CN103810415A - Graphical password protection method - Google Patents
Graphical password protection method Download PDFInfo
- Publication number
- CN103810415A CN103810415A CN201410040065.9A CN201410040065A CN103810415A CN 103810415 A CN103810415 A CN 103810415A CN 201410040065 A CN201410040065 A CN 201410040065A CN 103810415 A CN103810415 A CN 103810415A
- Authority
- CN
- China
- Prior art keywords
- coordinate points
- fundamental
- graphical passwords
- points
- coordinate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
A graphical password protection method includes a graphical password setting method and a graphical password verification method. The graphical password setting method includes the steps that one of multiple preset geometric graphs displayed on a display interface of a processor is selected to serve as a basic graph of a graphical password, the basic graph is set to be a first graph password, then the structure of the basic graph is changed to form a repaired graph, and the repaired graph is set to be a second graph password. The graphical password verification method includes the steps that a user compares one geometric graph displayed on the display interface with the first graph password, the structure of the geometric graph is changed to form an input graph after comparison, and the input graph is determined to be a verification password to be input. According to the graphical password protection method, safety of the passwords is improved, and operations are easy, convenient and quick to carry out.
Description
Technical field
The present invention relates to a kind of cipher code protection method, relate in particular to a kind of graphical passwords guard method, be specifically applicable to improve password security, simplify the operation.
Background technology
The cryptographic system of the current device for computing machine or mobile device and so on, its input type mostly is keyboard entry method, and mostly adopt character input, the radix of this cryptographic system is simple, and the base character of Gong choosing is identical, easily cause the appearance of following problem: be first safety problem, main manifestations is for palming off, stealing, can there is basic input dialogue frame in fake site, in the time that user inputs, account and password will be stolen, simultaneously, user, in carrying out password authentification with the input of character type numeral, is easy to be stolen by trojan horse program; Next is operational issue; because digital verification is easier to be cracked; user is in order to improve Account Guard rank; very long character type password can be set conventionally, when authentication password, need for a long time input, cannot be simply, operate efficiently; in addition; in the time that mobile devices such as utilizing smart mobile phone operates, user is more convenient for using the mode that touches input to operate, and the mode of keyboard input is no longer applicable.
Chinese patent application publication No. is CN10930509A, and Shen Qing Publication day is that the patent of invention on Dec 29th, 2010 discloses a kind of cipher code protection method, comprises the steps: to preset form and on display interface, shows at least one graphics field; Record, because user is rotated to graphics field the angle parameter that operation produces, generates input message; Receive user's confirmation operation; Respond this confirmation operation, by the input message generating and default encrypted message comparison, carry out password authentification, this method is by the data of transmission then uses image representation, belong to utilize safety cabinet password authentification principle a kind of and verify digital mode, in fact checking or the digital compatibility of many groups.
Chinese patent application publication No. is CN102243754A, Shen Qing Publication day is that the patent of invention on November 16th, 2011 discloses a kind of method and apparatus that generates secret value, the method comprises the following steps: show the initial pictures that comprises multiple graphic elements, each graphic element has at least two modification; Repeatedly receive the modification that user inputs to select several described multiple graphic elements, generate thus the image of revising; At least from the modification of selected graphic element, generate secret value, although this method belongs to the category of image authentication, but must be in mobile phone or the equipment pre-stored image that needs checking, otherwise in the time of checking, operate very complicated, what need is chronic, and if lost mobile phone or unauthorized people operation, this image password is easy to be stolen.
Summary of the invention
The object of the invention is to overcome that the cipher safety existing in prior art is lower, the problem of complicated operation, provide a kind of security graphical passwords guard method higher, easy and simple to handle.
For realizing above object, technical scheme of the present invention is as follows:
A kind of graphical passwords guard method, the method comprises the method to set up of graphical passwords, the verification method of graphical passwords;
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction of graphical passwords is set to processor, then shown several default geometric figures by processor according to this instruction on its display interface;
A2: select the wherein width geometric figure showing on display interface as the fundamental figure of graphical passwords, and this fundamental figure is set as to the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as to second graph password, now, complete the setting of graphical passwords, wherein, the structure of described change fundamental figure comprises at least one operation in the point on point, the connection fundamental figure dragging on fundamental figure.
Described geometric figure is plane or the solid geometry figure that is arranged in coordinate dot matrix.
At least one operation in the coordinate points that the described point dragging on fundamental figure comprises the end points that drags on fundamental figure, drag non-end points on fundamental figure.
The described end points dragging on fundamental figure comprises at least 1 basic operation, this basic operation refers to: an end points that drags arbitrary line segment on fundamental figure is to a coordinate points place in coordinate dot matrix, now, the new line segment that the former line segment at end points place is connected to form by another end points by former line segment and coordinate points replaces.
At least one operation on the described straight-line segment that drags coordinate points that the coordinate points of non-end points on fundamental figure comprises non-end points on the curve that drags fundamental figure, drag fundamental figure in the coordinate points of non-end points.
On the described curve that drags fundamental figure, the coordinate points of non-end points comprises at least 1 basic operation, this basic operation refers to: first selected No. two coordinate points non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points of being positioned at, then drag No. four coordinate points between No. two coordinate points, No. three coordinate points on this curve to No. five coordinate points places in coordinate dot matrix, now, the segment of curve that is end points with No. two coordinate points, No. three coordinate points on this curve is connected No. two coordinate points, No. five coordinate points successively, broken line that No. three coordinate points formed replaces.
On the described straight-line segment that drags fundamental figure, the coordinate points of non-end points comprises at least 1 basic operation, this basic operation refers to: drag non-end points coordinate points on arbitrary straight-line segment of fundamental figure to No. six coordinate points places in coordinate dot matrix, now, between two-end-point on this straight-line segment and No. six coordinate points, form the broken line take No. six coordinate points as break, and the former line segment at non-end points coordinate points place is replaced by described broken line, wherein, No. six coordinate points are positioned at outside the former line segment at non-end points coordinate points place.
Point on described connection fundamental figure comprises at least 1 basic operation, and this basic operation refers to: first on fundamental figure, choose No. seven coordinate points that are positioned on different line segments, No. eight coordinate points, then connect No. seven coordinate points, No. eight coordinate points.
The verification method of described graphical passwords comprises the following steps successively:
First step checking: user first sends the instruction of verification pattern password to processor, on its display interface, shown again a width geometric figure according to this instruction by processor, then user compares this geometric figure and the first graphical passwords, enter second step checking if this geometric figure is consistent with the first graphical passwords, if inconsistent the stopping of this geometric figure and the first graphical passwords verified;
Second step checking: on change display interface, geometric structure is to form tablet pattern, and confirm this tablet pattern to input as authentication password, then processor is compared this tablet pattern and second graph password, if tablet pattern prompting consistent with graphical passwords is by password authentification, if tablet pattern and the inconsistent prompt cipher of second graph password authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure comprises the point dragging on geometric figure, connect at least one operation in the point on geometric figure.
Compared with prior art, beneficial effect of the present invention is:
1, in a kind of graphical passwords guard method of the present invention, the method to set up of graphical passwords comprises and selects a width to be preset in geometric figure in the processor fundamental figure as graphical passwords, and this fundamental figure is set as to the first graphical passwords, then drag and/or connect point on fundamental figure to form amended figure, again using this amended figure as second graph password, this method not only adopts the mode of contrast geometric figure structure, make trojan horse program be difficult to steal this password, and revise the easy and simple to handle of fundamental figure by the point dragging and/or connect on fundamental figure, fast, easily memory, simultaneously, geometric structural change is infinite many, very difficult quilt is guessed or is cracked, security is very high.Therefore, the present invention has not only effectively improved the security of password, and easy and simple to handle, quick.
2, in a kind of graphical passwords guard method of the present invention, geometric figure is the closed figure that is arranged in coordinate dot matrix, and this design makes user can judge accurately shift position in the time dragging geometry, has guaranteed the accuracy of operation.Therefore, the present invention has guaranteed the accuracy of operation.
3, in a kind of graphical passwords guard method of the present invention, the verification method of graphical passwords comprises that processor shows a width geometric figure on its display interface according to password authentification instruction; then user compares this geometric figure and the first graphical passwords; if inconsistent stopping verified for this geometric figure and the first graphical passwords; this operation makes user to judge whether checking interface is fake site according to whether the geometric figure showing on display interface and the first graphical passwords be consistent, thereby produces the effect of stopping personation.Therefore, in the present invention, the verification method of graphical passwords can be stopped personation.
Accompanying drawing explanation
Fig. 1 is the geometric structural representation showing on display interface in steps A 1 of the present invention.
Fig. 2 is the structural representation of the first graphical passwords in the present invention.
Fig. 3 is the structural representation of second graph password in the embodiment of the present invention 1.
Fig. 4 is the structural representation of second graph password in the embodiment of the present invention 2.
Fig. 5 is the structural representation of second graph password in the embodiment of the present invention 3.
Fig. 6 is the structural representation of second graph password in the embodiment of the present invention 4.
In figure: terminal B 1, coordinate points B2, No. two coordinate points a, No. three coordinate points b, No. four coordinate points c, No. five coordinate points d, segment of curve ab, broken line adb, non-end points coordinate points C1, No. six coordinate points C2, No. seven coordinate points D1, No. eight coordinate points D2.
Embodiment
Below in conjunction with accompanying drawing explanation and embodiment, the present invention is further detailed explanation.
Referring to figure 1 ?Fig. 6, a kind of graphical passwords guard method, the method comprises the method to set up of graphical passwords, the verification method of graphical passwords;
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction of graphical passwords is set to processor, then shown several default geometric figures by processor according to this instruction on its display interface;
A2: select the wherein width geometric figure showing on display interface as the fundamental figure of graphical passwords, and this fundamental figure is set as to the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as to second graph password, now, complete the setting of graphical passwords, wherein, the structure of described change fundamental figure comprises at least one operation in the point on point, the connection fundamental figure dragging on fundamental figure.
Described geometric figure is plane or the solid geometry figure that is arranged in coordinate dot matrix.
At least one operation in the coordinate points that the described point dragging on fundamental figure comprises the end points that drags on fundamental figure, drag non-end points on fundamental figure.
The described end points dragging on fundamental figure comprises at least 1 basic operation, this basic operation refers to: an end points B1 who drags arbitrary line segment on fundamental figure is to a coordinate points B2 place in coordinate dot matrix, now, the new line segment that the former line segment at terminal B 1 place is connected to form by another end points by former line segment and coordinate points B2 replaces.
At least one operation on the described straight-line segment that drags coordinate points that the coordinate points of non-end points on fundamental figure comprises non-end points on the curve that drags fundamental figure, drag fundamental figure in the coordinate points of non-end points.
On the described curve that drags fundamental figure, the coordinate points of non-end points comprises at least 1 basic operation, this basic operation refers to: first select and be positioned at No. two coordinate points a non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points b, then drag and on this curve, be positioned at No. two coordinate points a, No. four coordinate points c between No. three coordinate points b are to No. five coordinate points d places in coordinate dot matrix, now, on this curve with No. two coordinate points a, the segment of curve ab that No. three coordinate points b are end points is connected coordinate points a successively No. two, No. five coordinate points d, the broken line adb that No. three coordinate points b form replaces.
On the described straight-line segment that drags fundamental figure, the coordinate points of non-end points comprises at least 1 basic operation, this basic operation refers to: drag non-end points coordinate points C1 on arbitrary straight-line segment of fundamental figure to No. six coordinate points C2 places in coordinate dot matrix, now, between two-end-point on this straight-line segment and No. six coordinate points C2, form the broken line take No. six coordinate points C2 as break, and the former line segment at non-end points coordinate points C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-end points coordinate points C1 place.
Point on described connection fundamental figure comprises at least 1 basic operation, and this basic operation refers to: first head chooses No. seven coordinate points D1 that are positioned on different line segments, No. eight coordinate points D2 on fundamental figure, then connects coordinate points D1, No. eight coordinate points D2 No. seven.
The verification method of described graphical passwords comprises the following steps successively:
First step checking: user first sends the instruction of verification pattern password to processor, on its display interface, shown again a width geometric figure according to this instruction by processor, then user compares this geometric figure and the first graphical passwords, enter second step checking if this geometric figure is consistent with the first graphical passwords, if inconsistent the stopping of this geometric figure and the first graphical passwords verified;
Second step checking: on change display interface, geometric structure is to form tablet pattern, and confirm this tablet pattern to input as authentication password, then processor is compared this tablet pattern and second graph password, if tablet pattern prompting consistent with graphical passwords is by password authentification, if tablet pattern and the inconsistent prompt cipher of second graph password authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure comprises the point dragging on geometric figure, connect at least one operation in the point on geometric figure.
Principle of the present invention is described as follows:
Due under the condition that there is no coordinate background, in the time of password authentification, drag or connect the processing ease of putting on fundamental figure and occur point to be dragged to the problem that site is set accurately, also easily forget site is set simultaneously, therefore geometric figure is placed in coordinate dot matrix by the present invention, user can accurately find site is set in the time adjusting fundamental figure structure, not only realize accurate location, also convenient operation, be specially adapted to handset touch panel, in addition, the number that the coordinate in coordinate dot matrix is counted can be adjusted according to the demand of different user.
In the time including curvilinear structures in fundamental figure, drag operation in the present invention needs first selected No. two non-adjacent coordinate points a on curve, No. three coordinate points b, thereby determine with No. two coordinate points a, the segment of curve ab that No. three coordinate points b are end points is as the variable section of this curve, then drag and on this curve, be positioned at No. two coordinate points a, No. four coordinate points c between No. three coordinate points b are to No. five coordinate points d places in coordinate dot matrix, now, will become and connect successively coordinate points a No. two as the segment of curve ab of variable section, No. five coordinate points d, the broken line adb that No. three coordinate points b form.
In the verification method of graphical passwords of the present invention, first step checking adopts user by the mode that shows on the display interface of processor that a width geometric figure and the first graphical passwords are compared, show to verify that interface is fake site if this geometric figure and the first graphical passwords are inconsistent, can enter next step checking if this geometric figure is consistent with the first graphical passwords, therefore user can clearly judge whether checking interface is fake site by which, thereby improves the security of password authentification.
Embodiment 1:
Referring to Fig. 1, Fig. 2, Fig. 3, a kind of graphical passwords guard method, the method comprises the method to set up of graphical passwords, the verification method of graphical passwords, the method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction of graphical passwords is set to processor, then shown several default geometric figures by processor according to this instruction on its display interface, wherein, described geometric figure is plane or the solid geometry figure that is arranged in coordinate dot matrix;
A2: select the wherein width geometric figure showing on display interface as the fundamental figure of graphical passwords, and this fundamental figure is set as to the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as to second graph password, now, complete the setting of graphical passwords, wherein, the structure of described change fundamental figure is following operation: an end points B1 who drags arbitrary line segment on fundamental figure is to a coordinate points B2 place in coordinate dot matrix, and now, the new line segment that the former line segment at terminal B 1 place is connected to form by another end points by former line segment and coordinate points B2 replaces.
The verification method of described graphical passwords comprises the following steps successively:
First step checking: user first sends the instruction of verification pattern password to processor, on its display interface, shown again a width geometric figure according to this instruction by processor, then user compares this geometric figure and the first graphical passwords, enter second step checking if this geometric figure is consistent with the first graphical passwords, if inconsistent the stopping of this geometric figure and the first graphical passwords verified;
Second step checking: on change display interface, geometric structure is to form tablet pattern, and confirm this tablet pattern to input as authentication password, then processor is compared this tablet pattern and second graph password, if tablet pattern prompting consistent with graphical passwords is by password authentification, if tablet pattern and the inconsistent prompt cipher of second graph password authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure is following operation: an end points B1 who drags arbitrary line segment on geometric figure is to a coordinate points B2 place in coordinate dot matrix, now, the new line segment that the former line segment at terminal B 1 place is connected to form by another end points by former line segment and coordinate points B2 replaces.
Embodiment 2:
Referring to Fig. 1, Fig. 2, Fig. 4, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: first selected No. two coordinate points a non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points b of being positioned at, then drag No. four coordinate points c between No. two coordinate points a, No. three coordinate points b on this curve to No. five coordinate points d places in coordinate dot matrix, now, the segment of curve ab that is end points with No. two coordinate points a, No. three coordinate points b on this curve is connected successively the broken line adb that No. two coordinate points a, No. five coordinate points d, No. three coordinate points b formed and is replaced;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: first choose and be positioned at No. two coordinate points a non-adjacent on geometric arbitrary curve, No. three coordinate points b, then drag No. four coordinate points c between No. two coordinate points a, No. three coordinate points b on this curve to No. five coordinate points d places in coordinate dot matrix, now, the segment of curve ab that is end points with No. two coordinate points a, No. three coordinate points b on this curve is connected successively the broken line adb that No. two coordinate points a, No. five coordinate points d, No. three coordinate points b formed and is replaced.
Embodiment 3:
Referring to Fig. 1, Fig. 2, Fig. 5, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: drag non-end points coordinate points C1 on arbitrary straight-line segment of fundamental figure to No. six coordinate points C2 places in coordinate dot matrix, now, between two-end-point on this straight-line segment and No. six coordinate points C2, form the broken line take No. six coordinate points C2 as break, and the former line segment at non-end points coordinate points C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-end points coordinate points C1 place;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: drag non-end points coordinate points C1 on geometric arbitrary straight-line segment to No. six coordinate points C2 places in coordinate dot matrix, now, between two-end-point on this straight-line segment and No. six coordinate points C2, form the broken line take No. six coordinate points C2 as break, and the former line segment at non-end points coordinate points C1 place is replaced by described broken line, wherein, No. six coordinate points C2 are positioned at outside the former line segment at non-end points coordinate points C1 place.
Embodiment 4:
Referring to Fig. 1, Fig. 2, Fig. 6, step is substantially the same manner as Example 1, and its difference is:
In the method to set up of graphical passwords, the structure of described change fundamental figure is following operation: first on fundamental figure, choose and be positioned at No. seven coordinate points D1 of different line segments, No. eight coordinate points D2, then connect coordinate points D1, No. eight coordinate points D2 No. seven;
In the verification method of graphical passwords, on described change display interface, geometric structure is following operation: first on geometric figure, choose and be positioned at No. seven coordinate points D1 of different line segments, No. eight coordinate points D2, then connect coordinate points D1, No. eight coordinate points D2 No. seven.
Claims (9)
1. a graphical passwords guard method, the method comprises the method to set up of graphical passwords, the verification method of graphical passwords, it is characterized in that:
The method to set up of described graphical passwords comprises the following steps successively:
A1: first send the instruction of graphical passwords is set to processor, then shown several default geometric figures by processor according to this instruction on its display interface;
A2: select the wherein width geometric figure showing on display interface as the fundamental figure of graphical passwords, and this fundamental figure is set as to the first graphical passwords;
A3: first change the structure of fundamental figure to form amended figure, again this amended figure is set as to second graph password, now, complete the setting of graphical passwords, wherein, the structure of described change fundamental figure comprises at least one operation in the point on point, the connection fundamental figure dragging on fundamental figure.
2. a kind of graphical passwords guard method according to claim 1, is characterized in that: described geometric figure is plane or the solid geometry figure that is arranged in coordinate dot matrix.
3. a kind of graphical passwords guard method according to claim 2, is characterized in that: described in drag that point on fundamental figure comprises the end points that drags on fundamental figure, at least one operation in the coordinate points that drags non-end points on fundamental figure.
4. a kind of graphical passwords guard method according to claim 3; it is characterized in that: described in the end points that drags on fundamental figure comprise at least 1 basic operation; this basic operation refers to: an end points (B1) to the coordinate points (B2) in coordinate dot matrix that drags arbitrary line segment on fundamental figure is located; now, the new line segment that the former line segment at end points (B1) place is connected to form by another end points by former line segment and a coordinate points (B2) replaces.
5. a kind of graphical passwords guard method according to claim 3, is characterized in that: described in drag coordinate points that the coordinate points of non-end points on fundamental figure comprises non-end points on the curve that drags fundamental figure, at least one operation on the straight-line segment that drags fundamental figure in the coordinate points of non-end points.
6. a kind of graphical passwords guard method according to claim 5, it is characterized in that: described in drag non-end points on the curve of fundamental figure coordinate points comprise at least 1 basic operation, this basic operation refers to: first select and be positioned at No. two coordinate points (a) non-adjacent on arbitrary curve of fundamental figure, No. three coordinate points (b), then drag and on this curve, be positioned at No. two coordinate points (a), No. four coordinate points (c) between No. three coordinate points (b) to No. five coordinate points (d) in coordinate dot matrix are located, now, on this curve with No. two coordinate points (a), the segment of curve (ab) that No. three coordinate points (b) are end points is connected No. two coordinate points (a) successively, No. five coordinate points (d), the broken line (adb) that No. three coordinate points (b) form replaces.
7. a kind of graphical passwords guard method according to claim 5, it is characterized in that: described in drag non-end points on the straight-line segment of fundamental figure coordinate points comprise at least 1 basic operation, this basic operation refers to: non-end points coordinate points (C1) to No. six coordinate points (C2) in coordinate dot matrix that drag on arbitrary straight-line segment of fundamental figure are located, now, between two-end-point on this straight-line segment and No. six coordinate points (C2), form the broken line take No. six coordinate points (C2) as break, and the former line segment at non-end points coordinate points (C1) place is replaced by described broken line, wherein, No. six coordinate points (C2) are positioned at outside the former line segment at non-end points coordinate points (C1) place.
8. a kind of graphical passwords guard method according to claim 2; it is characterized in that: the point on described connection fundamental figure comprises at least 1 basic operation; this basic operation refers to: first on fundamental figure, choose No. seven coordinate points (D1), No. eight coordinate points (D2) that are positioned on different line segments, then connect No. seven coordinate points (D1), No. eight coordinate points (D2).
According to claim 1 ?a kind of graphical passwords guard method described in any one in 8, it is characterized in that the verification method of described graphical passwords comprises the following steps successively:
First step checking: user first sends the instruction of verification pattern password to processor, on its display interface, shown again a width geometric figure according to this instruction by processor, then user compares this geometric figure and the first graphical passwords, enter second step checking if this geometric figure is consistent with the first graphical passwords, if inconsistent the stopping of this geometric figure and the first graphical passwords verified;
Second step checking: on change display interface, geometric structure is to form tablet pattern, and confirm this tablet pattern to input as authentication password, then processor is compared this tablet pattern and second graph password, if tablet pattern prompting consistent with graphical passwords is by password authentification, if tablet pattern and the inconsistent prompt cipher of second graph password authentication failed, now, the checking of graphical passwords completes, wherein, on described change display interface, geometric structure comprises the point dragging on geometric figure, connect at least one operation in the point on geometric figure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410040065.9A CN103810415B (en) | 2014-01-28 | 2014-01-28 | A kind of graphical passwords guard method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410040065.9A CN103810415B (en) | 2014-01-28 | 2014-01-28 | A kind of graphical passwords guard method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103810415A true CN103810415A (en) | 2014-05-21 |
CN103810415B CN103810415B (en) | 2016-08-03 |
Family
ID=50707171
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410040065.9A Expired - Fee Related CN103810415B (en) | 2014-01-28 | 2014-01-28 | A kind of graphical passwords guard method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103810415B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104156655A (en) * | 2014-05-28 | 2014-11-19 | 东莞盛世科技电子实业有限公司 | Ambiguous password check method and password check equipment |
CN105279424A (en) * | 2015-11-02 | 2016-01-27 | 厦门雅迅网络股份有限公司 | Pattern password intensity recognition method and device |
CN108009419A (en) * | 2017-11-24 | 2018-05-08 | 咪咕文化科技有限公司 | A kind of authentication method of graphical passwords, device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090046929A1 (en) * | 2007-08-13 | 2009-02-19 | Sony Ericsson Mobile Communications Ab | Image-based code |
CN101676926A (en) * | 2008-09-16 | 2010-03-24 | 深圳富泰宏精密工业有限公司 | Touch type electronic equipment and its authority control method |
CN102243754A (en) * | 2010-05-11 | 2011-11-16 | 汤姆森特许公司 | Method and a device for generating a secret value |
CN102279910A (en) * | 2010-06-11 | 2011-12-14 | 鸿富锦精密工业(深圳)有限公司 | Device with encryption and decryption functions and encrypting and decrypting methods of device |
CN102521550A (en) * | 2011-12-09 | 2012-06-27 | 鸿富锦精密工业(深圳)有限公司 | Electronic device with file encryption function and method thereof |
-
2014
- 2014-01-28 CN CN201410040065.9A patent/CN103810415B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090046929A1 (en) * | 2007-08-13 | 2009-02-19 | Sony Ericsson Mobile Communications Ab | Image-based code |
CN101676926A (en) * | 2008-09-16 | 2010-03-24 | 深圳富泰宏精密工业有限公司 | Touch type electronic equipment and its authority control method |
CN102243754A (en) * | 2010-05-11 | 2011-11-16 | 汤姆森特许公司 | Method and a device for generating a secret value |
CN102279910A (en) * | 2010-06-11 | 2011-12-14 | 鸿富锦精密工业(深圳)有限公司 | Device with encryption and decryption functions and encrypting and decrypting methods of device |
CN102521550A (en) * | 2011-12-09 | 2012-06-27 | 鸿富锦精密工业(深圳)有限公司 | Electronic device with file encryption function and method thereof |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104156655A (en) * | 2014-05-28 | 2014-11-19 | 东莞盛世科技电子实业有限公司 | Ambiguous password check method and password check equipment |
WO2015180235A1 (en) * | 2014-05-28 | 2015-12-03 | 东莞盛世科技电子实业有限公司 | Ambiguous password checking method and password checking device |
CN104156655B (en) * | 2014-05-28 | 2017-03-08 | 东莞盛世科技电子实业有限公司 | Ambiguity cryptographic check method and cryptographic check equipment |
CN105279424A (en) * | 2015-11-02 | 2016-01-27 | 厦门雅迅网络股份有限公司 | Pattern password intensity recognition method and device |
CN105279424B (en) * | 2015-11-02 | 2020-09-11 | 厦门雅迅网络股份有限公司 | Method and device for identifying strength of graphic password |
CN108009419A (en) * | 2017-11-24 | 2018-05-08 | 咪咕文化科技有限公司 | A kind of authentication method of graphical passwords, device and storage medium |
CN108009419B (en) * | 2017-11-24 | 2020-12-22 | 咪咕文化科技有限公司 | Authentication method and device of graphic password and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN103810415B (en) | 2016-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9760707B2 (en) | Unlocking electronic devices using touchscreen input gestures | |
US10318717B2 (en) | Message display method and apparatus | |
US9507928B2 (en) | Preventing the discovery of access codes | |
US9514297B2 (en) | Systems and methods for gesture lock obfuscation | |
CN103200011B (en) | A kind of cipher authentication method and device | |
US10885164B2 (en) | Login process for mobile phones, tablets and other types of touch screen devices or computers | |
EP2443581A1 (en) | Graphical authentication | |
US20140366127A1 (en) | Touchscreen security user input interface | |
CN104516645A (en) | Electronic device unlocking method | |
CN103996011A (en) | Method and device for protecting codes to be input safely | |
CN103136462B (en) | A kind of method and system of password authentification | |
CN102957688A (en) | Password input and verification method and device | |
CN105095730A (en) | Method and device for controlling electronic device/unlocking hand-held terminal and electronic device | |
CN103810415A (en) | Graphical password protection method | |
CN105354458B (en) | Password Input verification method and system | |
CN104680376B (en) | A kind of Transaction Information verification method and device | |
CN106302344B (en) | Security sweep method and system | |
CN104794392A (en) | Equipment unlocking method and device based on grids | |
CN105447373A (en) | Password authentication method and device | |
CN106033505A (en) | Unlock method, unlock code setting method and device | |
KR20120092779A (en) | Gestures on the touch screen of the encrypted login | |
KR101648779B1 (en) | Method for secure text input in information terminal | |
CN105323752A (en) | Mobile device, and method of authenticating user | |
CN106682462A (en) | Touch screen unlocking method and terminal | |
TW201602822A (en) | Electronic device and screen uncocking method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160803 Termination date: 20180128 |
|
CF01 | Termination of patent right due to non-payment of annual fee |