CN103810415A - Graphical password protection method - Google Patents

Graphical password protection method Download PDF

Info

Publication number
CN103810415A
CN103810415A CN201410040065.9A CN201410040065A CN103810415A CN 103810415 A CN103810415 A CN 103810415A CN 201410040065 A CN201410040065 A CN 201410040065A CN 103810415 A CN103810415 A CN 103810415A
Authority
CN
China
Prior art keywords
coordinate points
fundamental
graphical passwords
points
coordinate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410040065.9A
Other languages
Chinese (zh)
Other versions
CN103810415B (en
Inventor
曾立
张弦
曾凡嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410040065.9A priority Critical patent/CN103810415B/en
Publication of CN103810415A publication Critical patent/CN103810415A/en
Application granted granted Critical
Publication of CN103810415B publication Critical patent/CN103810415B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A graphical password protection method includes a graphical password setting method and a graphical password verification method. The graphical password setting method includes the steps that one of multiple preset geometric graphs displayed on a display interface of a processor is selected to serve as a basic graph of a graphical password, the basic graph is set to be a first graph password, then the structure of the basic graph is changed to form a repaired graph, and the repaired graph is set to be a second graph password. The graphical password verification method includes the steps that a user compares one geometric graph displayed on the display interface with the first graph password, the structure of the geometric graph is changed to form an input graph after comparison, and the input graph is determined to be a verification password to be input. According to the graphical password protection method, safety of the passwords is improved, and operations are easy, convenient and quick to carry out.

Description

A kind of graphical passwords guard method
Technical field
The present invention relates to a kind of cipher code protection method, relate in particular to a kind of graphical passwords guard method, be specifically applicable to improve password security, simplify the operation.
Background technology
The cryptographic system of the current device for computing machine or mobile device and so on, its input type mostly is keyboard entry method, and mostly adopt character input, the radix of this cryptographic system is simple, and the base character of Gong choosing is identical, easily cause the appearance of following problem: be first safety problem, main manifestations is for palming off, stealing, can there is basic input dialogue frame in fake site, in the time that user inputs, account and password will be stolen, simultaneously, user, in carrying out password authentification with the input of character type numeral, is easy to be stolen by trojan horse program; Next is operational issue; because digital verification is easier to be cracked; user is in order to improve Account Guard rank; very long character type password can be set conventionally, when authentication password, need for a long time input, cannot be simply, operate efficiently; in addition; in the time that mobile devices such as utilizing smart mobile phone operates, user is more convenient for using the mode that touches input to operate, and the mode of keyboard input is no longer applicable.
Chinese patent application publication No. is CN10930509A, and Shen Qing Publication day is that the patent of invention on Dec 29th, 2010 discloses a kind of cipher code protection method, comprises the steps: to preset form and on display interface, shows at least one graphics field; Record, because user is rotated to graphics field the angle parameter that operation produces, generates input message; Receive user's confirmation operation; Respond this confirmation operation, by the input message generating and default encrypted message comparison, carry out password authentification, this method is by the data of transmission then uses image representation, belong to utilize safety cabinet password authentification principle a kind of and verify digital mode, in fact checking or the digital compatibility of many groups.
Chinese patent application publication No. is CN102243754A, Shen Qing Publication day is that the patent of invention on November 16th, 2011 discloses a kind of method and apparatus that generates secret value, the method comprises the following steps: show the initial pictures that comprises multiple graphic elements, each graphic element has at least two modification; Repeatedly receive the modification that user inputs to select several described multiple graphic elements, generate thus the image of revising; At least from the modification of selected graphic element, generate secret value, although this method belongs to the category of image authentication, but must be in mobile phone or the equipment pre-stored image that needs checking, otherwise in the time of checking, operate very complicated, what need is chronic, and if lost mobile phone or unauthorized people operation, this image password is easy to be stolen.
Summary of the invention
The object of the invention is to overcome that the cipher safety existing in prior art is lower, the problem of complicated operation, provide a kind of security graphical passwords guard method higher, easy and simple to handle.
For realizing above object, technical scheme of the present invention is as follows:
A kind of graphical passwords guard method, the method comprises the method to set up of graphical passwords, the verification method of graphical passwords;
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction of graphical passwords is set to processor, then shown several default geometric figures by processor according to this instruction on its display interface;
A2: select the wherein width geometric figure showing on display interface as the fundamental figure of graphical passwords, and this fundamental figure is set as to the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as to second graph password, now, complete the setting of graphical passwords, wherein, the structure of described change fundamental figure comprises at least one operation in the point on point, the connection fundamental figure dragging on fundamental figure.
Described geometric figure is plane or the solid geometry figure that is arranged in coordinate dot matrix.
At least one operation in the coordinate points that the described point dragging on fundamental figure comprises the end points that drags on fundamental figure, drag non-end points on fundamental figure.
The described end points dragging on fundamental figure comprises at least 1 basic operation, this basic operation refers to: an end points that drags arbitrary line segment on fundamental figure is to a coordinate points place in coordinate dot matrix, now, the new line segment that the former line segment at end points place is connected to form by another end points by former line segment and coordinate points replaces.
At least one operation on the described straight-line segment that drags coordinate points that the coordinate points of non-end points on fundamental figure comprises non-end points on the curve that drags fundamental figure, drag fundamental figure in the coordinate points of non-end points.
On the described curve that drags fundamental figure, the coordinate points of non-end points comprises at least 1 basic operation, this basic operation refers to: first selected No. two coordinate points non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points of being positioned at, then drag No. four coordinate points between No. two coordinate points, No. three coordinate points on this curve to No. five coordinate points places in coordinate dot matrix, now, the segment of curve that is end points with No. two coordinate points, No. three coordinate points on this curve is connected No. two coordinate points, No. five coordinate points successively, broken line that No. three coordinate points formed replaces.
On the described straight-line segment that drags fundamental figure, the coordinate points of non-end points comprises at least 1 basic operation, this basic operation refers to: drag non-end points coordinate points on arbitrary straight-line segment of fundamental figure to No. six coordinate points places in coordinate dot matrix, now, between two-end-point on this straight-line segment and No. six coordinate points, form the broken line take No. six coordinate points as break, and the former line segment at non-end points coordinate points place is replaced by described broken line, wherein, No. six coordinate points are positioned at outside the former line segment at non-end points coordinate points place.
Point on described connection fundamental figure comprises at least 1 basic operation, and this basic operation refers to: first on fundamental figure, choose No. seven coordinate points that are positioned on different line segments, No. eight coordinate points, then connect No. seven coordinate points, No. eight coordinate points.
The verification method of described graphical passwords comprises the following steps successively:
First step checking: user first sends the instruction of verification pattern password to processor, on its display interface, shown again a width geometric figure according to this instruction by processor, then user compares this geometric figure and the first graphical passwords, enter second step checking if this geometric figure is consistent with the first graphical passwords, if inconsistent the stopping of this geometric figure and the first graphical passwords verified;
Second step checking: on change display interface, geometric structure is to form tablet pattern, and confirm this tablet pattern to input as authentication password, then processor is compared this tablet pattern and second graph password, if tablet pattern prompting consistent with graphical passwords is by password authentification, if tablet pattern and the inconsistent prompt cipher of second graph password authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure comprises the point dragging on geometric figure, connect at least one operation in the point on geometric figure.
Compared with prior art, beneficial effect of the present invention is:
1, in a kind of graphical passwords guard method of the present invention, the method to set up of graphical passwords comprises and selects a width to be preset in geometric figure in the processor fundamental figure as graphical passwords, and this fundamental figure is set as to the first graphical passwords, then drag and/or connect point on fundamental figure to form amended figure, again using this amended figure as second graph password, this method not only adopts the mode of contrast geometric figure structure, make trojan horse program be difficult to steal this password, and revise the easy and simple to handle of fundamental figure by the point dragging and/or connect on fundamental figure, fast, easily memory, simultaneously, geometric structural change is infinite many, very difficult quilt is guessed or is cracked, security is very high.Therefore, the present invention has not only effectively improved the security of password, and easy and simple to handle, quick.
2, in a kind of graphical passwords guard method of the present invention, geometric figure is the closed figure that is arranged in coordinate dot matrix, and this design makes user can judge accurately shift position in the time dragging geometry, has guaranteed the accuracy of operation.Therefore, the present invention has guaranteed the accuracy of operation.
3, in a kind of graphical passwords guard method of the present invention, the verification method of graphical passwords comprises that processor shows a width geometric figure on its display interface according to password authentification instruction; then user compares this geometric figure and the first graphical passwords; if inconsistent stopping verified for this geometric figure and the first graphical passwords; this operation makes user to judge whether checking interface is fake site according to whether the geometric figure showing on display interface and the first graphical passwords be consistent, thereby produces the effect of stopping personation.Therefore, in the present invention, the verification method of graphical passwords can be stopped personation.
Accompanying drawing explanation
Fig. 1 is the geometric structural representation showing on display interface in steps A 1 of the present invention.
Fig. 2 is the structural representation of the first graphical passwords in the present invention.
Fig. 3 is the structural representation of second graph password in the embodiment of the present invention 1.
Fig. 4 is the structural representation of second graph password in the embodiment of the present invention 2.
Fig. 5 is the structural representation of second graph password in the embodiment of the present invention 3.
Fig. 6 is the structural representation of second graph password in the embodiment of the present invention 4.
In figure: terminal B 1, coordinate points B2, No. two coordinate points a, No. three coordinate points b, No. four coordinate points c, No. five coordinate points d, segment of curve ab, broken line adb, non-end points coordinate points C1, No. six coordinate points C2, No. seven coordinate points D1, No. eight coordinate points D2.
Embodiment
Below in conjunction with accompanying drawing explanation and embodiment, the present invention is further detailed explanation.
Referring to figure 1 ?Fig. 6, a kind of graphical passwords guard method, the method comprises the method to set up of graphical passwords, the verification method of graphical passwords;
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction of graphical passwords is set to processor, then shown several default geometric figures by processor according to this instruction on its display interface;
A2: select the wherein width geometric figure showing on display interface as the fundamental figure of graphical passwords, and this fundamental figure is set as to the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as to second graph password, now, complete the setting of graphical passwords, wherein, the structure of described change fundamental figure comprises at least one operation in the point on point, the connection fundamental figure dragging on fundamental figure.
Described geometric figure is plane or the solid geometry figure that is arranged in coordinate dot matrix.
At least one operation in the coordinate points that the described point dragging on fundamental figure comprises the end points that drags on fundamental figure, drag non-end points on fundamental figure.
The described end points dragging on fundamental figure comprises at least 1 basic operation, this basic operation refers to: an end points B1 who drags arbitrary line segment on fundamental figure is to a coordinate points B2 place in coordinate dot matrix, now, the new line segment that the former line segment at terminal B 1 place is connected to form by another end points by former line segment and coordinate points B2 replaces.
At least one operation on the described straight-line segment that drags coordinate points that the coordinate points of non-end points on fundamental figure comprises non-end points on the curve that drags fundamental figure, drag fundamental figure in the coordinate points of non-end points.
On the described curve that drags fundamental figure, the coordinate points of non-end points comprises at least 1 basic operation, this basic operation refers to: first select and be positioned at No. two coordinate points a non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points b, then drag and on this curve, be positioned at No. two coordinate points a, No. four coordinate points c between No. three coordinate points b are to No. five coordinate points d places in coordinate dot matrix, now, on this curve with No. two coordinate points a, the segment of curve ab that No. three coordinate points b are end points is connected coordinate points a successively No. two, No. five coordinate points d, the broken line adb that No. three coordinate points b form replaces.
On the described straight-line segment that drags fundamental figure, the coordinate points of non-end points comprises at least 1 basic operation, this basic operation refers to: drag non-end points coordinate points C1 on arbitrary straight-line segment of fundamental figure to No. six coordinate points C2 places in coordinate dot matrix, now, between two-end-point on this straight-line segment and No. six coordinate points C2, form the broken line take No. six coordinate points C2 as break, and the former line segment at non-end points coordinate points C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-end points coordinate points C1 place.
Point on described connection fundamental figure comprises at least 1 basic operation, and this basic operation refers to: first head chooses No. seven coordinate points D1 that are positioned on different line segments, No. eight coordinate points D2 on fundamental figure, then connects coordinate points D1, No. eight coordinate points D2 No. seven.
The verification method of described graphical passwords comprises the following steps successively:
First step checking: user first sends the instruction of verification pattern password to processor, on its display interface, shown again a width geometric figure according to this instruction by processor, then user compares this geometric figure and the first graphical passwords, enter second step checking if this geometric figure is consistent with the first graphical passwords, if inconsistent the stopping of this geometric figure and the first graphical passwords verified;
Second step checking: on change display interface, geometric structure is to form tablet pattern, and confirm this tablet pattern to input as authentication password, then processor is compared this tablet pattern and second graph password, if tablet pattern prompting consistent with graphical passwords is by password authentification, if tablet pattern and the inconsistent prompt cipher of second graph password authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure comprises the point dragging on geometric figure, connect at least one operation in the point on geometric figure.
Principle of the present invention is described as follows:
Due under the condition that there is no coordinate background, in the time of password authentification, drag or connect the processing ease of putting on fundamental figure and occur point to be dragged to the problem that site is set accurately, also easily forget site is set simultaneously, therefore geometric figure is placed in coordinate dot matrix by the present invention, user can accurately find site is set in the time adjusting fundamental figure structure, not only realize accurate location, also convenient operation, be specially adapted to handset touch panel, in addition, the number that the coordinate in coordinate dot matrix is counted can be adjusted according to the demand of different user.
In the time including curvilinear structures in fundamental figure, drag operation in the present invention needs first selected No. two non-adjacent coordinate points a on curve, No. three coordinate points b, thereby determine with No. two coordinate points a, the segment of curve ab that No. three coordinate points b are end points is as the variable section of this curve, then drag and on this curve, be positioned at No. two coordinate points a, No. four coordinate points c between No. three coordinate points b are to No. five coordinate points d places in coordinate dot matrix, now, will become and connect successively coordinate points a No. two as the segment of curve ab of variable section, No. five coordinate points d, the broken line adb that No. three coordinate points b form.
In the verification method of graphical passwords of the present invention, first step checking adopts user by the mode that shows on the display interface of processor that a width geometric figure and the first graphical passwords are compared, show to verify that interface is fake site if this geometric figure and the first graphical passwords are inconsistent, can enter next step checking if this geometric figure is consistent with the first graphical passwords, therefore user can clearly judge whether checking interface is fake site by which, thereby improves the security of password authentification.
Embodiment 1:
Referring to Fig. 1, Fig. 2, Fig. 3, a kind of graphical passwords guard method, the method comprises the method to set up of graphical passwords, the verification method of graphical passwords, the method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction of graphical passwords is set to processor, then shown several default geometric figures by processor according to this instruction on its display interface, wherein, described geometric figure is plane or the solid geometry figure that is arranged in coordinate dot matrix;
A2: select the wherein width geometric figure showing on display interface as the fundamental figure of graphical passwords, and this fundamental figure is set as to the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as to second graph password, now, complete the setting of graphical passwords, wherein, the structure of described change fundamental figure is following operation: an end points B1 who drags arbitrary line segment on fundamental figure is to a coordinate points B2 place in coordinate dot matrix, and now, the new line segment that the former line segment at terminal B 1 place is connected to form by another end points by former line segment and coordinate points B2 replaces.
The verification method of described graphical passwords comprises the following steps successively:
First step checking: user first sends the instruction of verification pattern password to processor, on its display interface, shown again a width geometric figure according to this instruction by processor, then user compares this geometric figure and the first graphical passwords, enter second step checking if this geometric figure is consistent with the first graphical passwords, if inconsistent the stopping of this geometric figure and the first graphical passwords verified;
Second step checking: on change display interface, geometric structure is to form tablet pattern, and confirm this tablet pattern to input as authentication password, then processor is compared this tablet pattern and second graph password, if tablet pattern prompting consistent with graphical passwords is by password authentification, if tablet pattern and the inconsistent prompt cipher of second graph password authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure is following operation: an end points B1 who drags arbitrary line segment on geometric figure is to a coordinate points B2 place in coordinate dot matrix, now, the new line segment that the former line segment at terminal B 1 place is connected to form by another end points by former line segment and coordinate points B2 replaces.
Embodiment 2:
Referring to Fig. 1, Fig. 2, Fig. 4, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: first selected No. two coordinate points a non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points b of being positioned at, then drag No. four coordinate points c between No. two coordinate points a, No. three coordinate points b on this curve to No. five coordinate points d places in coordinate dot matrix, now, the segment of curve ab that is end points with No. two coordinate points a, No. three coordinate points b on this curve is connected successively the broken line adb that No. two coordinate points a, No. five coordinate points d, No. three coordinate points b formed and is replaced;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: first choose and be positioned at No. two coordinate points a non-adjacent on geometric arbitrary curve, No. three coordinate points b, then drag No. four coordinate points c between No. two coordinate points a, No. three coordinate points b on this curve to No. five coordinate points d places in coordinate dot matrix, now, the segment of curve ab that is end points with No. two coordinate points a, No. three coordinate points b on this curve is connected successively the broken line adb that No. two coordinate points a, No. five coordinate points d, No. three coordinate points b formed and is replaced.
Embodiment 3:
Referring to Fig. 1, Fig. 2, Fig. 5, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: drag non-end points coordinate points C1 on arbitrary straight-line segment of fundamental figure to No. six coordinate points C2 places in coordinate dot matrix, now, between two-end-point on this straight-line segment and No. six coordinate points C2, form the broken line take No. six coordinate points C2 as break, and the former line segment at non-end points coordinate points C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-end points coordinate points C1 place;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: drag non-end points coordinate points C1 on geometric arbitrary straight-line segment to No. six coordinate points C2 places in coordinate dot matrix, now, between two-end-point on this straight-line segment and No. six coordinate points C2, form the broken line take No. six coordinate points C2 as break, and the former line segment at non-end points coordinate points C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-end points coordinate points C1 place.
Embodiment 4:
Referring to Fig. 1, Fig. 2, Fig. 6, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: first on fundamental figure, choose and be positioned at No. seven coordinate points D1 of different line segments, No. eight coordinate points D2, then connect coordinate points D1, No. eight coordinate points D2 No. seven;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: first on geometric figure, choose and be positioned at No. seven coordinate points D1 of different line segments, No. eight coordinate points D2, then connect coordinate points D1, No. eight coordinate points D2 No. seven.

Claims (9)

1. a graphical passwords guard method, the method comprises the method to set up of graphical passwords, the verification method of graphical passwords, it is characterized in that:
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction of graphical passwords is set to processor, then shown several default geometric figures by processor according to this instruction on its display interface;
A2: select the wherein width geometric figure showing on display interface as the fundamental figure of graphical passwords, and this fundamental figure is set as to the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as to second graph password, now, complete the setting of graphical passwords, wherein, the structure of described change fundamental figure comprises at least one operation in the point on point, the connection fundamental figure dragging on fundamental figure.
2. a kind of graphical passwords guard method according to claim 1, is characterized in that: described geometric figure is plane or the solid geometry figure that is arranged in coordinate dot matrix.
3. a kind of graphical passwords guard method according to claim 2, is characterized in that: described in drag that point on fundamental figure comprises the end points that drags on fundamental figure, at least one operation in the coordinate points that drags non-end points on fundamental figure.
4. a kind of graphical passwords guard method according to claim 3; it is characterized in that: described in the end points that drags on fundamental figure comprise at least 1 basic operation; this basic operation refers to: an end points (B1) to the coordinate points (B2) in coordinate dot matrix that drags arbitrary line segment on fundamental figure is located; now, the new line segment that the former line segment at end points (B1) place is connected to form by another end points by former line segment and a coordinate points (B2) replaces.
5. a kind of graphical passwords guard method according to claim 3, is characterized in that: described in drag coordinate points that the coordinate points of non-end points on fundamental figure comprises non-end points on the curve that drags fundamental figure, at least one operation on the straight-line segment that drags fundamental figure in the coordinate points of non-end points.
6. a kind of graphical passwords guard method according to claim 5, it is characterized in that: described in drag non-end points on the curve of fundamental figure coordinate points comprise at least 1 basic operation, this basic operation refers to: first select and be positioned at No. two coordinate points (a) non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points (b), then drag and on this curve, be positioned at No. two coordinate points (a), No. four coordinate points (c) between No. three coordinate points (b) to No. five coordinate points (d) in coordinate dot matrix are located, now, on this curve with No. two coordinate points (a), the segment of curve (ab) that No. three coordinate points (b) are end points is connected No. two coordinate points (a) successively, No. five coordinate points (d), the broken line (adb) that No. three coordinate points (b) form replaces.
7. a kind of graphical passwords guard method according to claim 5, it is characterized in that: described in drag non-end points on the straight-line segment of fundamental figure coordinate points comprise at least 1 basic operation, this basic operation refers to: non-end points coordinate points (C1) to No. six coordinate points (C2) in coordinate dot matrix that drag on arbitrary straight-line segment of fundamental figure are located, now, between two-end-point on this straight-line segment and No. six coordinate points (C2), form the broken line take No. six coordinate points (C2) as break, and the former line segment at non-end points coordinate points (C1) place is replaced by described broken line, wherein, No. six coordinate points (C2) are positioned at outside the former line segment at non-end points coordinate points (C1) place.
8. a kind of graphical passwords guard method according to claim 2; it is characterized in that: the point on described connection fundamental figure comprises at least 1 basic operation; this basic operation refers to: first on fundamental figure, choose No. seven coordinate points (D1), No. eight coordinate points (D2) that are positioned on different line segments, then connect No. seven coordinate points (D1), No. eight coordinate points (D2).
According to claim 1 ?a kind of graphical passwords guard method described in any one in 8, it is characterized in that the verification method of described graphical passwords comprises the following steps successively:
First step checking: user first sends the instruction of verification pattern password to processor, on its display interface, shown again a width geometric figure according to this instruction by processor, then user compares this geometric figure and the first graphical passwords, enter second step checking if this geometric figure is consistent with the first graphical passwords, if inconsistent the stopping of this geometric figure and the first graphical passwords verified;
Second step checking: on change display interface, geometric structure is to form tablet pattern, and confirm this tablet pattern to input as authentication password, then processor is compared this tablet pattern and second graph password, if tablet pattern prompting consistent with graphical passwords is by password authentification, if tablet pattern and the inconsistent prompt cipher of second graph password authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure comprises the point dragging on geometric figure, connect at least one operation in the point on geometric figure.
CN201410040065.9A 2014-01-28 2014-01-28 A kind of graphical passwords guard method Expired - Fee Related CN103810415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410040065.9A CN103810415B (en) 2014-01-28 2014-01-28 A kind of graphical passwords guard method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410040065.9A CN103810415B (en) 2014-01-28 2014-01-28 A kind of graphical passwords guard method

Publications (2)

Publication Number Publication Date
CN103810415A true CN103810415A (en) 2014-05-21
CN103810415B CN103810415B (en) 2016-08-03

Family

ID=50707171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410040065.9A Expired - Fee Related CN103810415B (en) 2014-01-28 2014-01-28 A kind of graphical passwords guard method

Country Status (1)

Country Link
CN (1) CN103810415B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156655A (en) * 2014-05-28 2014-11-19 东莞盛世科技电子实业有限公司 Ambiguous password check method and password check equipment
CN105279424A (en) * 2015-11-02 2016-01-27 厦门雅迅网络股份有限公司 Pattern password intensity recognition method and device
CN108009419A (en) * 2017-11-24 2018-05-08 咪咕文化科技有限公司 A kind of authentication method of graphical passwords, device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090046929A1 (en) * 2007-08-13 2009-02-19 Sony Ericsson Mobile Communications Ab Image-based code
CN101676926A (en) * 2008-09-16 2010-03-24 深圳富泰宏精密工业有限公司 Touch type electronic equipment and its authority control method
CN102243754A (en) * 2010-05-11 2011-11-16 汤姆森特许公司 Method and a device for generating a secret value
CN102279910A (en) * 2010-06-11 2011-12-14 鸿富锦精密工业(深圳)有限公司 Device with encryption and decryption functions and encrypting and decrypting methods of device
CN102521550A (en) * 2011-12-09 2012-06-27 鸿富锦精密工业(深圳)有限公司 Electronic device with file encryption function and method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090046929A1 (en) * 2007-08-13 2009-02-19 Sony Ericsson Mobile Communications Ab Image-based code
CN101676926A (en) * 2008-09-16 2010-03-24 深圳富泰宏精密工业有限公司 Touch type electronic equipment and its authority control method
CN102243754A (en) * 2010-05-11 2011-11-16 汤姆森特许公司 Method and a device for generating a secret value
CN102279910A (en) * 2010-06-11 2011-12-14 鸿富锦精密工业(深圳)有限公司 Device with encryption and decryption functions and encrypting and decrypting methods of device
CN102521550A (en) * 2011-12-09 2012-06-27 鸿富锦精密工业(深圳)有限公司 Electronic device with file encryption function and method thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156655A (en) * 2014-05-28 2014-11-19 东莞盛世科技电子实业有限公司 Ambiguous password check method and password check equipment
WO2015180235A1 (en) * 2014-05-28 2015-12-03 东莞盛世科技电子实业有限公司 Ambiguous password checking method and password checking device
CN104156655B (en) * 2014-05-28 2017-03-08 东莞盛世科技电子实业有限公司 Ambiguity cryptographic check method and cryptographic check equipment
CN105279424A (en) * 2015-11-02 2016-01-27 厦门雅迅网络股份有限公司 Pattern password intensity recognition method and device
CN105279424B (en) * 2015-11-02 2020-09-11 厦门雅迅网络股份有限公司 Method and device for identifying strength of graphic password
CN108009419A (en) * 2017-11-24 2018-05-08 咪咕文化科技有限公司 A kind of authentication method of graphical passwords, device and storage medium
CN108009419B (en) * 2017-11-24 2020-12-22 咪咕文化科技有限公司 Authentication method and device of graphic password and storage medium

Also Published As

Publication number Publication date
CN103810415B (en) 2016-08-03

Similar Documents

Publication Publication Date Title
US9760707B2 (en) Unlocking electronic devices using touchscreen input gestures
US10318717B2 (en) Message display method and apparatus
US9507928B2 (en) Preventing the discovery of access codes
US9514297B2 (en) Systems and methods for gesture lock obfuscation
CN103200011B (en) A kind of cipher authentication method and device
US10885164B2 (en) Login process for mobile phones, tablets and other types of touch screen devices or computers
EP2443581A1 (en) Graphical authentication
US20140366127A1 (en) Touchscreen security user input interface
CN104516645A (en) Electronic device unlocking method
CN103996011A (en) Method and device for protecting codes to be input safely
CN103136462B (en) A kind of method and system of password authentification
CN102957688A (en) Password input and verification method and device
CN105095730A (en) Method and device for controlling electronic device/unlocking hand-held terminal and electronic device
CN103810415A (en) Graphical password protection method
CN105354458B (en) Password Input verification method and system
CN104680376B (en) A kind of Transaction Information verification method and device
CN106302344B (en) Security sweep method and system
CN104794392A (en) Equipment unlocking method and device based on grids
CN105447373A (en) Password authentication method and device
CN106033505A (en) Unlock method, unlock code setting method and device
KR20120092779A (en) Gestures on the touch screen of the encrypted login
KR101648779B1 (en) Method for secure text input in information terminal
CN105323752A (en) Mobile device, and method of authenticating user
CN106682462A (en) Touch screen unlocking method and terminal
TW201602822A (en) Electronic device and screen uncocking method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160803

Termination date: 20180128

CF01 Termination of patent right due to non-payment of annual fee