WO2019137489A1 - Password input method, device, and computer-readable storage medium - Google Patents

Password input method, device, and computer-readable storage medium Download PDF

Info

Publication number
WO2019137489A1
WO2019137489A1 PCT/CN2019/071412 CN2019071412W WO2019137489A1 WO 2019137489 A1 WO2019137489 A1 WO 2019137489A1 CN 2019071412 W CN2019071412 W CN 2019071412W WO 2019137489 A1 WO2019137489 A1 WO 2019137489A1
Authority
WO
WIPO (PCT)
Prior art keywords
icon
password
user
icons
group
Prior art date
Application number
PCT/CN2019/071412
Other languages
French (fr)
Chinese (zh)
Inventor
于君
Original Assignee
于君
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 于君 filed Critical 于君
Publication of WO2019137489A1 publication Critical patent/WO2019137489A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text

Definitions

  • the present invention relates to the field of user information security technologies, and in particular, to a password input method, device, and computer readable storage medium.
  • embodiments of the present invention are intended to provide a password input method, apparatus, and computer readable storage medium.
  • an embodiment provides a password input method, including:
  • each of the first icon groups includes a plurality of different icons
  • An icon in each of the first icon groups is a user-preset password icon
  • an embodiment provides a password input device, the device comprising:
  • a first generating unit configured to generate a plurality of first icon groups and generate different random character segments for each icon in each first icon group; wherein each of the first icon groups includes multiple Each of the different icons, each of the icons in the first icon group is a user-preset password icon;
  • a display unit configured to sequentially display the plurality of first icon groups, and display random segments corresponding to the respective icons in the first icon group in a preset position in the corresponding icon; wherein each Each icon in the first icon group is arranged according to a preset position rule;
  • the input unit receives the character segment input by the user during each first icon group display process
  • a data processing unit configured to compare a character segment input by the user with a random character segment corresponding to the password icon in the currently displayed first icon group, determine a comparison result, and trigger the display module to display the next first
  • the icon group is also used when all the first icon groups are displayed, and the character segments input by the user in each of the first icon group display are the same as the passwords in the first icon group displayed at the time.
  • the random character segment corresponding to the icon is the same, it is determined that the user input password is correct.
  • a computer readable storage medium comprising a program for execution by a processor to implement the first aspect and any of the above The method described in the item.
  • the icon form password used in the embodiment of the present invention has at least the following advantages:
  • the password consists of graphic icons such as “eggplant”, “monkey”, “racquet” and “bike”. It is not only easy to remember, but also easy to remember in the process of password verification many times, and it is easy to remember for a long time. Even if you can't think of it for a while, it is easy to recall the icon in the icon group when you enter the password authentication step, recalling the memory and recalling it.
  • the password in the form of an icon is very simple to remember, and the security of the icon password is very high due to the special password input method. This is because each time the password is entered, the system will All the icons in the code generate a random character segment, and the user can only be determined by the system to select the correct password icon when inputting the same character segment as the random character segment of the password icon. In this case, due to the limitation of the physiological ability of the human eye, the same person cannot simultaneously observe and record the finger movements when the user inputs the password and all the random character segments of each icon group on the screen, and thus cannot be accurately observed and recorded. Which icon on the screen corresponds to the random character segment that the user enters each time.
  • the technical solution provided by the embodiment of the present invention can completely eliminate the possibility of malicious voyeurism of others, thereby avoiding the personal information, data leakage and property loss caused by the password leakage to the user, and is difficult for the traditional password.
  • Forgetting voyeurism this long-disturbing world puzzle has provided a powerful means of cracking.
  • 1 is a flow chart of an encryption input method of the present invention in an embodiment
  • FIG. 2 is a partial flow chart of another embodiment of the password input method of the present invention.
  • FIG. 3 is a structural block diagram of a password input device of the present invention in an embodiment
  • FIG. 4 is a structural block diagram of a password input device of the present invention in a second embodiment
  • FIG. 5 is a schematic diagram showing the basic structure of a password input device of the present invention in an embodiment
  • FIG. 6 is a schematic diagram showing the basic structure of a password input device of the present invention in a second embodiment
  • FIG. 7 is a schematic diagram showing the basic structure of a password input device of the present invention in a third embodiment
  • FIG. 8 is a schematic diagram showing the basic structure of a password input device of the present invention in a fourth embodiment
  • FIG. 9 is a schematic diagram showing the basic structure of a password input device of the present invention in a fifth embodiment.
  • FIG. 10 is a schematic diagram showing the basic structure of a password input device of the present invention in a sixth embodiment
  • FIG. 11 is a schematic diagram showing the basic structure of a password input device of the present invention in a seventh embodiment
  • FIG. 12 is a schematic diagram showing the basic structure of the cipher input device of the present invention in the eighth embodiment.
  • a first embodiment of the present invention provides a password input method. Referring to FIG. 1, the method includes:
  • Step 101 Generate a plurality of first icon groups, and generate different random character segments for each icon in each first icon group;
  • Each of the first icon groups includes a plurality of different icons, and one icon in each of the first icon groups is a password icon preset by the user;
  • the icon is a still image or a moving image.
  • icon group refers to a set of icons that are displayed at the same time, which are distributed in an ordered or unordered manner, or a static or dynamic picture that contains a plurality of virtual regions that serve as icons;
  • the picture referred to here may even be a blank picture in which each virtual area acting as an icon has a fixed specific position.
  • each icon in the first icon group includes but is not limited to the following types or combinations of multiple types:
  • Each of the first icon groups consists of a plurality of partial regions in the image that have no exact boundaries and shapes but have exact approximate positional features.
  • the first icon group is a plurality of partial regions constituting a whole picture, and the shape of each of the partial regions may be regular or irregular.
  • the random character segment may be a track composed of a straight line and/or a curve
  • the character segment may also be a combination of characters. Specifically, it may be a combination of at least one type of characters including but not limited to:
  • the trajectory composed of the straight line and/or the curve is displayed on or near the area where each icon in the first icon group is located, and is used to indicate that the user inputs the same or similar trajectory through the touch screen or the electronic drawing board.
  • the character segment must contain at least one character. Of course, in order to increase the difficulty of voyeurism, it is best to use multiple characters.
  • the random character segment refers to a character segment that is randomly generated and has a corresponding relationship with a specific icon in only one display; when the specific icon is displayed again, another random character segment that still has only one correspondence with each other is generated. . That is to say, each time the password authentication is entered, these random segments are regenerated and only valid during the current authentication process.
  • step 101 before or after step 101, the following password icon setting or modification steps are also included:
  • each second icon group includes multiple icons that are different from each other;
  • steps S201-S204 only distinguish different steps, and are not used to limit the sequence of execution of each step.
  • first icon group and the second icon group are only used to distinguish the icon groups in different operation steps, and are not used to define or distinguish the first icon group and the second.
  • the contents of the drawing group and the arrangement position of the icons are only used to distinguish the icon groups in different operation steps, and are not used to define or distinguish the first icon group and the second.
  • each first icon group and each second icon group of the corresponding order may be identical, corresponding to each icon content and position in each icon group. It is also identical.
  • first icon group and the second icon group may also be different, and each second icon group only needs to include at least one password icon appearing in the corresponding one of the first icon groups. Just fine.
  • each icon in the second icon group includes but is not limited to the following types or combinations of multiple types:
  • Each of the second icon groups may be composed of a plurality of partial regions of the image that have no exact boundaries and shapes but have exact approximate positional features.
  • the second icon group is a plurality of partial regions constituting a whole picture, and the shape of each of the partial regions may be regular or irregular.
  • the user can set a password.
  • the password set by the user is composed of a plurality of icons selected by the user.
  • the order of the multiple icons is set as needed.
  • the order in which the icons are determined may be used as the order of the icons in the icon password, or the order may not be specified; if the order is not specified It is necessary to ensure that the various icons that make up the icon password are different from each other.
  • each icon in the icon password may have the same icon or may be different.
  • all the icons of all the icon groups are preferably different from each other, and grouped into the same icon group according to the content characteristics of the icon. For example, all animal icons are classified into one icon group containing only animals, and no animals in other icon groups.
  • the icons in each second icon group generated in step S201 are different, but allowed in different icon groups.
  • the user can select the appropriate icon as the password icon in the second icon group currently displayed according to his own needs, so that the password icon selected by the user may have two or more pictures. In the same case, the selected icons may be different.
  • the icons in each second icon group generated in step S201 are different, and the different icon groups are not in the same. Allow the same icon to appear, so that when the user selects the appropriate icon as the password icon in the second icon group currently displayed according to his own needs, each icon in the selected password icon does not The same, the same situation does not exist.
  • Step 102 Display a plurality of first icon groups in sequence, and display a random character segment corresponding to each icon in the first icon group in a preset position in the corresponding icon; wherein each first Each icon in the icon group is arranged according to a preset position rule;
  • the plurality of first icon groups may be displayed in a random order, or may be displayed in a preset order, depending on whether the password icon set by the user has a sequence requirement. If the password icon set by the user has an order requirement, the password icons in the plurality of first icon groups correspond to the order of the password icons constituting the user password, and at this time, the plurality of first icon groups Must be displayed in the order of the password icon. If the password icons set by the user are not sequentially required, the password icons in the plurality of first icon groups may be displayed in a random order, or may be displayed in any prescribed order.
  • the first icon group is identical to the second icon group, and the user cannot change the order and content of the icon group.
  • the password icon is selected, and the position of any icon cannot be changed. All users are faced with the same standard icon group that cannot be changed.
  • the random character segment corresponding to each icon may be displayed as close as possible to the peripheral position of the icon to which it belongs or directly to the region where the icon is located.
  • the size of the random character segment can be designed to be significantly smaller than the display size of the icon, as long as the user can recognize it by the naked eye.
  • Step 103 Receive a character segment input by a user in each first icon group display process
  • the "input” mentioned here may be input through a physical keyboard or a virtual keyboard, or may be a pen, a finger click on a touch screen, a stroke drawing or a gesture drawing input, or may be input through a voice, or may be passed through The movement and positioning input of the observation focus of the human eye detected on the screen by the photoelectric recognition and sensing device.
  • the character segment input by the user may be a letter, a number, a symbol typed on a physical keyboard or a virtual keyboard, a sliding track input by a pen or a finger on a touch screen, or a letter corresponding to a note input by voice.
  • the user when the user inputs the random character segments that are observed above or next to each password icon, the user can input the correct password input result.
  • each random character segment typed by the user during the password operation process may be observed and recorded by the person next to it, since these random character segments are only valid once, it is useless to write down.
  • the next time the user enters the password input operation he can still enter the other set of random character segments displayed next to each of the password icons observed by the user in the eyes of the public, without worrying about the voyeur record of others.
  • Passwords with unrestricted digits are used as passwords. There is no problem that traditional passwords are limited by the number of digits. Therefore, when applied in highly confidential situations such as military finance, a very high level of password security can be obtained. For example, if each first icon group contains 20 lines and 20 columns and a total of 400 icons, and a set of passwords contains 8 password icons, the encryption level can reach an astronomical number of 6.5536e+20, and 8 have The icon of meaning is still easy to remember. Of course, the more important thing is that you are not afraid of voyeurism.
  • Step 104 Compare the character segment input by the user with the random character segment corresponding to the password icon in the currently displayed first icon group, determine the comparison result, and send the next first icon group to the user. ;
  • the user selects an icon corresponding to the icon password set by himself (that is, the password icon in the currently displayed page) in the currently displayed first icon group, and inputs the figure.
  • the character corresponding to the current random character segment when the icon corresponding to the random character segment input by the user is a password icon, it is determined that the user input is correct this time, but unless the user has correctly input all the character segments, the system will not Make any prompts to the user, but continue to send the next first icon group to the user before the user's full icon password is entered.
  • the character segment input by the user is different from the random character segment corresponding to the password icon in the currently displayed first icon group, it is determined that the user inputs the password error, but displays in all the first icon groups. Before the completion, the next first icon group is still sent to the user and the character segment input by the user is received. Only when the last first icon group is displayed and the user ends the password input operation, the user returns a password input error message.
  • Step 105 When the character segment input by the user in each first icon group display process is the same as the random character segment corresponding to the password icon in the first icon group displayed at the time, the user is determined to input the password. correct.
  • steps 103-105 are only used to distinguish different steps, and are not used to limit the sequence of execution of each step; in fact, there is no strict sequence between the three steps.
  • the method further includes:
  • the random character segments corresponding to the respective icons are divided into a plurality of parts, and the respective parts are sequentially displayed according to a preset time interval.
  • the display interval of each part can be set according to actual needs, and the dwell time of each part during display can also be set according to actual needs.
  • each random character segment can be decomposed into a plurality of different parts, and each of the decomposed characters is displayed in different time periods.
  • the complete temporary character segment can still be observed by the visual persistence phenomenon, and the electronic camera device used for the sneak shot is difficult to take a full picture due to the limitation of the progressive or interlaced scanning principle of the camera device. Or record a random character segment.
  • the password in the form of an icon is very simple to remember, and the privacy of the icon password is very high due to the special password input method.
  • the system will map each figure in the password.
  • the character will generate a random character segment, and the user can input the correct password icon only when the input character segment is correct.
  • the same person cannot simultaneously observe and record the finger when the user inputs the password.
  • the action and all the random segments of each icon group on the screen cannot accurately observe and record which icon on the screen corresponds to the random segment that the user inputs each time. Therefore, the technical solution provided by the embodiment of the present invention can almost completely eliminate the possibility of malicious peek of others, thereby avoiding personal information, data leakage and property loss caused by the password leakage to the user.
  • a second embodiment of the present invention provides a password input device, where the device includes:
  • a first generating unit 31 configured to generate a plurality of first icon groups and generate different random character segments for each icon in each first icon group; wherein each of the first icon groups includes multiple Each of the different icons, one of the icons in the first icon group is a user-preset password icon;
  • a display unit 32 configured to sequentially display the plurality of first icon groups, and display random character segments corresponding to the respective icons in the first icon group in a preset position in the corresponding icon;
  • Each icon in a first icon group is arranged according to a preset position rule;
  • the input unit 33 receives the character segment input by the user during each first icon group display process
  • the data processing unit 34 is configured to compare the character segment input by the user with the random character segment corresponding to the password icon in the currently displayed first icon group, determine the comparison result, and trigger the first display module 32 to display The next first icon group; also used when all the first icon groups are displayed, and the character segments input by the user in each of the first icon group display are the same as the first icon displayed at the time. When the random character segment corresponding to the password icon in the group is the same, it is determined that the user input password is correct.
  • the device further includes:
  • a second generating unit 35 configured to generate a plurality of second icon groups; wherein each second icon group includes multiple icons;
  • the display unit 32 is configured to sequentially display the plurality of second icon groups
  • the input unit 33 is configured to receive, during each second icon group display process, selection information of the user for any one of the second icon groups;
  • the setting unit 36 is configured to determine each icon selected by the user as a password icon, and form a plurality of password icons into the password of the user.
  • the data processing unit 34 is configured to determine that the character segment input by the user is different from the random character segment corresponding to the password icon in the first icon group displayed at the time. At the same time, it is determined that the user inputs a password error, and determines whether all of the first icon groups are all displayed. If not, the next first icon group is sent to the user, and the last first icon group is displayed and ends. After the segment receiving step, the user sends a prompt message indicating that the password is entered incorrectly;
  • the character segment is a track composed of a straight line and/or a curve, or includes but is not limited to the following combinations of at least one type of character:
  • the display unit 32 is specifically configured to split the random character segments corresponding to the respective icons into a plurality of parts, and sequentially display the respective parts according to a preset time interval.
  • the icon is a static image or a dynamic image
  • the content included in the icon includes but is not limited to the following types or a combination thereof:
  • Each of the first icon group or the second icon group may be composed of a plurality of partial regions in the image that have no exact boundaries and shapes but have exact approximate positional features.
  • the password input device provided by the embodiment of the present invention further includes the following technical features:
  • the display unit 32 is a display unit that provides only a single viewing angle.
  • a display unit that provides only a single viewing angle includes the "anti-spy screen” technology that is covered in front of the electronic display screen in the prior art, and also includes a well-shaped deep hole grid covering the front of the electronic display screen.
  • the prior art of narrowing the viewing angle formed by the screen also includes an electronic display technology that itself has a narrow viewing angle.
  • Fig. 5 is a schematic diagram showing the basic structure of a password input device.
  • the device includes a display screen 1 as a display unit and a keyboard 2 as an input unit.
  • Display 1 shows an icon group of icon 3 containing 30 graphic symbols.
  • a random character segment 4 is displayed next to each icon 3.
  • the keyboard 2 includes a 10-digit character button 5 of 0 to 9 and an enter key 6 and a backspace key 7.
  • the password set by the user in advance through the setting unit is four optional icons 3. These four icons 3 are selected by the user from the four icon groups. The icon 3 in all icon groups is not repeated.
  • the four icon groups 3 are displayed to the user four times in a predetermined fixed order, and the corresponding random character segment 4 is displayed at the lower right corner of the area where each icon 3 is located.
  • the 30 random character segments 4 displayed on the same screen are non-repeating 3-digit numbers.
  • the user visually observes and determines a random character segment in the lower right corner of the first password icon that is preset in the icon group, and presses the random character segment on the keyboard 2 and presses Enter key 6. If you feel that the input is wrong, you can press the backspace key 7 to modify it.
  • the system automatically swipes and displays the second icon group.
  • the user repeats the previous operation, and types a random character segment that is considered to belong to the lower right corner of the second password icon that he presets, and then presses the enter key 6 to call up the third icon group. .
  • the user repeats the previous operation, types the random character segment next to the third password icon that he thinks belongs to him, and presses the enter key 6 to call up the fourth icon group.
  • the user repeats the previous operation, typing a random character segment next to the fourth password icon that he/she thinks belongs to him, and then pressing the Enter key 6.
  • the system will determine that the user password is entered correctly and enter the normal program afterwards. If the user's previous input has an error, the system will display a prompt message indicating that the password is not entered correctly.
  • the display screen and the keyboard may be separate electronic components that are connected to each other by wired or wireless communication, or may be virtual keyboards that are displayed on the same screen in the same touch screen.
  • the icon 3 is a variety of graphics and icons that have unique features that are easy to identify, distinguish, and remember. These graphics or icons can be static or dynamic.
  • the user can set the display rule of the random character segment by setting the unit.
  • the setting can be made: when the user types the first numeric character, the system makes the current icon group All random characters that are being displayed disappear immediately, or all the contents of the current icon group disappear together until they press the preset number of digits or press the Enter key to display the next icon group. For example, when the user presses the third number, instead of pressing the enter key 6, the system automatically displays the next icon group.
  • FIG. 6 is a schematic diagram showing the basic structure of a second type of password input device.
  • the icon 3 displayed by the password input device is composed of Chinese characters. Of course, it can also be composed of words in other languages, such as English words.
  • the advantage of this type of text icon is that it is easy to describe, document, and inform others.
  • password content is easy to tell others, and sometimes it is a disadvantage.
  • FIG. 7 is a schematic diagram of the basic structure of a third type of password input device, and the icon 3 is in the form of an English letter. This method is relatively simple, but because of the limited number of letters, the encryption strength of the password is relatively low, which is more suitable for the access control environment of ordinary buildings.
  • FIG. 8 is a schematic diagram showing the basic structure of a fourth type of password input device. Similar to FIG. 7, the icon 3 is also in the form of an English letter. However, the random character segment next to the icon adopts a single gesture pattern, and the password input device adopts a touch input panel with a touch-slidable input gesture pattern. Obviously, multiple gesture patterns can also be used to form a random character segment.
  • a single artwork can also be used as the icon group, and the screen regions where some random character segments at a plurality of fixed positions are arranged in an irregular distribution manner are used as icons.
  • This icon has no exact boundary range and relies solely on the picture content characteristics of the location as a condition for user memory and search. This kind of icon is more in line with the physiological memory characteristics of the human brain. Because people mark tokens in specific locations in their familiar picture environment, it's easier to remember and search. When entering the password input step, the user only needs to search for a random character segment of the screen position belonging to his "password icon" in his memory, and then accurately input the content of the random character segment.
  • the password input device uses a keyboard containing 26 English letters and an enter key and a backspace key.
  • the original keyboard is the keyboard used to operate the password.
  • the advantage of this full-letter keyboard is that it is more suitable for entering random segments in a fast and accurate way.
  • the fast blind play method is less likely to be sneaked and memorized by bystanders.
  • the random character segment in this embodiment adopts a multiple display manner with a time difference.
  • the display state of the second time of all the random character segments in the above icon group picture is displayed, and all the random character segments display only the second letter.
  • the display state of the third time of all the random character segments in the above icon group picture is displayed, and all the random character segments only display the third letter.
  • the interval between the above three times can be set to about 0.3 seconds, and is continuously displayed for about 0.1 second each time. Thus, a random segment of text will display a full cycle in approximately 1 second.
  • the advantage of this is that it is more difficult to observe, memorize or capture and capture the complete content of all random segments displayed on one screen, whether by the eye of the bystander or by the camera of the sneak shot.
  • each letter of each random character segment can also be displayed as a time difference of a plurality of frames in pixels of different blocks, so that the limitation of the principle of progressive scanning of digital images will make the digital camera more difficult. Capture complete and accurate content of random segments.
  • the operation of calling up the next icon group can be set to press a specific key such as the enter key or the space key, or can be set to the current icon group display, after the number of times exceeds the number of words of the set random character segment, Auto Steering displays the next icon group.
  • Step 1301 Generate three icon groups; each icon group includes multiple icons; the icons in each icon group are distributed according to a preset position rule;
  • Step 1302 Determine a display order of the three icon groups
  • Step 1303 displaying the first icon group in order
  • Step 1304 Receive selection information of a user for an icon in the first icon group.
  • Step 1305 determining the first icon selected by the user as the first password icon
  • Step 1306 Receive user selection information for one icon in the second icon group.
  • Step 1307 Determine the second icon selected by the user as the first password icon.
  • Step 1308 Receive user selection information for an icon in the third icon group.
  • Step 1309 Determine a third icon selected by the user as the first password icon.
  • Step 1310 Generate and save as a user password according to three icons selected by the user;
  • Each icon selected by the user is defined as a password icon
  • the password icon selected by the user forms the password of the user in a preset order rule
  • Step 1311 Enter a password input process to generate multiple icon groups
  • Each icon group contains a plurality of mutually different icons and one of them is a password icon preset by the user;
  • Step 1312 Display the first icon group in a preset order, and generate a random character segment corresponding to the first icon group;
  • Step 1313 Receive a first character segment input by a user.
  • Step 1314 comparing the first character segment input by the user with the random character segment corresponding to the first icon group, and determining the comparison result, proceeding to step 1315;
  • Step 1315 Display a second icon group in a preset order, and generate a random character segment corresponding to the second icon group;
  • Step 1316 Receive a second character segment input by a user.
  • Step 1317 comparing the second character segment input by the user with the random character segment corresponding to the second icon group, and determining the comparison result, proceeding to step 1318;
  • Step 1318 Display a third icon group in a preset order, and generate a random character segment corresponding to the third icon group;
  • Step 1319 Receive a third character segment input by a user.
  • Step 1320 comparing the third character segment input by the user with the random character segment corresponding to the third icon group, and determining the comparison result, proceeding to step 1321;
  • Step 1321 it is determined whether the character segments input by the user three times are the same as the random character segments corresponding to the password characters in the character group displayed at the time, if yes, go to step 1322, if not, proceed to step 1323;
  • Step 1322 determining that the user inputting the password is correct
  • Step 1323 Determine that the user inputs a password error, and returns a prompt information indicating that the password is incorrectly input to the user.
  • a third embodiment of the present invention provides a computer readable storage medium comprising a program for execution by a processor to implement the method of any of the above first aspects.
  • the program may be stored in a computer readable storage medium, and the storage medium may include: a read only memory, a random access memory, a magnetic disk, an optical disk, a hard disk, etc.
  • the computer executes the program to implement the above functions.
  • the program is stored in the memory of the device, and when the program in the memory is executed by the processor, all or part of the above functions can be realized.
  • the program may also be stored in a storage medium such as a server, another computer, a magnetic disk, an optical disk, a flash disk or a mobile hard disk, and may be saved by downloading or copying.
  • the system is updated in the memory of the local device, or the system of the local device is updated.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Provided are a password input method, a password input device, and a computer-readable storage medium; in said method, what is employed by a user is a password in the form of an icon, which is easy for the user to remember. When performing password authentication, a system generates a random character segment alongside all icons, including password icons. If the user sees and correctly enters the random character segments appearing in sequence alongside each password icon, then the system determines that the present password authentication is successful; otherwise, it determines that the authentication has failed. The random character segments inputted each time authentication is successful are different and valid only once; therefore, even if said segments are stolen, the password will not be leaked; accordingly, the secrecy strength of the password is greatly improved, and the likelihood of another person peeking at the password is nearly completely eliminated, preventing the defects, present in conventional password authentication means, of fear of prying, difficulty of memorizing the password, and ease of forgetting the password.

Description

一种密码输入方法、设备及计算机可读存储介质Password input method, device and computer readable storage medium 技术领域Technical field
本发明涉及用户信息安全技术领域,具体涉及一种密码输入方法、设备及计算机可读存储介质。The present invention relates to the field of user information security technologies, and in particular, to a password input method, device, and computer readable storage medium.
背景技术Background technique
为了保护用户个人信息、数据、财产的安全性,用户在很多计算机设备中进行登录或者操作时需要输入密码。In order to protect the security of users' personal information, data, and property, users need to enter a password when logging in or operating in many computer devices.
为了防止用户输入的密码被他人偷窥到,很多***会在用户输入密码时,将屏幕上密码输入框内用户输入的密码用无意义的特殊字符来代替。In order to prevent the password entered by the user from being peeked by others, many systems replace the password entered by the user in the password input box on the screen with a meaningless special character when the user inputs the password.
但是,这种方式存在以下弊端:However, this approach has the following drawbacks:
1、为了增加保密强度,用户往往将密码设置成不容易准确快速盲打的没有具体意义的长字符串,在这种情况下,当输入内容被特殊字符代替时,用户很容易因为记不清输到哪里而无法继续输入或输入错误;1. In order to increase the privacy intensity, users often set the password to a long string that is not easy to be accurately and quickly blinded. In this case, when the input content is replaced by a special character, the user is easy to remember. Where you can't continue typing or typing errors;
2、由于屏幕上密码输入框内只显示替代密码的特殊字符,因此,即使用户输入错误,也难以及时发现;2. Since only the special characters of the substitute password are displayed in the password input box on the screen, even if the user inputs an error, it is difficult to find it in time;
3、由于被隐藏的只是屏幕上的密码,而不能同时遮盖用户在键盘上操作时的手指动作,因此,这种方式仍不能避免旁人通过观察分析用户操作按键时的手指动作来获取密码。3. Since the hidden password is only the password on the screen, and can not cover the finger movement when the user operates on the keyboard at the same time, this method still cannot prevent others from obtaining the password by observing and analyzing the finger movement when the user operates the button.
针对上述问题,在银行环境中常用的措施是:在键盘上设置遮挡手指操作动作的遮罩。但遮罩的遮挡效果与用户操作难度之间存在矛盾,遮盖角度越大,隐秘效果越好,但对于用户来说操作难度也越高,影响用户体验。In response to the above problems, a common measure in the banking environment is to set a mask on the keyboard that blocks the finger operation. However, there is a contradiction between the occlusion effect of the mask and the user's operation difficulty. The larger the occlusion angle is, the better the hidden effect is, but the more difficult the operation is for the user, which affects the user experience.
在家庭和办公环境中,普通台式电脑、笔记本电脑的键盘上显然不便于设置遮罩,但这类环境中仍然有经常性的密码输入操作。In home and office environments, it is obviously not easy to set masks on the keyboards of ordinary desktop computers and laptops, but there are still frequent password input operations in such environments.
在手机屏幕上,也由于更难以隐藏手指的动作,而容易导致密码或者锁屏图案泄露。On the screen of the mobile phone, it is also more difficult to hide the movement of the finger, which easily leads to the leakage of the password or the lock screen pattern.
由于偷窥密码往往会带来可观的非法利益,因此,如何有效防止输入密码时被偷窥者盗取密码,已经成为亟待解决的社会问题。Since voyeuristic passwords often bring considerable illegal benefits, how to effectively prevent thieves from stealing passwords when entering passwords has become a social problem that needs to be solved urgently.
让人们忧虑的现实是:在隐蔽摄像设备易于获得的现代社会中,不法分子采用高技术手段偷窥密码已不是难事。这种手段往往让人防不胜防,普通的密码保护措施已经难以招架。The reality that worries people is that in modern society where covert camera equipment is readily available, it is not difficult for criminals to use high-tech means to peek into passwords. This kind of means is often unpredictable, and ordinary password protection measures have been difficult to parry.
为了提高破解难度,设置各类密码一般都被要求采用长字符段,并且可能还要包括大小写字母、数字以及特殊字符的组合。但这样复杂抽象的密码如何记忆,一直是让人们头痛的难题。In order to improve the difficulty of cracking, setting various types of passwords is generally required to use long characters, and may also include a combination of uppercase and lowercase letters, numbers, and special characters. But how to remember such complex and abstract passwords has always been a headache for people.
综上所述,在目前的各种密码输入环境中,都存在着密码容易泄露的问题。而且,密码所有者还难以确定自己的密码在输入操作时是否曾经被不法分子偷窥盗取,只能采用经常更换密码的方式来补救和预防。可是,符合难破解要求的密码本来就不容易记忆,频繁更换的结果会增加人们的记忆负担,更容易弄混和遗忘,使人更加苦恼。In summary, in the current various password input environments, there is a problem that passwords are easily leaked. Moreover, it is difficult for the password owner to determine whether his or her password has been sneaked and stolen by criminals during the input operation, and can only be remedied and prevented by frequently changing the password. However, passwords that meet the requirements of hard-to-crack are not easy to remember. The result of frequent replacements will increase people's memory burden, make them easier to mix and forget, and make people more distressed.
发明内容Summary of the invention
为了至少部分地解决现有技术存在的问题,本发明实施例期望提供一种密码输入方法、设备和计算机可读存储介质。In order to at least partially solve the problems of the prior art, embodiments of the present invention are intended to provide a password input method, apparatus, and computer readable storage medium.
根据第一方面,一种实施例中提供了一种密码输入方法,包括:According to a first aspect, an embodiment provides a password input method, including:
生成多个第一图符组,并针对每个第一图符组中的各个图符生成各不相同的随机字符段;其中,每一个第一图符组包括多个各不相同的图符,每一个第一图符组中的一个图符为用户预设的密码图符;Generating a plurality of first icon groups, and generating different random character segments for each icon in each of the first icon groups; wherein each of the first icon groups includes a plurality of different icons An icon in each of the first icon groups is a user-preset password icon;
依次显示所述多个第一图符组,并将与第一图符组中各个图符相对应的随机字符段显示于相应图符中的预设位置;其中,每一个第一图符组中的各个图符按照预设位置规则排布;Displaying the plurality of first icon groups in sequence, and displaying random character segments corresponding to the respective icons in the first icon group in a preset position in the corresponding icon; wherein each of the first icon groups Each icon in the arrangement is arranged according to a preset position rule;
在每一个第一图符组显示过程中,接收用户输入的字符段;Receiving a character segment input by a user during each first icon group display process;
将用户输入的字符段与当前所显示的第一图符组中的密码图符所对应的随机字符段进行比对,确定比对结果并向用户发送下一个第一图符组;Comparing the character segment input by the user with the random character segment corresponding to the password icon in the currently displayed first icon group, determining the comparison result and transmitting the next first icon group to the user;
当用户在每一个第一图符组显示过程中所输入的字符段均与当次所显示的第一图符组中的密码图符所对应的随机字符段相同时,确定用户输入密码正确。When the character segment input by the user in each first icon group display is the same as the random character segment corresponding to the password icon in the first icon group displayed at the time, it is determined that the user input password is correct.
根据第二方面,一种实施例中提供了一种密码输入设备,所述设备包括:According to a second aspect, an embodiment provides a password input device, the device comprising:
第一生成单元,用于生成多个第一图符组并针对每个第一图符组中的各个图符生成各不相同的随机字符段;其中,每一个第一图符组包括多个各不相同的图符,每一个第一图符组中的一个图符为用户预设的密码图符;a first generating unit, configured to generate a plurality of first icon groups and generate different random character segments for each icon in each first icon group; wherein each of the first icon groups includes multiple Each of the different icons, each of the icons in the first icon group is a user-preset password icon;
显示单元,用于对多个第一图符组依次进行显示,并将与第一图符组中各个图符相对应的随机字符段显示于相应图符中的预设位置;其中,每一个第一图符组中的各个图符按照预设位置规则排布;a display unit, configured to sequentially display the plurality of first icon groups, and display random segments corresponding to the respective icons in the first icon group in a preset position in the corresponding icon; wherein each Each icon in the first icon group is arranged according to a preset position rule;
输入单元,在每一个第一图符组显示过程中,接收用户输入的字符段;The input unit receives the character segment input by the user during each first icon group display process;
数据处理单元,用于将用户输入的字符段与当前所显示的第一图符组中的密码图符所对应的随机字符段进行比对,确定比对结果并触发显示模块显示下一个第一图符组;还用于当全部第一图符组显示完毕,且用户在每一个第一图符组显示过程中所输入的字符段均与当次所显示的第一图符组中的密码图符所对应的随机字符段相同时,确定用户输入密码正确。a data processing unit, configured to compare a character segment input by the user with a random character segment corresponding to the password icon in the currently displayed first icon group, determine a comparison result, and trigger the display module to display the next first The icon group is also used when all the first icon groups are displayed, and the character segments input by the user in each of the first icon group display are the same as the passwords in the first icon group displayed at the time. When the random character segment corresponding to the icon is the same, it is determined that the user input password is correct.
根据第三方面,一种实施例中提供了一种计算机可读存储介质,所述计算机可读存储介质包括程序,所述程序用于被处理器执行以实现如上述第一方面及其任一项所述的方法。According to a third aspect, a computer readable storage medium is provided in an embodiment, the computer readable storage medium comprising a program for execution by a processor to implement the first aspect and any of the above The method described in the item.
与现有技术相比,本发明实施例所采用的图符形式密码至少具备以下优点:Compared with the prior art, the icon form password used in the embodiment of the present invention has at least the following advantages:
1、容易记忆。对人类记忆的生理研究成果和生活经验都表明,相比抽象的无意义的由多位字母数字和符号组合成的传统“安全性高”的密码,人类大脑对记住由几个有意义、容易识别的图形图标组成的密码要容易得多。1, easy to remember. The physiological research results and life experiences of human memory have shown that compared to the abstract meaningless combination of multiple "alphabets" and symbols, the traditional "safety" passwords are remembered by the human brain. Passwords made up of easily identifiable graphic icons are much easier.
2、不易忘记。相比需要死记硬背枯燥无意义的类似“W#Ix-NbYk”这样的高强度安全密码,由“茄子”、“猴子”“球拍”、“自行车”这类的图形图标构成的密码,更符合人脑对有意义的形象类的事物容易记住的原理,不仅很容易记,而且在多次进行密码验证过程中还容易加深印象,长久难忘。即便一时想不起来,在进入密码认证步骤时也容易通过观察图符组中的图符,唤起记忆,回想起来。2, not easy to forget. Compared with the high-intensity security code like “W#Ix-NbYk”, which requires a rote and boring meaningless, the password consists of graphic icons such as “eggplant”, “monkey”, “racquet” and “bike”. It is not only easy to remember, but also easy to remember in the process of password verification many times, and it is easy to remember for a long time. Even if you can't think of it for a while, it is easy to recall the icon in the icon group when you enter the password authentication step, recalling the memory and recalling it.
3、不怕窥视。采用仅一次有用的随机字符段来间接点选密码图符,让偷窥者即便贴身观察并记下键入的所有字符,也难以获取密码内容。这样,输入密码时,人们就不必顾虑旁边是否有人偷窥了。3, not afraid to peep. Indirect inquiring of the password icon with only one useful random character segment makes it difficult for the voyeur to obtain the password content even if he or she looks at it and writes down all the characters typed. This way, when entering a password, people don't have to worry about whether someone is voyeating.
4、高强度的保密性。在应用中,若每个图符组包含10×10=100个图符,一个密码包含3个图符,那么,按特定顺序分三次显示的三组图符组,就可形成100万个可能的密码图符组。也就是说,用区区3个图形构成的密码,就可以达到百万级的加密强度。若采用6个图形,会达到万亿级别的加密强度,远高于6位数字字母和符号组成的传统密码。相比之下,数字键盘只有10位,常用的6数字密码的密级只有百万。4. High-intensity confidentiality. In the application, if each icon group contains 10×10=100 icons and a password contains 3 icons, then the three groups of icons displayed in three steps in a specific order can form 1 million possibilities. Password icon group. In other words, with a password consisting of three graphics, you can achieve a million-level encryption strength. If you use 6 graphics, you will achieve a trillion-level encryption strength, much higher than the traditional password composed of 6-digit alphanumeric characters. In contrast, the numeric keypad has only 10 digits, and the commonly used 6-digit password has a density of only one million.
基于本发明实施例所提供的技术方案,至少具有以下有益效果:The technical solution provided by the embodiment of the present invention has at least the following beneficial effects:
对于用户来说,图符形式的密码记忆起来非常简单,而且由于特殊的密码输入方法使得图符密码的安全性非常高,这是因为:每一次输入密码时,***会针对包括密码图符在内的所有图符生成随机字符段,用户只有在输入与密码图符的随机字符段完全相同的字符段时,才能被***确定为选择了正确的密码图符。这种情况下,由于人眼的生理能力限制,同一个人无法同时观察和记录用户输入密码时的手指动作和屏幕上的每个图符组的所有随机字符段,也就无法确切观察和记录下用户每次输入的随机字符段究竟对应屏幕上的哪一个图符。因此,本发明实施例所提供的技术方案几乎可以完全杜绝他人恶意偷窥的可能性,从而避免密码泄露对用户带来的个人信息、数据泄露及可能引发的财产损失,为传统密码“难记易忘怕偷窥”这个长久困扰人们的世界难题提供了 有力的破解手段。For the user, the password in the form of an icon is very simple to remember, and the security of the icon password is very high due to the special password input method. This is because each time the password is entered, the system will All the icons in the code generate a random character segment, and the user can only be determined by the system to select the correct password icon when inputting the same character segment as the random character segment of the password icon. In this case, due to the limitation of the physiological ability of the human eye, the same person cannot simultaneously observe and record the finger movements when the user inputs the password and all the random character segments of each icon group on the screen, and thus cannot be accurately observed and recorded. Which icon on the screen corresponds to the random character segment that the user enters each time. Therefore, the technical solution provided by the embodiment of the present invention can completely eliminate the possibility of malicious voyeurism of others, thereby avoiding the personal information, data leakage and property loss caused by the password leakage to the user, and is difficult for the traditional password. Forgetting voyeurism, this long-disturbing world puzzle has provided a powerful means of cracking.
附图说明DRAWINGS
图1是本发明密码输入方法在一种实施方式中的流程图;1 is a flow chart of an encryption input method of the present invention in an embodiment;
图2是本发明密码输入方法在另一种实施方式中的部分流程图;2 is a partial flow chart of another embodiment of the password input method of the present invention;
图3是本发明密码输入设备在一种实施方式中的结构框图;3 is a structural block diagram of a password input device of the present invention in an embodiment;
图4是本发明密码输入设备在第二种实施方式中的结构框图;4 is a structural block diagram of a password input device of the present invention in a second embodiment;
图5是本发明密码输入设备在一种实施方式中的基本结构示意图;5 is a schematic diagram showing the basic structure of a password input device of the present invention in an embodiment;
图6是本发明密码输入设备在第二种实施方式中的基本结构示意图;6 is a schematic diagram showing the basic structure of a password input device of the present invention in a second embodiment;
图7是本发明密码输入设备在第三种实施方式中的基本结构示意图;7 is a schematic diagram showing the basic structure of a password input device of the present invention in a third embodiment;
图8是本发明密码输入设备在第四种实施方式中的基本结构示意图;8 is a schematic diagram showing the basic structure of a password input device of the present invention in a fourth embodiment;
图9是本发明密码输入设备在第五种实施方式中的基本结构示意图;9 is a schematic diagram showing the basic structure of a password input device of the present invention in a fifth embodiment;
图10是本发明密码输入设备在第六种实施方式中的基本结构示意图;10 is a schematic diagram showing the basic structure of a password input device of the present invention in a sixth embodiment;
图11是本发明密码输入设备在第七种实施方式中的基本结构示意图;11 is a schematic diagram showing the basic structure of a password input device of the present invention in a seventh embodiment;
图12是本发明密码输入设备在第八种实施方式中的基本结构示意图。FIG. 12 is a schematic diagram showing the basic structure of the cipher input device of the present invention in the eighth embodiment.
具体实施方式Detailed ways
下面通过具体实施方式结合附图对本发明作进一步详细说明。其中不同实施方式中类似元件采用了相关联的类似的元件标号。在以下的实施方式中,很多细节描述是为了使得本申请能被更好的理解。然而,本领域技术人员可以毫不费力地认识到,其中部分特征在不同情况下是可以省略的,或者可以由其他元件、材料、方法所替代。在某些情况下,本申请相关的一些操作并没有在说明书中显示或者描述,这是为了避免本申请的核心部分被过多的描述所淹没,而对于本领域技术人员而言,详细描述这些相关操作并不是必要的,他们根据说明书中的描述以及本领域的一般技术知识即可完整了解相关操作。The present invention will be further described in detail below with reference to the accompanying drawings. Similar elements in different embodiments employ associated similar component numbers. In the following embodiments, many of the details are described in order to provide a better understanding of the application. However, those skilled in the art can easily recognize that some of the features may be omitted in different situations, or may be replaced by other components, materials, and methods. In some cases, some operations related to the present application have not been shown or described in the specification, in order to avoid that the core portion of the present application is overwhelmed by excessive description, and those skilled in the art will describe these in detail. Related operations are not necessary, they can fully understand the relevant operations according to the description in the manual and the general technical knowledge in the field.
另外,说明书中所描述的特点、操作或者特征可以以任意适当的方式结合形成各种实施方式。同时,方法描述中的各步骤或者动作也可以按照本领域技 术人员所能显而易见的方式进行顺序调换或调整。因此,说明书和附图中的各种顺序只是为了清楚描述某一个实施例,并不意味着是必须的顺序,除非另有说明其中某个顺序是必须遵循的。In addition, the features, operations, or characteristics described in the specification may be combined in any suitable manner to form various embodiments. At the same time, the various steps or actions in the method description can also be sequentially reversed or adjusted in a manner apparent to those skilled in the art. Therefore, the various sequences in the specification and the drawings are only for the purpose of describing a particular embodiment, and are not intended to
本文中为部件所编序号本身,例如“第一”、“第二”等,仅用于区分所描述的对象,不具有任何顺序或技术含义。而本申请所说“连接”、“联接”,如无特别说明,均包括直接和间接连接(联接)。The serial numbers themselves for the components herein, such as "first", "second", etc., are only used to distinguish the described objects, and do not have any order or technical meaning. As used herein, "connected" or "coupled", unless otherwise specified, includes both direct and indirect connections (joining).
实施例一 Embodiment 1
本发明实施例一提供了一种密码输入方法,参照图1,所述方法包括:A first embodiment of the present invention provides a password input method. Referring to FIG. 1, the method includes:
步骤101、生成多个第一图符组,并针对每个第一图符组中的各个图符生成各不相同的随机字符段;Step 101: Generate a plurality of first icon groups, and generate different random character segments for each icon in each first icon group;
其中,每一个第一图符组包括多个各不相同的图符,每一个第一图符组中的一个图符为用户预设的密码图符;Each of the first icon groups includes a plurality of different icons, and one icon in each of the first icon groups is a password icon preset by the user;
具体的,所述图符为静态图像或者动态图像。Specifically, the icon is a still image or a moving image.
上面所说的“图符组”是指包含有多个以有序或者无序方式分布的同时显示的图符集合,也可以是包含了多个充当图符的虚拟区域的静态或者动态图画;这里所说的图画甚至可以是空白的画面,在这幅空白的画面中,充当图符的每个虚拟区域具有固定的特定位置。The term “icon group” as used above refers to a set of icons that are displayed at the same time, which are distributed in an ordered or unordered manner, or a static or dynamic picture that contains a plurality of virtual regions that serve as icons; The picture referred to here may even be a blank picture in which each virtual area acting as an icon has a fixed specific position.
第一图符组中每一个图符所含的内容包括但不限于以下类型或者多个类型的组合:The content of each icon in the first icon group includes but is not limited to the following types or combinations of multiple types:
字符、数字、符号、图标、标志、图形或者图块。Characters, numbers, symbols, icons, logos, graphics, or tiles.
各个第一图符组由图像中的没有确切边界和形状但有确切的大致位置特征的多个局部区域组成。例如,第一图符组为构成一整幅画的多个局部区域,每一个局部区域的形状可以是规则的也可以是不规则的。Each of the first icon groups consists of a plurality of partial regions in the image that have no exact boundaries and shapes but have exact approximate positional features. For example, the first icon group is a plurality of partial regions constituting a whole picture, and the shape of each of the partial regions may be regular or irregular.
具体的,所述随机字符段可以为直线和/或曲线组成的轨迹;Specifically, the random character segment may be a track composed of a straight line and/or a curve;
所述字符段也可以为字符的组合,具体的,可以为包括但不限于以下至少 一种类型字符的组合:The character segment may also be a combination of characters. Specifically, it may be a combination of at least one type of characters including but not limited to:
数字、字母、符号。Numbers, letters, symbols.
所述直线和/或曲线组成的轨迹显示于第一图符组中的各个图符所在区域之上或者附近区域,用于指示用户通过触摸屏或电子画板方式输入相同或相近的轨迹。The trajectory composed of the straight line and/or the curve is displayed on or near the area where each icon in the first icon group is located, and is used to indicate that the user inputs the same or similar trajectory through the touch screen or the electronic drawing board.
所述字符段至少需包含一个字符。当然,为了增加偷窥难度,最好采用多个字符。The character segment must contain at least one character. Of course, in order to increase the difficulty of voyeurism, it is best to use multiple characters.
所述随机字符段是指随机产生并且仅在一次显示中与特定图符具有对应关系的字符段;该特定图符被再次显示时,将产生另一个与其仍然仅有一次对应关系的随机字符段。也就是说,每次进入密码认证时,这些随机字符段都是重新生成的,并且仅在当次认证过程中有效。The random character segment refers to a character segment that is randomly generated and has a corresponding relationship with a specific icon in only one display; when the specific icon is displayed again, another random character segment that still has only one correspondence with each other is generated. . That is to say, each time the password authentication is entered, these random segments are regenerated and only valid during the current authentication process.
参照图2,步骤101之前或者之后,还包括以下密码图符设置或修改步骤:Referring to FIG. 2, before or after step 101, the following password icon setting or modification steps are also included:
S201、生成多个第二图符组;其中,每一个第二图符组包括多个互不相同的图符;S201. Generate a plurality of second icon groups, where each second icon group includes multiple icons that are different from each other;
S202、依次显示所述多个第二图符组;S202. Display the plurality of second icon groups in sequence;
S203、在每一个第二图符组显示过程中,接收用户针对所述第二图符组中任意一个图符的选择信息;S203. Receive, in each second icon group display process, selection information of a user for any icon in the second icon group.
S204、将用户所选择的各个图符确定为密码图符,并将多个密码图符组成该用户的密码。S204. Determine each icon selected by the user as a password icon, and form a plurality of password icons to form a password of the user.
需要说明的是,步骤S201-S204只为对不同步骤进行区分,并不用于限制各步骤执行的先后顺序。It should be noted that steps S201-S204 only distinguish different steps, and are not used to limit the sequence of execution of each step.
还需要说明的是,所述第一图符组和第二图符组只用于对处于不同操作步骤中的图符组进行区分,而并不用于限定或者区分第一图符组和第二附图组的内容和图符排列位置。It should be noted that the first icon group and the second icon group are only used to distinguish the icon groups in different operation steps, and are not used to define or distinguish the first icon group and the second. The contents of the drawing group and the arrangement position of the icons.
当然,为了简化操作,在优选的实施方式中,对应顺序的每个第一图符组和每个第二图符组可以完全相同,相对应的每个图符组中各个图符内容和位置 也完全相同。Of course, in order to simplify the operation, in a preferred embodiment, each first icon group and each second icon group of the corresponding order may be identical, corresponding to each icon content and position in each icon group. It is also identical.
当然,除了上述方式之外,第一图符组和第二图符组也可以不相同,每个第二图符组只要至少包括一个出现在对应的一个第一图符组中的密码图符即可。Of course, in addition to the above manner, the first icon group and the second icon group may also be different, and each second icon group only needs to include at least one password icon appearing in the corresponding one of the first icon groups. Just fine.
上述方案中,第二图符组中每一个图符所含的内容包括但不限于以下类型或者多个类型的组合:In the above solution, the content of each icon in the second icon group includes but is not limited to the following types or combinations of multiple types:
字符、数字、符号、图标、标志、图形或者图块。Characters, numbers, symbols, icons, logos, graphics, or tiles.
各个第二图符组可以由图像中没有确切边界和形状但有确切的大致位置特征的多个局部区域组成。例如,第二图符组为构成一整幅画的多个局部区域,每一个局部区域的形状可以是规则的也可以是不规则的。Each of the second icon groups may be composed of a plurality of partial regions of the image that have no exact boundaries and shapes but have exact approximate positional features. For example, the second icon group is a plurality of partial regions constituting a whole picture, and the shape of each of the partial regions may be regular or irregular.
通过步骤S201-S204,用户即可设置密码。与现有技术不同的是,本发明实施例中,用户所设置的密码是由用户所选中的多个图符构成的。而多个图符的顺序则按照需要进行设定,比如,可以以图符确定的先后次序作为图符密码中各图符的顺序,或者,也可以不规定顺序;在不规定顺序的情况下需要保证构成图符密码的各个图符互不相同。而当多个图符之间规定先后顺序时,图符密码中的各个图符则可以有相同的图符,也可以各不相同。当然,为了更有助于加深记忆、唤起记忆和方便寻找,所有图符组的所有图符最好都互不相同,并且按图符的内容特点分组到同类图符组中。比如,所有动物图符都在归类到只包含动物的一个图符组内,其他图符组中则没有动物。Through steps S201-S204, the user can set a password. Different from the prior art, in the embodiment of the present invention, the password set by the user is composed of a plurality of icons selected by the user. The order of the multiple icons is set as needed. For example, the order in which the icons are determined may be used as the order of the icons in the icon password, or the order may not be specified; if the order is not specified It is necessary to ensure that the various icons that make up the icon password are different from each other. When a sequence is specified between multiple icons, each icon in the icon password may have the same icon or may be different. Of course, in order to help deepen memory, evoke memory and facilitate searching, all the icons of all the icon groups are preferably different from each other, and grouped into the same icon group according to the content characteristics of the icon. For example, all animal icons are classified into one icon group containing only animals, and no animals in other icon groups.
在一种可选实施方式中,在设定了密码图符顺序的情况下,步骤S201中所生成的每个第二图符组中的图符各不相同,但不同图符组中允许出现相同的图符,用户可以根据自己的需要在当前显示的第二图符组中选择适当的图符作为密码图符,这样,用户所选出的密码图符将可能存在有两个或以上图符相同的情况,也可能所选择的各个图符各不相同。In an optional implementation manner, in the case that the password icon sequence is set, the icons in each second icon group generated in step S201 are different, but allowed in different icon groups. The same icon, the user can select the appropriate icon as the password icon in the second icon group currently displayed according to his own needs, so that the password icon selected by the user may have two or more pictures. In the same case, the selected icons may be different.
在另一种可选实施方式中,在设定了密码图符顺序的情况下,步骤S201中所生成的每个第二图符组中的图符各不相同,不同图符组中也不允许出现相同 的图符,这样,当用户根据自己的需要在当前显示的第二图符组中选择适当的图符作为密码图符时,所选出的密码图符中的各个图符各不相同,不存在相同的情况。In another optional implementation manner, in the case that the password icon sequence is set, the icons in each second icon group generated in step S201 are different, and the different icon groups are not in the same. Allow the same icon to appear, so that when the user selects the appropriate icon as the password icon in the second icon group currently displayed according to his own needs, each icon in the selected password icon does not The same, the same situation does not exist.
步骤102、对多个第一图符组依次进行显示,并将与第一图符组中各个图符相对应的随机字符段显示于相应图符中的预设位置;其中,每一个第一图符组中的各个图符按照预设位置规则排布;Step 102: Display a plurality of first icon groups in sequence, and display a random character segment corresponding to each icon in the first icon group in a preset position in the corresponding icon; wherein each first Each icon in the icon group is arranged according to a preset position rule;
具体的,多个第一图符组可以按照随机顺序进行显示,也可以按照预设顺序进行显示,这取决于用户所设置的密码图符是否有顺序的要求。如果用户所设置的密码图符有顺序要求,则多个第一图符组中的密码图符与构成用户密码的密码图符的顺序是相对应的,这时,多个第一图符组必须按照密码图符的顺序进行显示。如果用户所设置的密码图符没有顺序要求,则多个第一图符组中的密码图符可以按照随机顺序进行显示,也可以按照任何规定的顺序进行显示。Specifically, the plurality of first icon groups may be displayed in a random order, or may be displayed in a preset order, depending on whether the password icon set by the user has a sequence requirement. If the password icon set by the user has an order requirement, the password icons in the plurality of first icon groups correspond to the order of the password icons constituting the user password, and at this time, the plurality of first icon groups Must be displayed in the order of the password icon. If the password icons set by the user are not sequentially required, the password icons in the plurality of first icon groups may be displayed in a random order, or may be displayed in any prescribed order.
为了对众多的不同用户采取标准化的统一密码图符认证界面和步骤,以有利于垄断化运营,减少人们在各种应用场合中被迫记忆各不相同的图符密码的负担,优选的方案是,第一图符组与第二图符组完全相同,用户不可变更图符组的顺序和内容。在设置密码时,只有选定密码图符,而不能改变任何图符的位置。所有用户面对的是完全相同不可变更的标准图符组。In order to adopt standardized unified password icon authentication interface and steps for many different users, in order to facilitate monopoly operation and reduce the burden of people being forced to memorize different icon passwords in various applications, the preferred solution is The first icon group is identical to the second icon group, and the user cannot change the order and content of the icon group. When setting a password, only the password icon is selected, and the position of any icon cannot be changed. All users are faced with the same standard icon group that cannot be changed.
具体的,与各个图符相对应的随机字符段可以显示在尽量贴近其所属图符的周边位置或者直接位于所属图符所在区域之上。为了提高偷窥和偷摄的技术难度,随机字符段的尺寸可以设计得比所属图符的显示尺寸明显更小,只要用户肉眼能够识别即可。Specifically, the random character segment corresponding to each icon may be displayed as close as possible to the peripheral position of the icon to which it belongs or directly to the region where the icon is located. In order to improve the technical difficulty of voyeurism and stealing, the size of the random character segment can be designed to be significantly smaller than the display size of the icon, as long as the user can recognize it by the naked eye.
步骤103、在每一个第一图符组显示过程中,接收用户输入的字符段;Step 103: Receive a character segment input by a user in each first icon group display process;
这里所说的“输入”可以是通过实体键盘、虚拟键盘的输入,也可以是笔、手指在触摸屏幕上的点击、笔画绘制或者笔势绘制输入,也可以是通过语音的输入,也可以是通过光电识别和传感装置检测到的人眼在屏幕上的观察焦点的移动和定位输入。The "input" mentioned here may be input through a physical keyboard or a virtual keyboard, or may be a pen, a finger click on a touch screen, a stroke drawing or a gesture drawing input, or may be input through a voice, or may be passed through The movement and positioning input of the observation focus of the human eye detected on the screen by the photoelectric recognition and sensing device.
用户输入的字符段,可以是通过实体键盘、虚拟键盘上键入的字母、数字、符号,也可以是笔、手指在触摸屏幕上输入的滑动轨迹,也可以是通过语音输入的音符所对应的字母、数字、符号,也可以是通过光电识别和传感装置输入的人眼在屏幕上的观察焦点所对应和触发的字母、数字、符号。The character segment input by the user may be a letter, a number, a symbol typed on a physical keyboard or a virtual keyboard, a sliding track input by a pen or a finger on a touch screen, or a letter corresponding to a note input by voice. The numbers, symbols, and letters, numbers, and symbols corresponding to and triggered by the observation focus of the human eye input through the photoelectric recognition and sensing device.
本发明实施例在应用时,用户只需依次输入其观察到的位于每个密码图符之上或者旁边的随机字符段,就能输入正确的密码输入结果。在这个过程中,虽然用户用手指进行密码操作过程键入的每条随机字符段也可能被旁边的人观察到和记录下来,但因这些随机字符段只一次性有效,记下也没用。用户下次进行密码输入操作时,仍然可以在众目睽睽下从容输入其观察到的每个密码图符旁显示的不同于前次的另一组随机字符段,而仍然不用担心别人的偷窥记录。In the embodiment of the present invention, when the user inputs the random character segments that are observed above or next to each password icon, the user can input the correct password input result. In this process, although each random character segment typed by the user during the password operation process may be observed and recorded by the person next to it, since these random character segments are only valid once, it is useless to write down. The next time the user enters the password input operation, he can still enter the other set of random character segments displayed next to each of the password icons observed by the user in the eyes of the public, without worrying about the voyeur record of others.
因人眼的生理能力限制,同一个人无法同时观察和记录用户输入密码时的手指动作和屏幕上的每个图符组的所有随机字符段,也就无法确切观察和记录下用户每次输入的随机字符段究竟对应屏幕上的哪一个图符。Due to the limitation of the physiological ability of the human eye, the same person cannot simultaneously observe and record the finger movements when the user inputs the password and all the random character segments of each icon group on the screen, so that it is impossible to accurately observe and record the user's input every time. Which icon on the screen corresponds to the random segment.
用位数不受限的图符做密码,不存在传统密码受限于数字字母的位数限制的问题,所以,在军事金融等高度机密场合应用时,可以获得极高的密码安全级别。例如,若每个第一图符组包含20行20列共400个图符,一组密码包含8个密码图符,那么,加密级别可达到6.5536e+20这样的天文数字,而8个有意义的图符却仍然很容易记忆。当然,更关键的是,还不怕偷窥。Passwords with unrestricted digits are used as passwords. There is no problem that traditional passwords are limited by the number of digits. Therefore, when applied in highly confidential situations such as military finance, a very high level of password security can be obtained. For example, if each first icon group contains 20 lines and 20 columns and a total of 400 icons, and a set of passwords contains 8 password icons, the encryption level can reach an astronomical number of 6.5536e+20, and 8 have The icon of meaning is still easy to remember. Of course, the more important thing is that you are not afraid of voyeurism.
步骤104、将用户输入的字符段与当前所显示的第一图符组中的密码图符所对应的随机字符段进行比对,确定比对结果,并向用户发送下一个第一图符组;Step 104: Compare the character segment input by the user with the random character segment corresponding to the password icon in the currently displayed first icon group, determine the comparison result, and send the next first icon group to the user. ;
在进行密码输入时,用户在当前所显示的第一图符组中选出与自己所设置的图符密码相对应的图符(也就是当前显示页面中的密码图符),并输入该图符当前所对应的随机字符段,当用户所输入的随机字符段所对应的图符是密码图符时,确定用户本次输入正确,但除非用户已正确输入全部字符段,否则,***不会向用户做任何提示,而只是在用户的全部图符密码输入完毕之前,向用户继续发送下一个第一图符组。When the password is input, the user selects an icon corresponding to the icon password set by himself (that is, the password icon in the currently displayed page) in the currently displayed first icon group, and inputs the figure. The character corresponding to the current random character segment, when the icon corresponding to the random character segment input by the user is a password icon, it is determined that the user input is correct this time, but unless the user has correctly input all the character segments, the system will not Make any prompts to the user, but continue to send the next first icon group to the user before the user's full icon password is entered.
相对应的,当用户输入的字符段与当前所显示的第一图符组中的密码图符相对应的随机字符段不相同时,确定用户输入密码错误,但在所有第一图符组显示完毕前,仍向用户发送下一个第一图符组并接收用户输入的字符段。只有当最后一个第一图符组显示完毕且用户结束密码输入操作后,才向用户返回密码输入错误的提示消息。Correspondingly, when the character segment input by the user is different from the random character segment corresponding to the password icon in the currently displayed first icon group, it is determined that the user inputs the password error, but displays in all the first icon groups. Before the completion, the next first icon group is still sent to the user and the character segment input by the user is received. Only when the last first icon group is displayed and the user ends the password input operation, the user returns a password input error message.
步骤105、当用户在每一个第一图符组显示过程中所输入的字符段与当次所显示的第一图符组中的密码图符所对应的随机字符段相同时,确定用户输入密码正确。Step 105: When the character segment input by the user in each first icon group display process is the same as the random character segment corresponding to the password icon in the first icon group displayed at the time, the user is determined to input the password. correct.
当用户每次所输入的字符段均与当次所显示的第一图符组中的密码图符所对应的随机字符段相同时,确定用户本次输入密码正确,可以进入后续操作。When the character segment input by the user is the same as the random character segment corresponding to the password icon in the first icon group displayed at the time, it is determined that the user inputs the password correctly, and the subsequent operation can be performed.
需要说明的是,上述步骤103-步骤105只为对不同步骤进行区分,并不用于限制各步骤执行的先后顺序;实际上,这三个步骤之间并没有严格的先后顺序。It should be noted that the above steps 103-105 are only used to distinguish different steps, and are not used to limit the sequence of execution of each step; in fact, there is no strict sequence between the three steps.
在本发明的一种实施方式中,所述方法还包括:In an embodiment of the present invention, the method further includes:
将所述各个图符所对应的随机字符段拆分为若干个部分,并按照预设时间间隔依次显示各个部分。The random character segments corresponding to the respective icons are divided into a plurality of parts, and the respective parts are sequentially displayed according to a preset time interval.
在显示过程中,每一个部分的显示间隔可以根据实际需要进行设置,而每一个部分在显示时的停留时间也可以根据实际需要进行设置。During the display process, the display interval of each part can be set according to actual needs, and the dwell time of each part during display can also be set according to actual needs.
具体来说,就是可将每个随机字符段分解成多个不同部分,并让分解后的每个部分在不同的时间段先后显示出来。这样,用户在操作密码输入时,仍然可利用视觉暂留现象观察到完整的随机字符段,而用于偷拍的电子摄像装置则由于摄像装置的逐行或者隔行扫描原理的限制,难以完整拍下或者录下随机字符段。Specifically, each random character segment can be decomposed into a plurality of different parts, and each of the decomposed characters is displayed in different time periods. In this way, when the user inputs the password input, the complete temporary character segment can still be observed by the visual persistence phenomenon, and the electronic camera device used for the sneak shot is difficult to take a full picture due to the limitation of the progressive or interlaced scanning principle of the camera device. Or record a random character segment.
本发明实施例中所采用的图符形式的密码至少有以下优点:The password in the form of an icon used in the embodiment of the present invention has at least the following advantages:
1、容易记忆。对人类记忆的生理研究成果和生活经验都表明,相比抽象的无意义的由多位字母数字和符号组合成的传统“安全性高”的密码,人类大脑 对记住由几个有意义、容易识别的图形图标组成的密码要容易得多。1, easy to remember. The physiological research results and life experiences of human memory have shown that compared to the abstract meaningless combination of multiple "alphabets" and symbols, the traditional "safety" passwords are remembered by the human brain. Passwords made up of easily identifiable graphic icons are much easier.
2、不易忘记。相比需要死记硬背枯燥无意义的类似“W#Ix-NbYk”这样的高强度安全密码,记住由“茄子”、“猴子”“球拍”、“自行车”这类的图形图标构成的密码,不仅很容易记,而且还很难忘。2, not easy to forget. Remember the password consisting of graphic icons such as "eggplant", "monkey", "racquet", "bike", etc., compared to the high-intensity security code like "W#Ix-NbYk" that needs to memorize and be dull and meaningless. Not only is it easy to remember, but it is also hard to forget.
3、不怕窥视。采用仅一次有用的随机字符段来间接点选密码图符,让偷窥者即便贴身观察也难以得手。3, not afraid to peep. Indirect selection of the password icon with only one useful random character segment makes it difficult for the voyeur to get a good look.
4、高强度的保密性。在应用中,若每个图符组包含100个图符,一个密码包含3个图符,那么,按特定顺序分三次显示的三组图符组,可形成100万个可能的密码图符组。也就是说,用区区3个图形构成的密码,就可以达到百万级的加密强度。若采用6个图形,会达到万亿级别的加密强度,远高于6位数字字母和符号组成的传统密码。4. High-intensity confidentiality. In the application, if each icon group contains 100 icons and a password contains 3 icons, then the three groups of icons displayed in three steps in a specific order can form 1 million possible password icon groups. . In other words, with a password consisting of three graphics, you can achieve a million-level encryption strength. If you use 6 graphics, you will achieve a trillion-level encryption strength, much higher than the traditional password composed of 6-digit alphanumeric characters.
基于本发明实施例所提供的技术方案,至少具有以下有益效果:The technical solution provided by the embodiment of the present invention has at least the following beneficial effects:
对于用户来说,图符形式的密码记忆起来非常简单,而且由于特殊的密码输入方法使得图符密码的保密强度非常高,这是因为:每一次输入密码时,***会针对密码中每一个图符会生成随机字符段,用户只有在输入字符段正确时,才能输入正确的密码图符,这种情况下,由于人眼的生理能力限制,同一个人无法同时观察和记录用户输入密码时的手指动作和屏幕上的每个图符组的所有随机字符段,也就无法确切观察和记录下用户每次输入的随机字符段究竟对应屏幕上的哪一个图符。因此,本发明实施例所提供的技术方案几乎可以完全杜绝他人恶意偷窥的可能性,从而避免密码泄露对用户带来的个人信息、数据泄露及可能引发的财产损失。For the user, the password in the form of an icon is very simple to remember, and the privacy of the icon password is very high due to the special password input method. This is because each time the password is entered, the system will map each figure in the password. The character will generate a random character segment, and the user can input the correct password icon only when the input character segment is correct. In this case, due to the physiological limitation of the human eye, the same person cannot simultaneously observe and record the finger when the user inputs the password. The action and all the random segments of each icon group on the screen cannot accurately observe and record which icon on the screen corresponds to the random segment that the user inputs each time. Therefore, the technical solution provided by the embodiment of the present invention can almost completely eliminate the possibility of malicious peek of others, thereby avoiding personal information, data leakage and property loss caused by the password leakage to the user.
实施例二 Embodiment 2
参照图3,本发明实施例二提供了一种密码输入设备,所述设备包括:Referring to FIG. 3, a second embodiment of the present invention provides a password input device, where the device includes:
第一生成单元31,用于生成多个第一图符组并针对每个第一图符组中的各个图符生成各不相同的随机字符段;其中,每一个第一图符组包括多个各不相 同的图符,每一个第一图符组中的一个图符为用户预设的密码图符;a first generating unit 31, configured to generate a plurality of first icon groups and generate different random character segments for each icon in each first icon group; wherein each of the first icon groups includes multiple Each of the different icons, one of the icons in the first icon group is a user-preset password icon;
显示单元32,用于依次显示所述多个第一图符组,并将与第一图符组中各个图符相对应的随机字符段显示于相应图符中的预设位置;其中,每一个第一图符组中的各个图符按照预设位置规则排布;a display unit 32, configured to sequentially display the plurality of first icon groups, and display random character segments corresponding to the respective icons in the first icon group in a preset position in the corresponding icon; Each icon in a first icon group is arranged according to a preset position rule;
输入单元33,在每一个第一图符组显示过程中,接收用户输入的字符段;The input unit 33 receives the character segment input by the user during each first icon group display process;
数据处理单元34,用于将用户输入的字符段与当前所显示的第一图符组中的密码图符所对应的随机字符段进行比对,确定比对结果并触发第一显示模块32显示下一个第一图符组;还用于当全部第一图符组显示完毕,且用户在每一个第一图符组显示过程中所输入的字符段均与当次所显示的第一图符组中的密码图符所对应的随机字符段相同时,确定用户输入密码正确。The data processing unit 34 is configured to compare the character segment input by the user with the random character segment corresponding to the password icon in the currently displayed first icon group, determine the comparison result, and trigger the first display module 32 to display The next first icon group; also used when all the first icon groups are displayed, and the character segments input by the user in each of the first icon group display are the same as the first icon displayed at the time. When the random character segment corresponding to the password icon in the group is the same, it is determined that the user input password is correct.
在本发明的一种实施方式中,参照图4,所述装置还包括:In an embodiment of the present invention, referring to FIG. 4, the device further includes:
第二生成单元35,用于生成多个第二图符组;其中,每一个第二图符组包括多个图符;a second generating unit 35, configured to generate a plurality of second icon groups; wherein each second icon group includes multiple icons;
所述显示单元32,用于依次显示所述多个第二图符组;The display unit 32 is configured to sequentially display the plurality of second icon groups;
所述输入单元33,用于在每一个第二图符组显示过程中,接收用户针对所述第二图符组中任意一个图符的选择信息;The input unit 33 is configured to receive, during each second icon group display process, selection information of the user for any one of the second icon groups;
设置单元36,用于将用户所选择的各个图符确定为密码图符,并将多个密码图符组成该用户的密码。The setting unit 36 is configured to determine each icon selected by the user as a password icon, and form a plurality of password icons into the password of the user.
在本发明的一种实施方式中,所述数据处理单元34,用于在确定用户输入的字符段与当次所显示的第一图符组中的密码图符所对应的随机字符段不相同时,确定用户输入密码错误,并判断是否多个第一图符组全部显示完毕,如果不是,则向用户发送下一个第一图符组,并在最后一个第一图符组显示完毕并结束字符段接收步骤之后,向用户发送密码输入错误的提示消息;In an embodiment of the present invention, the data processing unit 34 is configured to determine that the character segment input by the user is different from the random character segment corresponding to the password icon in the first icon group displayed at the time. At the same time, it is determined that the user inputs a password error, and determines whether all of the first icon groups are all displayed. If not, the next first icon group is sent to the user, and the last first icon group is displayed and ends. After the segment receiving step, the user sends a prompt message indicating that the password is entered incorrectly;
如果全部第一图符组显示完毕,则在密码接收操作结束之后,向用户发送密码输入错误的提示消息。If all the first icon groups are displayed, after the password receiving operation ends, a prompt message for the password input error is sent to the user.
具体的,所述字符段为直线和/或曲线组成的轨迹,或者包括但不限于以下 至少一种类型字符的组合:Specifically, the character segment is a track composed of a straight line and/or a curve, or includes but is not limited to the following combinations of at least one type of character:
数字、字母、符号。Numbers, letters, symbols.
在本发明的一种实施方式中,所述显示单元32,具体用于将所述各个图符所对应的随机字符段拆分为若干个部分,并按照预设时间间隔依次显示各个部分。In an embodiment of the present invention, the display unit 32 is specifically configured to split the random character segments corresponding to the respective icons into a plurality of parts, and sequentially display the respective parts according to a preset time interval.
具体的,所述图符为静态图像或者动态图像;Specifically, the icon is a static image or a dynamic image;
所述图符所含的内容包括但不限于以下类型或者其组合:The content included in the icon includes but is not limited to the following types or a combination thereof:
字符、数字、符号、图标、标志、图形或者图块。Characters, numbers, symbols, icons, logos, graphics, or tiles.
各个第一图符组或者第二图符组可以由图像中的没有确切边界和形状但有确切的大致位置特征的多个局部区域组成。Each of the first icon group or the second icon group may be composed of a plurality of partial regions in the image that have no exact boundaries and shapes but have exact approximate positional features.
为了更彻底的杜绝偷窥和偷拍,本发明实施例所提出的密码输入设备,还包括如下技术特征:In order to prevent sneak peeks and sneak shots more completely, the password input device provided by the embodiment of the present invention further includes the following technical features:
所述的显示单元32是只提供单人观看视角的显示单元。The display unit 32 is a display unit that provides only a single viewing angle.
这里所说的“只提供单人观看视角的显示单元”,包括现有技术中的覆盖在电子显示屏前的“防窥屏”技术,也包括在电子显示屏前覆盖井字形深孔网格屏幕形成的缩窄观察角度的现有技术,还包括本身就具备窄视角的电子显示屏技术。As used herein, "a display unit that provides only a single viewing angle" includes the "anti-spy screen" technology that is covered in front of the electronic display screen in the prior art, and also includes a well-shaped deep hole grid covering the front of the electronic display screen. The prior art of narrowing the viewing angle formed by the screen also includes an electronic display technology that itself has a narrow viewing angle.
当显示屏的内容只能被用户自己观察的时候,偷窥、偷拍者就失去了有效的作案手段。因为他们唯一能偷窥和记录到的,只有那些毫无用处的随机字符段。When the content of the display can only be observed by the user, the voyeur and the sneak shot lose the effective means of committing crimes. Because they can only peek and record, only those random segments that are useless.
应用示例Application example
下面通过多个具体示例对本发明所提供的密码输入方法和设备,做以下详细介绍。The following describes the password input method and apparatus provided by the present invention through a plurality of specific examples.
图5是一种密码输入设备的基本结构示意图,如图5所示,该设备包括作为显示单元的显示屏1和作为输入单元的键盘2。显示屏1显示了包含30个图 形符号式的图符3的一个图符组。在图符组中,每个图符3的旁边都显示了一个随机字符段4。键盘2包括0至9的10个数字的字符按键5以及回车键6、退格键7。Fig. 5 is a schematic diagram showing the basic structure of a password input device. As shown in Fig. 5, the device includes a display screen 1 as a display unit and a keyboard 2 as an input unit. Display 1 shows an icon group of icon 3 containing 30 graphic symbols. In the icon group, a random character segment 4 is displayed next to each icon 3. The keyboard 2 includes a 10-digit character button 5 of 0 to 9 and an enter key 6 and a backspace key 7.
用户预先通过设置单元设置好的密码,是四个自选的图符3。这四个图符3是用户从四个图符组中分别选中的。所有图符组中的图符3都不重复。The password set by the user in advance through the setting unit is four optional icons 3. These four icons 3 are selected by the user from the four icon groups. The icon 3 in all icon groups is not repeated.
进入密码输入步骤时,四个图符3组按预先设定的固定次序分四次显示给用户,并在每个图符3的所在区域的右下角位置显示对应的随机字符段4。同屏显示的30个随机字符段4都是不重复的3位数字。When entering the password input step, the four icon groups 3 are displayed to the user four times in a predetermined fixed order, and the corresponding random character segment 4 is displayed at the lower right corner of the area where each icon 3 is located. The 30 random character segments 4 displayed on the same screen are non-repeating 3-digit numbers.
第一个图符组显示后,用户目视观察并确定该图符组中属于他预先设置的第一个密码图符右下角的随机字符段,并在键盘2上键入该随机字符段后按回车键6。若觉得输入错误,可按退格键7修改。After the first icon group is displayed, the user visually observes and determines a random character segment in the lower right corner of the first password icon that is preset in the icon group, and presses the random character segment on the keyboard 2 and presses Enter key 6. If you feel that the input is wrong, you can press the backspace key 7 to modify it.
在该示例中,无论用户键入的随机字符段是否正确,在按回车键6之后,***都自动刷屏并显示出第二个图符组。In this example, regardless of whether the random character segment typed by the user is correct, after pressing the enter key 6, the system automatically swipes and displays the second icon group.
第二个图符组显示后,用户重复之前的操作,键入其认为属于他预先设置的第二个密码图符右下角的随机字符段,再按回车键6调出第三个图符组。After the second icon group is displayed, the user repeats the previous operation, and types a random character segment that is considered to belong to the lower right corner of the second password icon that he presets, and then presses the enter key 6 to call up the third icon group. .
第三个图符组显示后,用户重复之前的操作,键入其认为属于他预先设置的第三个密码图符旁边的随机字符段,再按回车键6调出第四个图符组。After the third icon group is displayed, the user repeats the previous operation, types the random character segment next to the third password icon that he thinks belongs to him, and presses the enter key 6 to call up the fourth icon group.
第四个图符组显示后,用户重复之前的操作,键入其认为属于他预先设置的第四个密码图符旁边的随机字符段,再按回车键6。After the fourth icon group is displayed, the user repeats the previous operation, typing a random character segment next to the fourth password icon that he/she thinks belongs to him, and then pressing the Enter key 6.
此时,若用户之前的输入全部正确,则***会判定用户密码输入正确,进入之后的正常程序。若用户之前的输入有错误,则***会向用户显示密码输入不正确的提示信息。At this time, if the user's previous input is all correct, the system will determine that the user password is entered correctly and enter the normal program afterwards. If the user's previous input has an error, the system will display a prompt message indicating that the password is not entered correctly.
该示例中,显示屏和键盘可以是相互以有线或者无线通讯方式连接的独立的电子部件,也可以是在同一个触摸屏中同屏显示的虚拟键盘。In this example, the display screen and the keyboard may be separate electronic components that are connected to each other by wired or wireless communication, or may be virtual keyboards that are displayed on the same screen in the same touch screen.
构成图符3的,是各种有独特特征的,便于识别、区分和记忆的图形、图标,这些图形或者图标可以是静态的,也可以是动态的。The icon 3 is a variety of graphics and icons that have unique features that are easy to identify, distinguish, and remember. These graphics or icons can be static or dynamic.
为了提高偷窥者的观察和记录难度,所有随机字符段统一采用3位数字字符。In order to improve the observation and recording difficulty of the voyeur, all random characters are uniformly used with 3-digit characters.
为了进一步提高偷窥者的观察记录难度,用户可通过设置单元对随机字符段的显示规则进行设置,比如,可以进行这样的设置:当用户键入第一个数字字符时,***让当前图符组中正在显示的所有随机字符段立刻消失,或者让当前图符组的所有内容一并消失,直到其按下第预设数量个数字或者按下回车键后,再显示下一个图符组。比如,可以在用户按下第三个数字时,不用按回车键6,***会自动显示下一个图符组。In order to further improve the difficulty of the voyeur's observation record, the user can set the display rule of the random character segment by setting the unit. For example, the setting can be made: when the user types the first numeric character, the system makes the current icon group All random characters that are being displayed disappear immediately, or all the contents of the current icon group disappear together until they press the preset number of digits or press the Enter key to display the next icon group. For example, when the user presses the third number, instead of pressing the enter key 6, the system automatically displays the next icon group.
图6是第二种密码输入设备的基本结构示意图,与图5不同的是,这个密码输入设备所显示的图符3是汉字构成的。当然,也可以是其他语种的字词构成的,比如英文单词。这种文字类型的图符的好处是,容易描述、记载和告知他人。当然,密码内容容易告知他人,有时候也是一种缺点。6 is a schematic diagram showing the basic structure of a second type of password input device. Unlike FIG. 5, the icon 3 displayed by the password input device is composed of Chinese characters. Of course, it can also be composed of words in other languages, such as English words. The advantage of this type of text icon is that it is easy to describe, document, and inform others. Of course, password content is easy to tell others, and sometimes it is a disadvantage.
图7是第三种密码输入设备的基本结构示意图,其图符3采用了英文字母方式。这种方式比较简洁,但因字母数量有限,密码的加密强度较低,比较适合普通建筑的门禁环境中。FIG. 7 is a schematic diagram of the basic structure of a third type of password input device, and the icon 3 is in the form of an English letter. This method is relatively simple, but because of the limited number of letters, the encryption strength of the password is relatively low, which is more suitable for the access control environment of ordinary buildings.
图8是第四种密码输入设备的基本结构示意图,与图7相类似的是其图符3也采用了英文字母方式。但图符旁的随机字符段采用了单个手势图案的方式,密码输入装置采用的是用可触摸滑动输入手势图案的触摸输入面板。显然,也可以用多个手势图案来组成一个随机字符段。FIG. 8 is a schematic diagram showing the basic structure of a fourth type of password input device. Similar to FIG. 7, the icon 3 is also in the form of an English letter. However, the random character segment next to the icon adopts a single gesture pattern, and the password input device adopts a touch input panel with a touch-slidable input gesture pattern. Obviously, multiple gesture patterns can also be used to form a random character segment.
参照图9-图12,也可以采用单幅美术作品作为图符组,并以无规则的分布方式布置在多个固定位置的一些随机字符段所在的画面区域作为图符。这种图符没有确切的边界范围,仅依靠所在位置的画面内容特征来作为用户记忆和搜寻的条件。这种图符比较符合人脑在生理上的记忆特性。因为人们对标记在其熟悉的画面环境中的特定位置的记号,更容易记忆和搜寻。当进入密码输入步骤时,用户只需在画面中搜寻到位于其记忆中的属于其“密码图符”的画面位置的随机字符段,然后准确键入这个随机字符段的内容即可。Referring to FIG. 9 to FIG. 12, a single artwork can also be used as the icon group, and the screen regions where some random character segments at a plurality of fixed positions are arranged in an irregular distribution manner are used as icons. This icon has no exact boundary range and relies solely on the picture content characteristics of the location as a condition for user memory and search. This kind of icon is more in line with the physiological memory characteristics of the human brain. Because people mark tokens in specific locations in their familiar picture environment, it's easier to remember and search. When entering the password input step, the user only needs to search for a random character segment of the screen position belonging to his "password icon" in his memory, and then accurately input the content of the random character segment.
不难理解,内容复杂、情景丰富、局部特征显著的大场景美术作品特别适合作为本实施例所示的这种样式的图符组。It is not difficult to understand that large-scale art works with complex contents, rich scenes, and local features are particularly suitable as the icon group of the style shown in this embodiment.
参见图9,这种密码输入设备采用的是包含26个英文字母和回车键、退格键的键盘。当然,在台式机或者笔记本电脑环境中,原配的键盘就是用于操作密码的键盘。这种全字母键盘的优势是,比较适合以快速准确的盲打方式输入随机字符段。快速的盲打方式,更不易被旁观者偷窥和记忆。Referring to Figure 9, the password input device uses a keyboard containing 26 English letters and an enter key and a backspace key. Of course, in a desktop or laptop environment, the original keyboard is the keyboard used to operate the password. The advantage of this full-letter keyboard is that it is more suitable for entering random segments in a fast and accurate way. The fast blind play method is less likely to be sneaked and memorized by bystanders.
为了提高防偷窥能力,本实施例中的随机字符段采用了有时差的多次显示方式。In order to improve the anti-peeping ability, the random character segment in this embodiment adopts a multiple display manner with a time difference.
参见图10,是一个图符组画面中的所有随机字符段的第一时刻的显示状态,所有随机字符段只显示出第一个字母。Referring to FIG. 10, it is the display state of the first moment of all the random character segments in the icon group picture, and all the random character segments only display the first letter.
参见图11,是上述图符组画面中的所有随机字符段的第二时刻的显示状态,所有随机字符段只显示出第二个字母。Referring to FIG. 11, the display state of the second time of all the random character segments in the above icon group picture is displayed, and all the random character segments display only the second letter.
参见图12,是上述图符组画面中的所有随机字符段的第三时刻的显示状态,所有随机字符段只显示出第三个字母。Referring to FIG. 12, the display state of the third time of all the random character segments in the above icon group picture is displayed, and all the random character segments only display the third letter.
上述三个时刻的间隔时间可设定为0.3秒左右,并且每次持续显示0.1秒左右。这样,一个随机字符段将在大约1秒中内完整显示一个周期。The interval between the above three times can be set to about 0.3 seconds, and is continuously displayed for about 0.1 second each time. Thus, a random segment of text will display a full cycle in approximately 1 second.
这样做的好处是:无论是旁观者的人眼还是偷拍者的相机,都更难以观测、记忆或者拍摄、捕捉到显示在一个屏幕中的所有随机字符段的完整内容。The advantage of this is that it is more difficult to observe, memorize or capture and capture the complete content of all random segments displayed on one screen, whether by the eye of the bystander or by the camera of the sneak shot.
进一步的,还可以将每个随机字符段的每个字母按不同区块的像素以数帧的时差分时显示,这样,因数码影像的逐行扫描拍摄原理的限制,将让数码相机更难以捕捉到随机字符段的完整准确内容。Further, each letter of each random character segment can also be displayed as a time difference of a plurality of frames in pixels of different blocks, so that the limitation of the principle of progressive scanning of digital images will make the digital camera more difficult. Capture complete and accurate content of random segments.
采用字母方式的随机字符段时,为了提高键入速度和准确度,随机字符段可采用常用单词,让用户更容易快速准确地盲打键入。In the case of alphabetic random segments, in order to improve typing speed and accuracy, random characters can use common words, making it easier for users to type and type quickly and accurately.
调出下一个图符组的操作,可以设定为按压回车键、空格键等特定按键,也可以设定为当前图符组显示时,键入次数超过设定的随机字符段的字数后,自动转向显示下一个图符组。The operation of calling up the next icon group can be set to press a specific key such as the enter key or the space key, or can be set to the current icon group display, after the number of times exceeds the number of words of the set random character segment, Auto Steering displays the next icon group.
下面对本发明密码输入方法在一种实施方式中的示例性流程进行介绍,该示例中,假设密码由三个图符组成,包括以下步骤:An exemplary flow of the password input method of the present invention in one embodiment is described below. In this example, it is assumed that the password consists of three icons, including the following steps:
步骤1301、生成三个图符组;每个图符组中,包含多个图符;每个图符组中的图符按预先设置的位置规则分布;Step 1301: Generate three icon groups; each icon group includes multiple icons; the icons in each icon group are distributed according to a preset position rule;
步骤1302、确定所述三个图符组的显示顺序;Step 1302: Determine a display order of the three icon groups;
步骤1303、按顺序显示第一个图符组;Step 1303, displaying the first icon group in order;
步骤1304、接收用户针对第一个图符组中的一个图符的选择信息;Step 1304: Receive selection information of a user for an icon in the first icon group.
步骤1305、将用户所选定的第一个图符确定为第一个密码图符;Step 1305, determining the first icon selected by the user as the first password icon;
步骤1306、接收用户针对第二个图符组中的一个图符的选择信息;Step 1306: Receive user selection information for one icon in the second icon group.
步骤1307、将用户所选定的第二个图符确定为第一个密码图符;Step 1307: Determine the second icon selected by the user as the first password icon.
步骤1308、接收用户针对第三个图符组中的一个图符的选择信息;Step 1308: Receive user selection information for an icon in the third icon group.
步骤1309、将用户所选定的第三个图符确定为第一个密码图符;Step 1309: Determine a third icon selected by the user as the first password icon.
步骤1310、根据用户所选择的三个图符生成并保存为用户密码;Step 1310: Generate and save as a user password according to three icons selected by the user;
用户所选择的每个图符被定义为密码图符;Each icon selected by the user is defined as a password icon;
该步骤中,被该用户选择的密码图符以预先设置的次序规则组成该用户的密码;In this step, the password icon selected by the user forms the password of the user in a preset order rule;
步骤1311、进入密码输入流程,生成多个图符组;Step 1311: Enter a password input process to generate multiple icon groups;
每个图符组包含多个互不相同的图符且其中的一个为用户预先设置的密码图符;Each icon group contains a plurality of mutually different icons and one of them is a password icon preset by the user;
步骤1312、按预先设置的次序显示第一个图符组,并生成与第一个图符组相对应的随机字符段;Step 1312: Display the first icon group in a preset order, and generate a random character segment corresponding to the first icon group;
步骤1313、接收用户输入的第一个字符段;Step 1313: Receive a first character segment input by a user.
步骤1314、将用户输入的第一个字符段与第一个图符组相对应的随机字符段进行比对,确定比对结果后,进入步骤1315;Step 1314, comparing the first character segment input by the user with the random character segment corresponding to the first icon group, and determining the comparison result, proceeding to step 1315;
步骤1315、按预先设置的次序显示第二个图符组,并生成与第二个图符组相对应的随机字符段;Step 1315: Display a second icon group in a preset order, and generate a random character segment corresponding to the second icon group;
步骤1316、接收用户输入的第二个字符段;Step 1316: Receive a second character segment input by a user.
步骤1317、将用户输入的第二个字符段与第二个图符组相对应的随机字符段进行比对,确定比对结果后,进入步骤1318;Step 1317, comparing the second character segment input by the user with the random character segment corresponding to the second icon group, and determining the comparison result, proceeding to step 1318;
步骤1318、按预先设置的次序显示第三个图符组,并生成与第三个图符组相对应的随机字符段;Step 1318: Display a third icon group in a preset order, and generate a random character segment corresponding to the third icon group;
步骤1319、接收用户输入的第三个字符段;Step 1319: Receive a third character segment input by a user.
步骤1320、将用户输入的第三个字符段与第三个图符组相对应的随机字符段进行比对,确定比对结果后,进入步骤1321;Step 1320, comparing the third character segment input by the user with the random character segment corresponding to the third icon group, and determining the comparison result, proceeding to step 1321;
步骤1321、判断是否用户三次输入的字符段均与当次所显示的字符组中的密码字符相对应的随机字符段相同,如果是,转入步骤1322,如果不是则转入步骤1323;Step 1321, it is determined whether the character segments input by the user three times are the same as the random character segments corresponding to the password characters in the character group displayed at the time, if yes, go to step 1322, if not, proceed to step 1323;
步骤1322、确定用户输入密码正确;Step 1322: determining that the user inputting the password is correct;
此时,可以进入后续处理步骤;At this point, you can enter the subsequent processing steps;
步骤1323、确定用户输入密码错误,向用户返回密码输入错误的提示信息。Step 1323: Determine that the user inputs a password error, and returns a prompt information indicating that the password is incorrectly input to the user.
显而易见的是,当同一个应用场合对应多个不同用户时,需要先确定用户身份,比如,让用户输入用户名,或者***包含特定用户身份信息的电子卡,然后,***再根据用户身份信息来调取对该户预先设定的密码数据进行比对验证。Obviously, when the same application corresponds to multiple different users, it is necessary to first determine the user identity, for example, let the user input the user name, or insert an electronic card containing the specific user identity information, and then the system according to the user identity information. The password data pre-set by the user is retrieved for comparison verification.
实施例三 Embodiment 3
本发明实施例三中提供了一种计算机可读存储介质,所述计算机可读存储介质包括程序,所述程序用于被处理器执行以实现如上述第一方面任一项所述的方法。A third embodiment of the present invention provides a computer readable storage medium comprising a program for execution by a processor to implement the method of any of the above first aspects.
本领域技术人员可以理解,上述实施方式中各种方法的全部或部分功能可以通过硬件的方式实现,也可以通过计算机程序的方式实现。当上述实施方式中全部或部分功能通过计算机程序的方式实现时,该程序可以存储于一计算机 可读存储介质中,存储介质可以包括:只读存储器、随机存储器、磁盘、光盘、硬盘等,通过计算机执行该程序以实现上述功能。例如,将程序存储在设备的存储器中,当通过处理器执行存储器中程序,即可实现上述全部或部分功能。另外,当上述实施方式中全部或部分功能通过计算机程序的方式实现时,该程序也可以存储在服务器、另一计算机、磁盘、光盘、闪存盘或移动硬盘等存储介质中,通过下载或复制保存到本地设备的存储器中,或对本地设备的***进行版本更新,当通过处理器执行存储器中的程序时,即可实现上述实施方式中全部或部分功能。Those skilled in the art can understand that all or part of the functions of the various methods in the above embodiments may be implemented by hardware or by a computer program. When all or part of the functions in the above embodiments are implemented by a computer program, the program may be stored in a computer readable storage medium, and the storage medium may include: a read only memory, a random access memory, a magnetic disk, an optical disk, a hard disk, etc. The computer executes the program to implement the above functions. For example, the program is stored in the memory of the device, and when the program in the memory is executed by the processor, all or part of the above functions can be realized. In addition, when all or part of the functions in the above embodiment are implemented by a computer program, the program may also be stored in a storage medium such as a server, another computer, a magnetic disk, an optical disk, a flash disk or a mobile hard disk, and may be saved by downloading or copying. The system is updated in the memory of the local device, or the system of the local device is updated. When the program in the memory is executed by the processor, all or part of the functions in the above embodiments may be implemented.
以上应用了具体个例对本发明进行阐述,只是用于帮助理解本发明,并不用以限制本发明。对于本发明所属技术领域的技术人员,依据本发明的思想,还可以做出若干简单推演、变形或替换。The invention has been described above with reference to specific examples, which are merely intended to aid the understanding of the invention and are not intended to limit the invention. For the person skilled in the art to which the invention pertains, several simple derivations, variations or substitutions can be made in accordance with the inventive concept.

Claims (10)

  1. 一种密码输入方法,其特征在于,所述方法包括:A password input method, characterized in that the method comprises:
    生成多个第一图符组,并针对每个第一图符组中的各个图符生成各不相同的随机字符段;其中,每一个第一图符组包括多个各不相同的图符,每一个第一图符组中的一个图符为用户预设的密码图符;Generating a plurality of first icon groups, and generating different random character segments for each icon in each of the first icon groups; wherein each of the first icon groups includes a plurality of different icons An icon in each of the first icon groups is a user-preset password icon;
    依次显示所述多个第一图符,并将与第一图符组中各个图符相对应的随机字符段显示于相应图符中的预设位置;其中,每一个第一图符组中的各个图符按照预设位置规则排布;Displaying the plurality of first icons in sequence, and displaying random character segments corresponding to the respective icons in the first icon group in a preset position in the corresponding icon; wherein each of the first icon groups Each icon is arranged according to a preset position rule;
    在每一个第一图符组显示过程中,接收用户输入的字符段;Receiving a character segment input by a user during each first icon group display process;
    将用户输入的字符段与当前所显示的第一图符组中的密码图符所对应的随机字符段进行比对,确定比对结果并向用户发送下一个第一图符组;Comparing the character segment input by the user with the random character segment corresponding to the password icon in the currently displayed first icon group, determining the comparison result and transmitting the next first icon group to the user;
    当用户在每一个第一图符组显示过程中所输入的字符段均与当次所显示的第一图符组中的密码图符所对应的随机字符段相同时,确定用户输入密码正确。When the character segment input by the user in each first icon group display is the same as the random character segment corresponding to the password icon in the first icon group displayed at the time, it is determined that the user input password is correct.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括设定密码图符步骤,该步骤包括:The method of claim 1 further comprising the step of setting a password icon, the step comprising:
    生成多个第二图符组;其中,每一个第二图符组包括多个各不相同的图符;Generating a plurality of second icon groups; wherein each of the second icon groups includes a plurality of different icons;
    依次显示所述多个第二图符组;Displaying the plurality of second icon groups in sequence;
    在每一个第二图符组显示过程中,接收用户针对所述第二图符组中任意一个图符的选择信息;Receiving, in each second icon group display process, selection information of the user for any one of the icons in the second icon group;
    将用户所选择的各个图符确定为密码图符,并将多个密码图符组成该用户的密码。Each icon selected by the user is determined as a password icon, and multiple password icons are formed into the password of the user.
  3. 根据权利要求1所述的方法,其特征在于,所述方法还包括:当在每一个第一图符组显示过程中,当用户输入的字符段与当次所显示的第一图符组中的密码图符所对应的随机字符段不相同时,判断是否多个第一图符组全部显示完毕,如果不是,向用户发送下一个第一图符组,在最后一个第一图符组显示完毕并结束接收用户输入字符段操作之后,向用户发送密码输入错误的提示消 息。The method according to claim 1, wherein the method further comprises: when each of the first icon group display processes, when the character segment input by the user is in the first icon group displayed at the time If the random character segments corresponding to the password icon are different, it is determined whether all of the first icon groups are all displayed. If not, the next first icon group is sent to the user, and the first first icon group is displayed. After the completion of the operation of receiving the user input character segment, the user is sent a prompt message indicating that the password is entered incorrectly.
  4. 根据权利要求1所述的方法,其特征在于,所述随机字符段为直线和/或曲线组成的轨迹,或者为以下至少一种类型字符的组合:The method according to claim 1, wherein the random segment is a trajectory composed of a straight line and/or a curve, or a combination of at least one of the following types of characters:
    数字、字母和符号。Numbers, letters and symbols.
  5. 根据权利要求1所述的方法,其特征在于,所述方法还包括:将所述各个图符所对应的随机字符段拆分为若干个部分,并按照预设时间间隔依次显示各个部分。The method according to claim 1, wherein the method further comprises: splitting the random character segments corresponding to the respective icons into a plurality of parts, and sequentially displaying the respective parts according to a preset time interval.
  6. 根据权利要求2所述的方法,其特征在于,所述图符为静态图像或者动态图像;The method according to claim 2, wherein the icon is a still image or a moving image;
    所述图符所含的内容包括但不限于以下类型或者其组合:The content included in the icon includes but is not limited to the following types or a combination thereof:
    字符、数字、符号、图标、标志、图形和图块。Characters, numbers, symbols, icons, logos, graphics, and tiles.
  7. 一种密码输入设备,其特征在于,所述设备包括:A password input device, characterized in that the device comprises:
    第一生成单元,用于生成多个第一图符组并针对每个第一图符组中的各个图符生成各不相同的随机字符段;其中,每一个第一图符组包括多个各不相同的图符,每一个第一图符组中的一个图符为用户预设的密码图符;a first generating unit, configured to generate a plurality of first icon groups and generate different random character segments for each icon in each first icon group; wherein each of the first icon groups includes multiple Each of the different icons, each of the icons in the first icon group is a user-preset password icon;
    显示单元,用于依次显示所述多个第一图符组,并将与第一图符组中各个图符相对应的随机字符段显示于相应图符中的预设位置;其中,每一个第一图符组中的各个图符按照预设位置规则排布;a display unit, configured to sequentially display the plurality of first icon groups, and display random character segments corresponding to the respective icons in the first icon group in a preset position in the corresponding icon; wherein each Each icon in the first icon group is arranged according to a preset position rule;
    输入单元,在每一个第一图符组显示过程中,接收用户输入的字符段;The input unit receives the character segment input by the user during each first icon group display process;
    数据处理单元,用于将用户输入的字符段与当前所显示的第一图符组中的密码图符所对应的随机字符段进行比对,确定比对结果并触发显示模块显示下一个第一图符组;还用于当用户在每一个第一图符组显示过程中所输入的字符段均与当次所显示的第一图符组中的密码图符所对应的随机字符段相同时,确定用户输入密码正确。a data processing unit, configured to compare a character segment input by the user with a random character segment corresponding to the password icon in the currently displayed first icon group, determine a comparison result, and trigger the display module to display the next first The icon group is also used when the character segment input by the user in each of the first icon group display is the same as the random character segment corresponding to the password icon in the first icon group displayed at the time. , make sure the user enters the correct password.
  8. 根据权利要求7所述的设备,其特征在于,所述装置还包括:The device according to claim 7, wherein the device further comprises:
    第二生成单元,用于生成多个第二图符组;其中,每一个第二图符组包括 多个图符;a second generating unit, configured to generate a plurality of second icon groups; wherein each second icon group includes multiple icons;
    显示单元,用于依次显示所述多个第二图符组;a display unit, configured to sequentially display the plurality of second icon groups;
    输入单元,用于在每一个第二图符组显示过程中,接收用户针对所述第二图符组中任意一个图符的选择信息;An input unit, configured to receive, during each second icon group display process, selection information of a user for any one of the second icon groups;
    设置单元,用于将用户所选择的各个图符确定为密码图符,并将多个密码图符组成该用户的密码。The setting unit is configured to determine each icon selected by the user as a password icon, and form a plurality of password icons to form the password of the user.
  9. 根据权利要求7所述的设备,其特征在于,所述显示单元,具体用于将所述各个图符所对应的随机字符段拆分为若干个部分,并按照预设时间间隔依次显示各个部分。The device according to claim 7, wherein the display unit is configured to split a random character segment corresponding to each icon into a plurality of parts, and sequentially display each part according to a preset time interval. .
  10. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括程序,所述程序用于被处理器执行以实现如上述权利要求1至6其中任一项所述的方法。A computer readable storage medium, comprising: a program for execution by a processor to implement the method of any one of claims 1 to 6.
PCT/CN2019/071412 2018-01-12 2019-01-11 Password input method, device, and computer-readable storage medium WO2019137489A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810043313.3 2018-01-12
CN201810043313.3A CN108133156A (en) 2018-01-12 2018-01-12 A kind of cipher-code input method and equipment

Publications (1)

Publication Number Publication Date
WO2019137489A1 true WO2019137489A1 (en) 2019-07-18

Family

ID=62399953

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/071412 WO2019137489A1 (en) 2018-01-12 2019-01-11 Password input method, device, and computer-readable storage medium

Country Status (2)

Country Link
CN (1) CN108133156A (en)
WO (1) WO2019137489A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108133156A (en) * 2018-01-12 2018-06-08 于君 A kind of cipher-code input method and equipment
CN109117844B (en) * 2018-08-08 2020-08-18 中央民族大学 Password determination method and device
CN112101947A (en) * 2020-08-27 2020-12-18 江西台德智慧科技有限公司 Method for improving voice payment security

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162489A (en) * 2007-11-26 2008-04-16 唐荣华 Personate photograph producing method used for keep input secret and method of use thereof
CN101655768A (en) * 2009-09-23 2010-02-24 谭立彦 Anti-peep password input method
CN105631297A (en) * 2016-01-13 2016-06-01 青岛海信移动通信技术股份有限公司 Method and device for multi-user unlocking
CN108133156A (en) * 2018-01-12 2018-06-08 于君 A kind of cipher-code input method and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162489A (en) * 2007-11-26 2008-04-16 唐荣华 Personate photograph producing method used for keep input secret and method of use thereof
CN101655768A (en) * 2009-09-23 2010-02-24 谭立彦 Anti-peep password input method
CN105631297A (en) * 2016-01-13 2016-06-01 青岛海信移动通信技术股份有限公司 Method and device for multi-user unlocking
CN108133156A (en) * 2018-01-12 2018-06-08 于君 A kind of cipher-code input method and equipment

Also Published As

Publication number Publication date
CN108133156A (en) 2018-06-08

Similar Documents

Publication Publication Date Title
Jansen Authenticating mobile device users through image selection
US20060174339A1 (en) An arrangement and method of graphical password authentication
WO2019137489A1 (en) Password input method, device, and computer-readable storage medium
JP2008004107A (en) Method and apparatus for selecting password
Rao et al. Novel shoulder-surfing resistant authentication schemes using text-graphical passwords
KR101885836B1 (en) Method of Providing User Certification and Additional Service Using Image Password System
CN107995158A (en) Authentication device, authentication method, electronic equipment and recording medium
Yang PassPositions: A secure and user-friendly graphical password scheme
Ritter et al. Miba: Multitouch image-based authentication on smartphones
WO2019165976A1 (en) Password input method and apparatus
Tabrez et al. Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system
WO2019165978A1 (en) Password input method and device using indirect input of random character field mark
WO2019165979A1 (en) Method and equipment for inputting password having symbol and random character segment tag
Arun Kumar et al. A survey on graphical authentication system resisting shoulder surfing attack
KR102014408B1 (en) Method and computer program for user authentication using image touch password
WO2019210819A1 (en) Method and apparatus for authenticating icon password having random character field mark
Shankar et al. IPCT: A scheme for mobile authentication
Hasan et al. Multifactor pattern implicit authentication
Alsuhibany et al. Making PIN and password entry secure against shoulder surfing using camouflage characters
KR20190017315A (en) Method of Image Touch User Authentication Method and System Performing the same
KR101969838B1 (en) Method and apparatus for authenication using dial virtual keypad
Amruth et al. Android smudge attack prevention techniques
Al-Husainy et al. Using Emoji Pictures to Strengthen the Immunity of Passwords against Attackers
Thorawade et al. Authentication scheme resistant to shoulder surfing attack using image retrieval
KR101918461B1 (en) Authentication method and apparatus using three-dimensional arrangement of images

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19738255

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19738255

Country of ref document: EP

Kind code of ref document: A1