch display screen as a display unit and a button as a mark display control unit 3.
  • the touch display first displays the first group of icons including 16 icons 1. The user then performs the following series of finger actions:
  • the first and second operations, the sixth and seventh operations, and the eleventh and twelfth operations belong to the same button pressing and releasing operation, and can be regarded as one motion. Therefore, the entire password authentication process actually requires 12 finger actions.
  • the length of the interval between button press and release is the random segment marker formed by the user according to whether it has been clearly seen and temporarily remembered the three digits corresponding to the password icon, and is controlled by itself.
  • the mark display control button 3 by controlling the mark display control button 3, the icon 1, the random character segment mark 2, and the virtual keyboard 4 can be alternately displayed in the same display area on a touch display screen. Therefore, when applied to smart password door locks, handheld POS machines, and smart phones, a relatively compact product configuration can be obtained, and the password authentication interface requires a minimum of construction area.
  • Embodiment 2 of the present invention is shown in FIGS. 10 to 18.
  • the icon-type password authentication apparatus with random character segment marks in the second embodiment also uses the touch display screen itself as a mark display implicit control unit.
  • the touch display screen first displays a first group of icon groups including 16 icons 1. The user then performs the following series of finger actions:
  • the user touches any part of the touch display screen with the function of marking the hidden control unit with the finger, so that 16 maps are displayed.
  • the character is hidden, replaced by a set of 6 random character segment markers 2 (see Figure 11) and a virtual keyboard 4 with a blurred background image state superimposed with the random segment segment markers.
  • the system determines whether the current round of password authentication is passed according to whether the three sets of random character segments typed by the user match the three password icons preset in advance, and finally displays the password on the screen. Feedback "correct” or "wrong password”.
  • Embodiment 2 further simplifies the operation steps of the user by superimposing the manner of displaying the random character segment mark and the virtual keyboard, and is superimposed and displayed in the background image of the random character segment mark.
  • the virtual keyboard also acts as a technical effect that interferes with the voyeurism of others.
  • Embodiment 3 of the present invention is shown in FIGS. 19 to 22.
  • this is a password authentication device with a display screen and a physical keyboard 5.
  • the display screen After entering the password authentication program, the display screen first displays 16 icons 1. After the user presses the Ctrl key in the physical keyboard 5 as the mark display control unit, the icon 1 on the display screen is replaced by the random character segment mark 2 (see Figure 20).
  • the interval between when the Ctrl button is pressed and when the first numeric button is pressed is followed, and the user is based on whether or not the random character segment mark of the specific position is viewed and recorded. , control by yourself. Obviously, the shorter this interval, the more difficult it is for the onlookers to peek at the password information.
  • the random character segment mark 2 list style shown in FIG. 20 may be changed to the style of the upper and lower two random character segment marks 2 in each cell shown in FIG. 21, or
  • Each of the cells shown in Fig. 22 has a pattern of upper, middle, and lower random character segment marks 2.
  • the password is set.
  • the icon it is necessary to specifically determine whether it is the upper part or the lower part of the icon, or the upper part, the middle part or the lower part.
  • the up and down position or the upper, middle, and lower positions of the random segment mark in the same cell must also match the up and down position or the upper, middle, and lower positions of the preset password icon.
  • multiple random segment markers in each cell not only increase the peek of the bystander, but also greatly increase the password encryption level.
  • the device itself includes a user initial authentication program of the fingerprint scanning mode, or includes a user name input process
  • the above-mentioned settings selected by the specific user will enter the password authentication step.
  • the system is first subjected to the subsequent authentication process according to the pre-set authentication method according to the specific identity initially confirmed. In other words, different users can choose different authentication level and anti-peep difficulty.
  • the principles herein may be embodied in a computer program product embodied in a computer readable storage medium preloaded with computer readable program code.
  • Any tangible, non-transitory computer readable storage medium may be utilized, including magnetic storage devices (hard disks, floppy disks, etc.), optical storage devices (CD-ROM, DVD, Blu Ray disks, etc.), flash memory, and/or the like.
  • These computer program instructions can be loaded onto a general purpose computer, special purpose computer or other programmable data processing device to form a machine such that the instructions executed on the computer or other programmable data processing device can generate means for performing the specified function.
  • the computer program instructions can also be stored in a computer readable memory, which can instruct a computer or other programmable data processing device to operate in a particular manner, such that instructions stored in the computer readable memory can form a single piece Manufacturing, including implementations that implement specified functions.
  • Computer program instructions can also be loaded onto a computer or other programmable data processing device to perform a series of operational steps on a computer or other programmable device to produce a computer-implemented process for execution on a computer or other programmable device. Instructions can provide steps for implementing a given function.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

Procédé et appareil d'authentification d'un mot de passe de type icône doté d'une marque de champ de caractère aléatoire. L'invention traite le problème du faible taux d'utilisation d'une aire d'écran d'affichage résultant de l'affichage d'un clavier virtuel (4), d'une icône (1) et d'une marque (2) de champ de caractère aléatoire d'un appareil existant d'authentification de mot de passe graphique, dans un même écran en même temps, et concerne un procédé et un appareil destinés à afficher de manière alternée le clavier virtuel (4), l'icône (1) et la marque (2) de champ de caractère aléatoire dans un même écran au moyen d'une touche de commande d'affichage/de masquage de marque. L'aire nécessaire à une interface d'authentification de mot de passe est significativement compressée sans réduire la taille de chaque unité, et un utilisateur peut commander librement la durée d'affichage d'une marque de champ de caractère aléatoire pour améliorer la capacité anti-indiscrétion.
PCT/CN2019/084812 2018-05-01 2019-04-28 Procédé et appareil d'authentification d'un mot de passe de type icône doté d'une marque de champ de caractère aléatoire Ceased WO2019210819A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810407068.XA CN108388789A (zh) 2018-05-01 2018-05-01 带随机字符段标记的图符式密码认证方法和装置
CN201810407068.X 2018-05-01

Publications (1)

Publication Number Publication Date
WO2019210819A1 true WO2019210819A1 (fr) 2019-11-07

Family

ID=63066409

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/084812 Ceased WO2019210819A1 (fr) 2018-05-01 2019-04-28 Procédé et appareil d'authentification d'un mot de passe de type icône doté d'une marque de champ de caractère aléatoire

Country Status (2)

Country Link
CN (1) CN108388789A (fr)
WO (1) WO2019210819A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388789A (zh) * 2018-05-01 2018-08-10 于君 带随机字符段标记的图符式密码认证方法和装置
CN111460536B (zh) * 2020-03-30 2023-11-17 李雨柔 一种密码校验方法、装置、存储介质和电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079697A (zh) * 2006-10-08 2007-11-28 腾讯科技(深圳)有限公司 一种提高网络帐号安全性的方法及系统
CN102413100A (zh) * 2010-09-25 2012-04-11 盛乐信息技术(上海)有限公司 声纹密码图片提示的声纹认证系统及其实现方法
CN103077342A (zh) * 2011-10-25 2013-05-01 成都谛听科技有限公司 图形化随机密码输入方法
CN104428784A (zh) * 2012-04-25 2015-03-18 罗文有限公司 密码操作系统、密码装置以及超级密码生成方法
CN108388789A (zh) * 2018-05-01 2018-08-10 于君 带随机字符段标记的图符式密码认证方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079697A (zh) * 2006-10-08 2007-11-28 腾讯科技(深圳)有限公司 一种提高网络帐号安全性的方法及系统
CN102413100A (zh) * 2010-09-25 2012-04-11 盛乐信息技术(上海)有限公司 声纹密码图片提示的声纹认证系统及其实现方法
CN103077342A (zh) * 2011-10-25 2013-05-01 成都谛听科技有限公司 图形化随机密码输入方法
CN104428784A (zh) * 2012-04-25 2015-03-18 罗文有限公司 密码操作系统、密码装置以及超级密码生成方法
CN108388789A (zh) * 2018-05-01 2018-08-10 于君 带随机字符段标记的图符式密码认证方法和装置

Also Published As

Publication number Publication date
CN108388789A (zh) 2018-08-10

Similar Documents

Publication Publication Date Title
US9064104B2 (en) Graphical authentication
TWI677801B (zh) 一種基於指紋識別開啟應用的方法和裝置
KR102774141B1 (ko) 사용자 단말 장치, 전자 장치, 시스템 및 그 제어 방법
CN101587398A (zh) 密码保护方法
US10621410B2 (en) Method and system for operating a keyboard with multi functional keys, using fingerprints recognition
JP2013238935A (ja) 入力装置、入力装置の制御方法、制御プログラム、および記録媒体
JP3858091B2 (ja) パスワード認証装置およびパスワード認証方法
JP2008165741A (ja) 認証装置、認証方法、認証プログラム及びこれを記録したコンピュータ読み取り可能な記録媒体
WO2019165976A1 (fr) Procédé et appareil d'entrée de mot de passe
WO2019210819A1 (fr) Procédé et appareil d'authentification d'un mot de passe de type icône doté d'une marque de champ de caractère aléatoire
JP2013168001A (ja) 入力装置、入力装置の制御方法、情報処理装置、および、プログラム
KR102014408B1 (ko) 이미지 터치 패스워드를 이용한 사용자 인증 방법 및 이를 위한 컴퓨터 프로그램
WO2019137489A1 (fr) Dispositif et procédé de saisie de mot de passe, et support d'informations lisible par ordinateur
JP2009211533A (ja) アクセス認証システム
CN104714739B (zh) 信息处理方法及电子设备
KR20190017315A (ko) 이미지 터치 사용자 인증 방법 및 이를 실행하는 시스템
WO2019165978A1 (fr) Procédé et dispositif d'entrée de mot de passe utilisant une entrée indirecte d'une marque de champ de caractère aléatoire
US8522340B2 (en) Device and method for authorization management
WO2019165979A1 (fr) Procédé et équipement pour entrer un mot de passe ayant un symbole et une étiquette de segment de caractère aléatoire
JP6755125B2 (ja) 情報処理装置及びプログラム
KR20200000776A (ko) 터치 및 슬라이딩을 이용한 제스처 사용자 인증 방법 및 컴퓨터 프로그램
JP2016164726A (ja) 電子機器
JP5618437B1 (ja) 個人認証方法
CN103559432A (zh) 一种基于自定义标识符的解锁方法
US20240126380A1 (en) Display device, display method, and program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19796719

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19796719

Country of ref document: EP

Kind code of ref document: A1