CN106534479A - Cell phone password protection system based on implicit code identification and implicit conversion - Google Patents
Cell phone password protection system based on implicit code identification and implicit conversion Download PDFInfo
- Publication number
- CN106534479A CN106534479A CN201610819200.9A CN201610819200A CN106534479A CN 106534479 A CN106534479 A CN 106534479A CN 201610819200 A CN201610819200 A CN 201610819200A CN 106534479 A CN106534479 A CN 106534479A
- Authority
- CN
- China
- Prior art keywords
- password
- module
- implicit
- implicit conversion
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000006243 chemical reaction Methods 0.000 title claims abstract description 72
- 238000012795 verification Methods 0.000 claims abstract description 4
- 230000003542 behavioural effect Effects 0.000 claims description 24
- 238000000034 method Methods 0.000 claims description 14
- 238000010200 validation analysis Methods 0.000 claims description 3
- 208000008918 voyeurism Diseases 0.000 abstract description 16
- 238000005336 cracking Methods 0.000 abstract description 5
- 238000003825 pressing Methods 0.000 abstract description 5
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 244000144985 peep Species 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 238000013332 literature search Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Environmental & Geological Engineering (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a cell phone password protection system based on implicit code identification and implicit conversion. The cell phone password protection system comprises steps that a key pressing behavior information acquisition module is used to acquire a key pressing code and key pressing behavior information during input of a password from a password input module, and an implicit identification module is used to generate an implicit password according to a coded value of an implicit code defined by an implicit code definition module, and an implicit conversion module is used for the automatic implicit conversion of the key pressing codes acquired by the information acquisition module according to an implicit conversion strategy defined by the implicit conversion definition module, and a password combination module is used to combine the implicit password and the password after the implicit conversion automatically to form a final password according to self-defined strategies in the implicit code definition module and the implicit conversion definition module, and a password verification module is used to verify the validity of the final password. The cell phone password protection system is capable of solving safety problems of a cell phone password system such as peeping and cracking.
Description
Technical field
A kind of a kind of the present invention relates to cipher protection system, in particular it relates to hand recognized based on hidden code with implicit conversion
Machine cipher protection system.
Background technology
Password, as the patron saint of information security, is the important leverage of safeguarding of assets and information security.At present, extensively make
Cryptographic system mainly has the biological information password such as numerical ciphers and fingerprint, brush face, DNA.Traditional numerical ciphers easily by
People peeps, uses steathily, thereby results in the stolen case of property loss, personal information of common occurrence.Mobile phone, it has also become in people's life
A part, be frequently utilized that mobile phone preserves personal information, shopping online etc..Therefore, the security of mobile telephone cipher system to close weight
Will.At present, even if pattern password, finger-print cipher have been used for mobile phone, but still fail to solve how to prevent other people using shooting, steal
The problem of decryption such as peep, for finger-print cipher also there is a problem of just changing Yi Dan being replicated by people.How hand is solved
The anti-peeping, anti-of secret code system itself cracks safety issue, is the basic of solution cell phone password safety.
It is 2015 03 that literature searches of the Jing to prior art finds a notification number for CN 104408363A, the day for announcing
Months 11 days, patent name for " security code system " Chinese patent, the patented technology includes input terminal, to store user pre-
If fundamental cryptographic information database, for fundamental cryptographic to be encrypted computing and forms checking password according to encryption principle
Cryptographic calculation unit and for verify the effective code in the password of user input whether with the encrypted computing of cryptographic calculation unit
The authentication unit for verifying that the valid code word included by password is consistent of formation, input terminal are provided with for user input interference code
With the input button of effective code, user is input into according to the input prompting of the encryption on input terminal display screen when password is input into
Interference code and it is encrypted after effective code, strengthen Password Input security.Which is disadvantageous in that, by spying on, imaging,
Can still obtain the password of input, and after being input into can by verifying, so as to do not reach cryptographic system itself it is anti-peeping,
The anti-purpose for cracking.
The content of the invention
For defect of the prior art, it is an object of the invention to provide a kind of hand recognized based on hidden code with implicit conversion
Machine cipher protection system, the anti-peeping, anti-of its current mobile telephone cipher system of energy effectively solving itself crack safety issue, and can
Directly apply on existing mobile phone, realize the protection to people's information security and property safety.
For achieving the above object, the present invention is achieved by the following technical solutions.
The present invention based on the identification of hidden code and the cell phone password protection system of implicit conversion, including Password Input module, press
It is key behavioural information acquisition module, hidden code definition module, hidden code identification module, implicit conversion definition module, implicit conversion module, close
Code composite module, password authentication module, wherein:The button behavioural information acquisition module obtains defeated from the Password Input module
Keyboard-coding when entering password and button behavioural information, the hidden code identification module define mould according to button behavioural information by hidden code
The encoded radio of the hidden code defined in block automatically forms hidden cipher, and the implicit conversion module presses implicit conversion definition module automatically
Defined in implicit conversion strategy implicit expression change is carried out to the keyboard-coding collected from the button behavioural information acquisition module
Change, the password combination module automatically by the password after the hidden cipher, the implicit conversion by the hidden code definition module,
Self-defined strategy combination in implicit conversion definition module is into final password, final described in the password authentication module automated validation
The legitimacy of password.
Preferably, the cell phone password protection system is additionally provided with Password Input tactile feedback module, by controlling mobile phone
Vibrations, to user's finger feed back key press size and/or the length of time and/or mobile phone angle of inclination size, with
Improve user friendly.
Preferably, the coding of each button when the information of the button behavioural information acquisition module collection includes being input into password
And the time length of button, the angle information of mobile phone level meter, for the key information of implicit conversion, can also be to adopting 3D-
The pressure size of button during the mobile phone collection input password of Touch screens.
Preferably, " volume+" and " volume-" button of the button for implicit conversion for mobile phone.
Preferably, time length and/or the input of pressure size and/or button of the hidden code module using the button
The size at the mobile phone angle of inclination in cryptographic processes or after just input one is digital, automatically forms pressure code and/or time respectively
The hidden cipher such as code and/or angle code, position and/or these hidden ciphers of the hidden cipher in the final password
Encoded radio is defined in the hidden code definition module and can be by User Defined.
Preferably, the implicit conversion module utilizes " volume+" and " volume-" key information to Password Input process
In keyboard-coding value carry out implicit conversion, make user's keyboard-coding entered from the keyboard similar and different with true password, so as to
Realize that same password has different flexible input methods;The amount of implicit conversion defined in the implicit conversion definition module simultaneously
Can be by User Defined.
Preferably, the password authentication module is for the legitimate verification to the final password:In the final password
All digital and its order it is correct, and hidden cipher therein is when being from hidden cipher module, judges final close
Code is correct;Otherwise, judge final password for mistake.
Being recognized based on hidden code for the present invention is as follows with the course of work and principle of the cell phone password protection system of implicit conversion:
(1) in input cryptographic processes, the coding of the button of button behavioural information acquisition module automatic data collection input password
Value, while in gathering the pressure size of button, the time length of button and input cryptographic processes or after just input one is digital
The button behavioural information such as the size at mobile phone angle of inclination, and the hidden code module formation hidden ciphers of Jing state hidden code definition mould to be encrypted in
Password position defined in block, Jing implicit conversions module carry out implicit expression change, Jing cipher code set matched moulds to the keyboard-coding value for gathering
Block forms final password, final password is verified by password authentication module;
(2) realizing that cryptographic system itself is anti-peeping, prevent the principle for cracking is:
A. due to the means None- identified button such as human eye, shooting pressure size, be difficult to distinguish the time length of button, make
The hidden cipher input password during " invisible ", can only during Password Input according to key press, press
The key time automatically generates, password authentication module certification described in Jing, and its hidden code value seems do not have with other numbers in password
What difference, even hidden cipher value is also preset by User Defined in place for institute, with personal unique and confidentiality.Therefore,
Even if password is seen by people during input through keyboard, other people also will because not correctly entering, though mobile phone angle of inclination is visible, due to angle
The encoded radio of degree code and its password position at place, other people cannot know, therefore other people will be unable to pass through by the input password seen
Certification, so that realize that the anti-peeping, anti-of password is cracked.
B. as the operation of mobile phone volume key has disguise, to the amount of the implicit conversion of coding that directly inputs can by with
Family is self-defined, therefore the implicit conversion realizes that same password has different flexible input methods, even if others sees input
Key-press digital during password, also cannot be further enhanced the anti-peeping, anti-of password and is cracked by certification after same input.
Compared with prior art, the present invention has following beneficial effect:
(1) present invention achieves the anti-peeping and anti-of mobile telephone cipher system itself cracks security, people can be released to certainly
The worry that own password is revealed.
(2) intelligent cipher protection system of the invention, anti-peeping, anti-can not cracking for more existing numerical ciphers itself, will
The anti-peeping, anti-of password cracks security lifting to 100%.
(3) intelligent cipher protection system of the invention, releases the biological information passwords such as fingerprint, DNA and is replicated, Er Qieyi
The stolen problem that will be unable to change of denier.
(4) Jing tests, the intelligent cipher protection system of the present invention is with the user discrimination suitable with existing password system
And user friendly.
Description of the drawings
Detailed description non-limiting example made with reference to the following drawings by reading, the further feature of the present invention,
Objects and advantages will become more apparent upon:
Fig. 1 is the present invention based on the identification of hidden code and the flow chart of the cell phone password protection system of implicit conversion.
Specific embodiment
With reference to specific embodiment, the present invention is described in detail.Following examples will be helpful to the technology of this area
Personnel further understand the present invention, but the invention is not limited in any way.It should be pointed out that the ordinary skill to this area
For personnel, without departing from the inventive concept of the premise, some changes and improvements can also be made.These belong to the present invention
Protection domain.
Embodiment 1
Shown in Fig. 1, embodiments providing a kind of cell phone password protection based on the identification of hidden code with implicit conversion is
System, it is fixed including Password Input module, button behavioural information acquisition module, hidden code definition module, hidden code identification module, implicit conversion
Adopted module, implicit conversion module, password combination module, password authentication module, wherein:The button behavioural information acquisition module from
Keyboard-coding and button behavioural information when the Password Input module obtains input password, the hidden code identification module is according to pressing
Key behavioural information is pressed the encoded radio of the hidden code defined in hidden code definition module and automatically forms hidden cipher, the implicit conversion module
Automatically the implicit conversion strategy defined in implicit conversion definition module is pressed to gathering from the button behavioural information acquisition module
To keyboard-coding carry out implicit conversion, the password combination module is automatically by after the hidden cipher, the implicit conversion
Password is by the self-defined strategy combination in the hidden code definition module, implicit conversion definition module into final password, the password
The legitimacy of final password described in authentication module automated validation.
The cell phone password protection system is additionally provided with Password Input tactile feedback module, by controlling the vibrations of mobile phone,
The length of key press time is fed back to user's finger, to improve user friendly.
When the information of button behavioural information acquisition module collection includes being input into password the coding of each button and by
The time length of key, the angle information of mobile phone level meter, " volume+" and " volume-" button for the mobile phone of implicit conversion are believed
Breath.
The hidden code module using the button time length and input cryptographic processes in or after just input one is digital
Mobile phone angle of inclination size, automatically form the hidden cipher such as timing code and angle code respectively, the timing code, angle code exist
Position and its encoded radio in the final password is predefined in the hidden code definition module, also can be made by oneself by user again
Justice.
The implicit conversion module utilize " volume+" and " volume-" key information to Password Input during press
Key encoded radio carries out implicit conversion, after input number:Often by once " volume+" button, then the keyboard-coding of input is added into one
Number (e.g., plus 1) or next letter;By once " volume-" button, then the keyboard-coding of firm input is ignored.So as to make user
Directly input keyboard-coding similar and different with true password, realize that same password has different flexible input methods.Wherein,
The amount of implicit conversion is predefined in the implicit conversion definition module, also can be by User Defined.
The password authentication module is for the legitimate verification to the final password:Whole numbers in the final password
Code and its order are correct, and timing code therein, angle code are when being from hidden cipher module, judge that final password is
Correctly;Otherwise, judge final password for mistake.
The course of work and principle of the system is as follows:
(1) in input cryptographic processes, the coding of the button of button behavioural information acquisition module automatic data collection input password
Value, at the same gather the button of button time length and input cryptographic processes in or mobile phone inclination angle after just input one is digital
The button behavioural information such as size of degree, and the hidden code modules of Jing form hidden cipher and state defined in hidden code definition module to be encrypted in
Password position, Jing implicit conversions module to gather keyboard-coding value carry out implicit expression change, Jing password combination modules are formed finally
Password, is verified to final password by password authentication module;
(2) realizing that cryptographic system itself is anti-peeping, prevent the principle for cracking is:A. as the means such as human eye, shooting are difficult to area
Divide the time length of button so that the hidden cipher, can only be in Password Input mistake during input password " invisible "
Automatically generated according to key press time in journey, password authentication module certification described in Jing, and other numbers in its hidden code value and password
Code seems to have no difference, and even hidden cipher value is also preset by User Defined in place for institute, with personal unique and protect
Close property.Therefore, even if password is seen by people during input through keyboard, other people also will because not correctly entering, though mobile phone angle of inclination can
See, but the password position at the encoded radio due to angle code and its place, other people cannot know, therefore other people are by the input password seen
Will be unable to by certification, so as to realize that the anti-peeping, anti-of password is cracked.B. as the operation of mobile phone volume key has disguise,
Can be by User Defined to the amount of the implicit conversion of the coding for directly inputting, therefore the implicit conversion realizes that same password has
Different flexible input methods, even if others sees key-press digital when being input into password, cannot also pass through certification after same input,
Further enhance the anti-peeping, anti-of password to crack.
The cell phone password protection system of the present embodiment, the keyboard-coding information being input on mobile phone by collection during password,
Simultaneously collection and key range pressure, key press time, by mobile phone as behaviors such as the angle informations of level meter during certain angle
Information, increases pressure, angle, three kinds of hidden ciphers of time in the digital code information of input, and has by volume key etc.
Operate concealed button to carry out the flexible input that implicit conversion realizes the distinct methods to same password, realize cell phone password
The anti-peeping and anti-of system itself cracks security, can release the worry that people are revealed to oneself password;More existing numerical ciphers
Itself anti-peeping, anti-can not crack, anti-peeping, anti-by password cracks security and lift 100%;Release fingerprint, DNA
It has been replicated etc. biological information password, once and the stolen problem that will be unable to change;Jing test, with existing password system
Suitable user discrimination and user friendly.
Embodiment 2
The present embodiment is for the mobile phone using 3D-touch screens.On the basis of embodiment 1, the Password Input sense of touch
Feedback module, also feeds back the size of key press to user's finger;The information of the button behavioural information acquisition module collection is also
Including the pressure size of each button during input password;The hidden code module is also automatically formed using the pressure size of the button
The hidden cipher of pressure code, position and its encoded radio of the pressure code in the final password also define mould in the hidden code
Predefine in block, also can be again self-defined by user;The password authentication module also verifies pressure code:In the final password
All digital and its order is correct, and timing code therein, angle code, pressure code are when being from hidden cipher module,
Judge that final password is correct;Otherwise, judge final password for mistake.
Embodiment 3
The present embodiment is for being provided without the mobile phone of 3D-touch screens and wishing the application demand of pressure code.Implementing
On the basis of example 2, the pressure size of the button, according to finger and the bigger original of the more big then pressure of mobile phone screen contact area
Reason, is judged by recognizing the contact area of finger and Mobile phone screen, and automatically forms the hidden cipher of pressure code.
Above the specific embodiment of the present invention is described.It is to be appreciated that the invention is not limited in above-mentioned
Particular implementation, those skilled in the art can make a variety of changes within the scope of the claims or change, this not shadow
Ring the flesh and blood of the present invention.In the case where not conflicting, the feature in embodiments herein and embodiment can any phase
Mutually combine.
Claims (10)
1. it is a kind of based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that including Password Input mould
Block, button behavioural information acquisition module, hidden code definition module, hidden code identification module, implicit conversion definition module, implicit conversion mould
Block, password combination module, password authentication module, wherein:The button behavioural information acquisition module is from the Password Input module
Keyboard-coding when being input into password and button behavioural information is obtained, the hidden code identification module presses hidden code according to button behavioural information
The encoded radio of the hidden code defined in definition module automatically forms hidden cipher, and it is fixed that the implicit conversion module presses implicit conversion automatically
Implicit conversion strategy defined in adopted module is carried out to the keyboard-coding collected from the button behavioural information acquisition module
The hidden cipher and the password after implicit conversion are defined mould by the hidden code by implicit conversion, the password combination module automatically
Self-defined strategy combination in block, implicit conversion definition module into final password, described in the password authentication module automated validation
The legitimacy of final password.
2. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that
Also include Password Input tactile feedback module, by control mobile phone vibrations, to user's finger feed back key press size and/
Or the length and/or the size at mobile phone angle of inclination of time, to improve user friendly.
3. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that
The coding of each button and the time of button when the information of the button behavioural information acquisition module collection includes being input into password
Length, the angle information of mobile phone level meter, for the key information of implicit conversion.
4. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that
The pressure of button when the button behavioural information acquisition module can be input into password to the mobile phone collection using 3D-Touch screens
Size.
5. according to claim 3 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that
For implicit conversion button for mobile phone " volume+" and " volume-" button.
6. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that
The hidden code module is using the pressure size of button and/or the time length of button and/or is input in cryptographic processes or just input
One it is digital after mobile phone angle of inclination size, automatically form hidden cipher respectively, including:Pressure code and/or timing code and/
Or angle code.
7. according to claim 6 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that
Position of the hidden cipher in the final password and/or encoded radio are defined in the hidden code definition module and can be by
User Defined.
8. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that
The implicit conversion module utilizes " volume+" and " volume-" key information to carry out the keyboard-coding value during Password Input
Implicit conversion, makes user's keyboard-coding entered from the keyboard similar and different with true password, so as to realize that same password has not
Same flexible input method.
9. according to claim 8 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that
The amount of implicit conversion is defined in the implicit conversion definition module and can be by User Defined.
10. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, its feature exists
In the password authentication module is for the legitimate verification to the final password:All digital in the final password and
Its order is correct, and hidden cipher therein is when being from hidden cipher module, judges that final password is correct;It is no
Then, judge final password for mistake.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610819200.9A CN106534479B (en) | 2016-09-12 | 2016-09-12 | Mobile phone password protection system based on hidden code identification and hidden transformation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610819200.9A CN106534479B (en) | 2016-09-12 | 2016-09-12 | Mobile phone password protection system based on hidden code identification and hidden transformation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534479A true CN106534479A (en) | 2017-03-22 |
CN106534479B CN106534479B (en) | 2019-12-20 |
Family
ID=58343907
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610819200.9A Expired - Fee Related CN106534479B (en) | 2016-09-12 | 2016-09-12 | Mobile phone password protection system based on hidden code identification and hidden transformation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534479B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109801050A (en) * | 2019-01-22 | 2019-05-24 | 深圳瑞银信信息技术有限公司 | A kind of mobile payment SDK and method of payment for online store |
CN110659461A (en) * | 2018-06-28 | 2020-01-07 | Oppo(重庆)智能科技有限公司 | Screen unlocking method and device, terminal and storage medium |
CN111444554A (en) * | 2020-02-28 | 2020-07-24 | 张家口浩扬科技有限公司 | Anti-peeping cipher device and cipher anti-peeping method thereof |
CN116030558A (en) * | 2023-03-27 | 2023-04-28 | 长沙鑫特科技有限公司 | Four kinds of business libraries of bank based on face identification and dynamic trick lock |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1598750A (en) * | 2004-07-27 | 2005-03-23 | 天津大学 | Gradient induction encrypted method |
CN104217142A (en) * | 2013-05-30 | 2014-12-17 | 华为终端有限公司 | Method and device for protecting terminal through power-on password |
CN105279405A (en) * | 2015-10-28 | 2016-01-27 | 同济大学 | Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof |
CN105354458A (en) * | 2015-11-03 | 2016-02-24 | 广东欧珀移动通信有限公司 | Password input verification method and system |
US20160202877A1 (en) * | 2008-02-08 | 2016-07-14 | Apple Inc. | Emergency information access on portable electronic devices |
-
2016
- 2016-09-12 CN CN201610819200.9A patent/CN106534479B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1598750A (en) * | 2004-07-27 | 2005-03-23 | 天津大学 | Gradient induction encrypted method |
US20160202877A1 (en) * | 2008-02-08 | 2016-07-14 | Apple Inc. | Emergency information access on portable electronic devices |
CN104217142A (en) * | 2013-05-30 | 2014-12-17 | 华为终端有限公司 | Method and device for protecting terminal through power-on password |
CN105279405A (en) * | 2015-10-28 | 2016-01-27 | 同济大学 | Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof |
CN105354458A (en) * | 2015-11-03 | 2016-02-24 | 广东欧珀移动通信有限公司 | Password input verification method and system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659461A (en) * | 2018-06-28 | 2020-01-07 | Oppo(重庆)智能科技有限公司 | Screen unlocking method and device, terminal and storage medium |
CN109801050A (en) * | 2019-01-22 | 2019-05-24 | 深圳瑞银信信息技术有限公司 | A kind of mobile payment SDK and method of payment for online store |
CN109801050B (en) * | 2019-01-22 | 2023-12-26 | 瑞银信支付技术有限公司 | Mobile payment SDK and payment method for online mall |
CN111444554A (en) * | 2020-02-28 | 2020-07-24 | 张家口浩扬科技有限公司 | Anti-peeping cipher device and cipher anti-peeping method thereof |
CN116030558A (en) * | 2023-03-27 | 2023-04-28 | 长沙鑫特科技有限公司 | Four kinds of business libraries of bank based on face identification and dynamic trick lock |
Also Published As
Publication number | Publication date |
---|---|
CN106534479B (en) | 2019-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105429761B (en) | A kind of key generation method and device | |
AU2016269267B2 (en) | Encoding methods and systems | |
KR101451639B1 (en) | Identification and theft prevention system using one times random key, and method thereof | |
US20110128121A1 (en) | Remote access procedure for electronic locks | |
CN104537300A (en) | Safe password setting and verifying mode | |
CN106534479A (en) | Cell phone password protection system based on implicit code identification and implicit conversion | |
WO2014141263A1 (en) | Asymmetric otp authentication system | |
Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
CN107864124A (en) | A kind of end message method for security protection, terminal and bluetooth lock | |
CN105956452A (en) | Method and system for unlocking device | |
JP6399605B2 (en) | Authentication apparatus, authentication method, and program | |
US20160188855A1 (en) | Secure PIN Entry | |
CN106355078A (en) | Intelligent password protecting system based on multifunctional-key behavior recognition | |
CN106101140A (en) | A kind of method of authentification of message and server | |
CN105653993A (en) | Password inputting method, apparatus and electronic device | |
KR20040025004A (en) | Certification system to certify password combined fingerprints | |
KR101624394B1 (en) | Device for authenticating password and operating method thereof | |
JP5774461B2 (en) | INPUT INFORMATION AUTHENTICATION DEVICE, SERVER DEVICE, INPUT INFORMATION AUTHENTICATION SYSTEM, AND DEVICE PROGRAM | |
Divya et al. | Visual authentication using QR code to prevent keylogging | |
CN112182556A (en) | Pressure dimension test system for intelligent unlocking | |
KR101860443B1 (en) | Password management system and method using wearable augmented reality device | |
CN111241531A (en) | Transaction identity authentication system based on block chain technology | |
CN104702414A (en) | Identity authentication method based on fingerprint information | |
CN211127846U (en) | Authentication terminal for compiling password based on identity authentication digital signature | |
CN114579945A (en) | Method for presetting unlocking password and fingerprint and character combined unlocking method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191220 |
|
CF01 | Termination of patent right due to non-payment of annual fee |