CN103376911A - Method for arbitrarily inputting passwords by keys - Google Patents

Method for arbitrarily inputting passwords by keys Download PDF

Info

Publication number
CN103376911A
CN103376911A CN2012101442429A CN201210144242A CN103376911A CN 103376911 A CN103376911 A CN 103376911A CN 2012101442429 A CN2012101442429 A CN 2012101442429A CN 201210144242 A CN201210144242 A CN 201210144242A CN 103376911 A CN103376911 A CN 103376911A
Authority
CN
China
Prior art keywords
password
button
key
press
passwords
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101442429A
Other languages
Chinese (zh)
Other versions
CN103376911B (en
Inventor
蒋明刚
郑鉴忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201210144242.9A priority Critical patent/CN103376911B/en
Publication of CN103376911A publication Critical patent/CN103376911A/en
Application granted granted Critical
Publication of CN103376911B publication Critical patent/CN103376911B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method for arbitrarily inputting passwords by keys is characterized in that music scores, lyrics, poems, story lines and terms respectively familiar to or self-compiled by people are used as password carriers, boring passwords are replaced by well-known songs or reads which can be blurted out by people, and password numbers are replaced by silent singing or silent reading when in use. The passwords are inputted by the aid of optional keys on a keyboard or mouse and keys or buttons on a wall, a door, a lock and a key, and software and a chip is used for control. When inputting the passwords, only a user knows how to press the keys and can shield the keys to blindly input the passwords, so that others cannot steal the passwords by peeping and audio and video recordings, and the passwords cannot be cracked. By the method, the passwords are simply and conveniently remembered and simply and safely inputted, so that people no longer worry about the passwords. The method is used for inputting the passwords of online accounts, bank accounts, ATMs (automatic teller machines), mobile phone credit cards, and password locks, remote control locks and the like of enterprises, institutions, households, offices, office desks, safe cases, vehicles and the like.

Description

The follow one's bent method of key-press input password
Affiliated technical field
The follow one's bent method of key-press input password belongs to the cipher application field.
Background technology
People's work and life all will access to your password.Investigation shows that in order to remember password, 1/3rd people writes down to " password prompt "; The elderly more than 70 years old surpasses and 75% directly to write password, carry, standby oneself the possible period of want or need; A lot of people admit that they use " same password ", guarantee " perfectly safe " in life.The safety that so do not access to your password not can not say, reason everybody understand, who has no way out.
The people worried for password is not minority.Heavy long password, uninteresting numeral causes that password is forgotten, password is obscured, and brings a lot of troubles to live and work.Some disabled persons and the elderly will remember and use these passwords, have been heavy burdens.The elderly goes to bank not remember that password do not get money, and the situation of the cipher door lock of going home not open often occurs.The disabled person who has can not sign, can not input password, not handle business to bank, and this is nothing to be surprised at also.Moreover, present bank counter, ATM, cipher door lock, safety cabinet etc. are located the Password Input decryption of all may being spied on or record a video, and cryptosecurity hidden danger is seen everywhere.
The follow one's bent method of key-press input password, be with people be familiar with separately or self-editing music score, the lyrics, poem, plot, word as crypto carrier, uninteresting password figure replacement is become own what's frequently heard can be repeated in detail singing or reading aloud, can escape one's lips, write from memory during use and sing or read silently the replacement password figure.Utilize any key on mouse or the keyboard, wall, door, lockset, button on the key or button input password, software or chip controls.Only have oneself to know how to press button during the input password, others spies on, records a video and can't steal, can not decryption.The method of key-press input password of following one's bent realizes that memory cipher is simple and convenient, the simple and direct safety of input password, the Password Input that is used for online account, bank account, ATM, mobile phone card-brushing, the Password Input of the cipher door locks such as enterprise, office, family, office, desk, safety cabinet, car, remote-controlled lock.
Summary of the invention
The follow one's bent method of key-press input password is utilized any key on keyboard or the mouse, wall, door, lockset, button on the key or button input password, software or chip controls.The numerical value that presses button or button number of times replaces the numeral of input password, button soft handover or direct-cut operation to realize the password transposition.Memory cipher be familiar with everyone oneself or self-editing music score, the lyrics, poem, plot, word as the carrier of password, the numerical value of the number of times of sounding replaces password figure.
1. key-press input cipher control: a. button is any key on mouse or the keyboard, is arranged on wall, door, lockset, button on the key or button; B. input password by software or chip controls: keyboard, mouse or the control of button mounting software of operating system are arranged; There are not keyboard, button or the button of operating system that chip controls is installed; C. the password of input presses for the last time behind the button and automatically confirms, to press simultaneously any two keys are cancellations or reset; Dead or the removing of number of times automatic alarm, Locked Password of the continuous mistake of Password Input or cancellation is set voluntarily.
2 to press button or button input password be to begin with any key, the exchange button is realized the direct-cut operation of password transposition, same key rhythm is arranged or press continuously outside the button once press button more than three seconds or once the instantaneous button that presses be exactly password transposition soft handover; The number of times that presses button greater than 9 automatic carries, press 10 expressions 10 of button first, all the other press 10 numbers of button and represent 0; Input only has oneself to know how to press button, blocked blind defeatedly that others can't steal in the recording of spying on, record a video, can not decryption during password.
The carrier of 3 memory ciphers is that everyone is familiar with or self-editing music score, the lyrics, poem, plot, word oneself; The number of times of pronunciation is the number of times of sounding when singing or reading aloud these music score, the lyrics, poem, plot, word according to everyone mode, and the silent numerical value of singing or read silently out these number of times of sounding replaces the input of password figure.
Embodiment
The follow one's bent method of key-press input password of each member of exemplifying embodiment family
Zhang Rending, children of primary school grade one, family have father (Mr. Zhang), mother's (appointing teacher), grandmother (grandmother Li).Family security door lock cipher 6078.The kinsfolk reaches the keyboard of money bank counter or ATM by the software control of the key-press input password of following one's bent.
1. chapter is appointed the follow one's bent method of key-press input password of fourth.
The key of Zhang Rending has been installed the common chip of the key-press input password of following one's bent.Zhang Rending likes cartoon, misses potter the white Longma in the cartoon Journey to the West, changes a little as carrier take one section lyrics of the white Longma of nursery rhymes: white Longma hoof be exposed to the west carrying on the back Tang Sanzang and then three apprentice's learn experience in western paradise walk on the road one to walk be exactly those several ten thousand li.Button operation (silent sing a word by once, key is changed in the space): first key press 6 times, change key press 10 times, again change key press 7 times, change key at last and press 8 times and automatically confirm.
2. Mr.'s Zhang method of key-press input password of following one's bent.
Mr. Zhang, the easy Corporate Finance deputy director in Beijing, like singing, often use eight passwords, comprise bank card, wage card, credit card password, desk, safety cabinet password, private residence antitheft door, private car remote control cipher etc.Mr. Zhang cipher key installed follow one's bent the input password high end chip.This key can be opened the coded locks such as desk, safety cabinet, private residence antitheft door, private remote-control car, and the password of lock is different everywhere.Safety cabinet is double code (key cipher and safety cabinet password).Take one section song of " day road ", the modifications lyrics as carrier: to be magical day road deliver to no longer high road, mountain, borderland to the human world warm does not grow each sons and daughters of family and gather happily together for that.Silent sing or read silently that a word is pressed once (lyrics are silent to be sung, other read silently), key is changed in the space.
1). bank card bank of deposit is that Chun Lu subbranch is known in China Citic Bank Beijing, password 106078, reads silently and writes from memory and sing carrier: know China Citic Bank of Chun Lu subbranch to block that be magical day road that the human world warm delivered to long each sons and daughters of family in no longer high road, mountain, borderland gathers happily together).Button operation: first key press 10 times, change key press 6 times, again change key press 10 times, again change key press 7 times, change key at last and press 8 times and automatically confirm.
2). wage card bank of deposit is industrial and commercial bank Beijing Bei Taipingzhuang subbranch, password 116078 (carrier: Bei Taipingzhuang industrial and commercial bank wage card to be magical day road deliver to long each sons and daughters of family in no longer high road, mountain, borderland to the human world warm gather happily together).Button operation: first key press 11 times, change key press 6 times, again change key press 10 times, again change key press 7 times, change key at last and press 8 times and automatically confirm.
3). credit card bank of deposit is National Industrial and Commercial Bank of China Beijing Bei Taipingzhuang subbranch, password 136078 (carrier: Bei Taipingzhuang industrial and commercial bank of subbranch credit card to be magical day road deliver to long each sons and daughters of family in no longer high road, mountain, borderland to the human world warm gather happily together).Button operation: first key press 13 times, change key press 6 times, again change key press 10 times, again change key press 7 times, change key at last and press 8 times and automatically confirm.
4). desk password 60578 (carrier: that to be magical day road deliver to long each sons and daughters of family in no longer high road, borderland company desk mountain to the human world warm gather happily together).Button operation: first key press 6 times, change key press 10 times, again change key press 5 times, again change key press 7 times, change key at last and press 8 times and automatically confirm.
5). the safety cabinet password.A. key cipher 60783 (carrier: that be magical day road the human world warm delivered to long each sons and daughters of family in no longer high road, mountain, borderland safety cabinet of gathering happily together).Button operation: first key press 6 times, change key press 10 times, again change key press 7 times, again change key press 8 times, change key at last and press 3 times and automatically confirm.B. safety cabinet password 607,836,078 twice key cipher (carrier: that be magical day road the human world warm deliver to long each sons and daughters of family in no longer high road, mountain, borderland gather happily together safety cabinet to be magical day road deliver to long each sons and daughters of family in no longer high road, mountain, borderland to the human world warm gather happily together).Button operation: first key press 6 times, change key press 10 times, again change key press 7 times, not only change key press 8 times but also change key press 3 times, change key press 6 times, change key press 10 times, again change key press 7 times, change key at last and press 8 times and automatically confirm.
6). private car remote control gate lock password 60278 (carrier: that to be magical day road deliver to long each sons and daughters of family in no longer high road, my car mountain, borderland to the human world warm gather happily together).Button operation: first key press 6 times, change key press 10 times, again change key press 2 times (my car pronunciation twice) change again key press 7 times, change key at last and press 8 times and automatically confirm.
7). family security door password 6078 carriers: to be magical day road deliver to long each sons and daughters of family in no longer high road, mountain, borderland to the human world warm gathers happily together for that.Button operation: be about to the road on family doorway, hand takes key to be placed in the pocket, finger is pressed continuous 6 times an of key of key, slightly stop, continue to press this key above finger of decontroling in three seconds, press continuously again this key 10 times, slightly stop, moment presses this key and decontrols, presses continuously this key 7 times again, slightly stops, moment presses this key and decontrol, press continuously this key 8 times at last again, password 6078 is confirmed automatically.Only finished the key-press input password of following one's bent with a key.
3. appoint the follow one's bent method of key-press input password of teacher.
Appoint teacher, certain mathematics senior teacher of experimental middle school.Often use four passwords, comprise wage card, credit card password, desk, private residence antitheft door password etc.Appoint teacher's cipher key that the reinforcement chip of the input password of following one's bent has been installed.This key can be opened desk and private residence anti-theft door cipher lock, and password is different." master of teacher Beijing Normal University of experimental middle school graduate evaluate and appointed to a positio be engaged in mathematical education for the senior teacher " is carrier always from fabricating stories.Read silently that a word is pressed once, key is changed in the space.
1). family security door password 6078 carriers: the master of teacher Beijing Normal University of the experimental middle school evaluate and appointed to a positio of graduating is engaged in mathematical education for the senior teacher always.Button operation: first key press 6 times, change key press 10 times, again change key press 7 times, change key at last and press 8 times, password 6078 is confirmed automatically.
2). wage card bank of deposit is that Chun Lu subbranch is known in China Citic Bank Beijing, password 607811 carriers: the master of teacher Beijing Normal University of the experimental middle school evaluate and appointed to a positio of graduating is engaged in mathematical education China Citic Bank Beijing always and is known Chun Lu subbranch for the senior teacher.Button operation: first key press 6 times, change key press 10 times, again change key press 7 times, again change key press 8 times, change key at last and press 11 times and automatically confirm.
3). credit card bank of deposit is National Industrial and Commercial Bank of China Beijing Bei Taipingzhuang subbranch, password 607810 carriers: the master of teacher Beijing Normal University of the experimental middle school evaluate and appointed to a positio of graduating is engaged in Bei Taipingzhuang subbranch of mathematical education industrial and commercial bank for the senior teacher always.Button operation: first key press 6 times, change key press 10 times, again change key press 7 times, again change key press 8 times, change key at last and press 10 times and automatically confirm.
4. grandmother's Li method of key-press input password of following one's bent.
Grandmother Li, retired employees will use retired gold card and anti-theft door for residence password." it is that the student daughter-in-law of so-and-so primary school is that the secondary school teachers son is the deputy director of company that there is four-hole people grandson in my family " is carrier from fabricating stories.Read silently that a word is pressed once, key is changed in the space.
1). family security door password 6078 carriers: it is that the student daughter-in-law of so-and-so primary school is that the secondary school teachers son is the deputy director of company that there is four-hole people grandson in my family.Button operation: hold key or hand and be placed on and hold key in the pocket, first key press 6 times, change key press 10 times, again change key press 7 times, change key at last and press 8 times, password 6078 is automatically confirmed, can be opened the door to the entrance.
2). retired gold card bank of deposit is Construction Bank Beijing Bei Taipingzhuang subbranch, password 607838 carriers: it is that the student daughter-in-law of so-and-so primary school is that the secondary school teachers son is deputy director's retired pay Bei Taipingzhuang Construction Bank of company that there is four-hole people grandson in my family.Button operation: first key press 6 times, change key press 10 times, again change key press 7 times, again change key press 8 times, again change key press 3 times, change key at last and press 8 times and automatically confirm.
The follow one's bent method of key-press input password, uninteresting Coden replacement is become own what's frequently heard can be repeated in detail singing or reading aloud, make people no longer worried for password, the Password Input that is widely used in online account, bank account, ATM, mobile phone card-brushing, the Password Input of the cipher door locks such as enterprise, office, family, office, desk, safety cabinet, car, remote-controlled lock.

Claims (4)

1. the follow one's bent method of key-press input password is utilized any key on keyboard or the mouse, wall, door, lockset, button on the key or button input password, software or chip controls; The numerical value that presses button or button number of times replaces the numeral of input password, button soft handover or direct-cut operation to realize the password transposition; Memory cipher be familiar with everyone oneself or self-editing music score, the lyrics, poem, plot, word as the carrier of password, the numerical value of the number of times of sounding replaces password figure.
2. the method for the key-press input password of following one's bent according to claim 1, it is characterized in that: the key-press input cipher control: a. button is any key on mouse or the keyboard, is arranged on wall, door, lockset, button on the key or button; B. input password by software or chip controls: keyboard, mouse or the control of button mounting software of operating system are arranged; There are not keyboard, button or the button of operating system that chip controls is installed; C. the password of input presses for the last time behind the button and automatically confirms, to press simultaneously any two keys are cancellations or reset; Dead or the removing of number of times automatic alarm, Locked Password of the continuous mistake of Password Input or cancellation is set voluntarily.
3. the method for the key-press input password of following one's bent according to claim 1, it is characterized in that: pressing button or button input password is to begin with any key, the exchange button is realized the direct-cut operation of password transposition, same key rhythm is arranged or press continuously outside the button once press button more than three seconds or once the instantaneous button that presses be exactly password transposition soft handover; The number of times that presses button greater than 9 automatic carries, press 10 expressions 10 of button first, all the other press 10 numbers of button and represent 0; Input only has oneself to know how to press button, blocked blind defeatedly that others can't steal in the recording of spying on, record a video, can not decryption during password.
4. the method for the key-press input password of following one's bent according to claim 1 is characterized in that: the carrier of memory cipher is that everyone is familiar with or self-editing music score, the lyrics, poem, plot, word oneself; The number of times of pronunciation is the number of times of sounding when singing or reading aloud these music score, the lyrics, poem, plot, word according to everyone mode, and the silent numerical value of singing or read silently out these number of times of sounding replaces the input of password figure.
CN201210144242.9A 2012-04-29 2012-04-29 Follow one's bent the method for key-press input password Expired - Fee Related CN103376911B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210144242.9A CN103376911B (en) 2012-04-29 2012-04-29 Follow one's bent the method for key-press input password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210144242.9A CN103376911B (en) 2012-04-29 2012-04-29 Follow one's bent the method for key-press input password

Publications (2)

Publication Number Publication Date
CN103376911A true CN103376911A (en) 2013-10-30
CN103376911B CN103376911B (en) 2016-09-07

Family

ID=49462127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210144242.9A Expired - Fee Related CN103376911B (en) 2012-04-29 2012-04-29 Follow one's bent the method for key-press input password

Country Status (1)

Country Link
CN (1) CN103376911B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063925A (en) * 2014-03-13 2014-09-24 苏州天鸣信息科技有限公司 Electronic password lock based on touchscreen for inputting text

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2256022Y (en) * 1995-01-23 1997-06-11 诸克亮 Intellectual alarming safeguard lock
JP2002099377A (en) * 2000-09-22 2002-04-05 Nariyuki Irie Input terminal equipment
CN201069559Y (en) * 2007-07-27 2008-06-04 肖启冉 Peek prevention touch password input keyboard
CN101315583A (en) * 2008-07-11 2008-12-03 张世渡 Cipher input method and cipher key input device
CN101539807A (en) * 2009-04-15 2009-09-23 东南大学 Visually impaired people oriented safety password input interface and operation method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2256022Y (en) * 1995-01-23 1997-06-11 诸克亮 Intellectual alarming safeguard lock
JP2002099377A (en) * 2000-09-22 2002-04-05 Nariyuki Irie Input terminal equipment
CN201069559Y (en) * 2007-07-27 2008-06-04 肖启冉 Peek prevention touch password input keyboard
CN101315583A (en) * 2008-07-11 2008-12-03 张世渡 Cipher input method and cipher key input device
CN101539807A (en) * 2009-04-15 2009-09-23 东南大学 Visually impaired people oriented safety password input interface and operation method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063925A (en) * 2014-03-13 2014-09-24 苏州天鸣信息科技有限公司 Electronic password lock based on touchscreen for inputting text
CN104063925B (en) * 2014-03-13 2017-01-18 山东交通学院 Electronic password lock based on touchscreen for inputting text

Also Published As

Publication number Publication date
CN103376911B (en) 2016-09-07

Similar Documents

Publication Publication Date Title
Rummery Disability, Citizenship and Community Care: A Case for Welfare Rights?: A Case for Welfare Rights?
CN101902328B (en) A kind of method utilizing dynamic password verification user identity
Shelton “Who belongs”: A critical race theory and Latino critical theory analysis of the United States immigration climate for undocumented Latinx college students
Morone et al. Power to the people? Restoring citizen participation
Nagy et al. Representing Reconciliation: A news frame analysis of print media coverage of Indian residential schools
Bunkle The 1944 education act and second wave feminism
Holthe et al. Community health care workers’ experiences on enacting policy on technology with citizens with mild cognitive impairment and dementia
Schwan Introduction: Reading and writing in prison
Ellis et al. “No Way! Like Only Hispanics are Illegal”: Examining the Racialized Psychosocial Development of Migrant “Illegality” Across Immigrant Groups in the United States
JP2007213371A (en) Attendance verification system
CN103376911A (en) Method for arbitrarily inputting passwords by keys
Azios et al. Clinical practice recommendations for improving life participation for people with aphasia in long-term care
De Bruin Cardoso et al. Promoting learning on reintegration of children into family-based care: implications for monitoring approaches and tools. Experiences from the RISE learning network
Peters Lyotard, Marxism and Education: the problem of knowledge capitalism
Brunner Key political symbols: the dissociation process
Campbell Disability, legal mobilisation and the challenges of capacity building in Sri Lanka
Little et al. E-voting in an ubicomp world: Trust, privacy, and social implications
Taavila Wearable technology as part of access control
Simms A Study on Formerly Incarcerated Women from Appalachia Pursuing Higher Education
JP2011208397A (en) Unlocking system, unlocking control method, and program
Smith James Meredith Honored by Student Organization
Hattam The 1964 civil rights act: Narrating the past, authorizing the future
Herzog-Evans Community Corrections in France
Duffus Navigating Probation and Managing Substance Use: The Roles of Gender and Class
Limbert et al. Low‐income women, critical resistance, and welfare rights activism

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160907

Termination date: 20200429