[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106534479A - Cell phone password protection system based on implicit code identification and implicit conversion - Google Patents

Cell phone password protection system based on implicit code identification and implicit conversion Download PDF

Info

Publication number
CN106534479A
CN106534479A CN201610819200.9A CN201610819200A CN106534479A CN 106534479 A CN106534479 A CN 106534479A CN 201610819200 A CN201610819200 A CN 201610819200A CN 106534479 A CN106534479 A CN 106534479A
Authority
CN
China
Prior art keywords
password
module
implicit
implicit conversion
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610819200.9A
Other languages
Chinese (zh)
Other versions
CN106534479B (en
Inventor
杨熠欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI 01 POWER TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI 01 POWER TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI 01 POWER TECHNOLOGY Co Ltd filed Critical SHANGHAI 01 POWER TECHNOLOGY Co Ltd
Priority to CN201610819200.9A priority Critical patent/CN106534479B/en
Publication of CN106534479A publication Critical patent/CN106534479A/en
Application granted granted Critical
Publication of CN106534479B publication Critical patent/CN106534479B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a cell phone password protection system based on implicit code identification and implicit conversion. The cell phone password protection system comprises steps that a key pressing behavior information acquisition module is used to acquire a key pressing code and key pressing behavior information during input of a password from a password input module, and an implicit identification module is used to generate an implicit password according to a coded value of an implicit code defined by an implicit code definition module, and an implicit conversion module is used for the automatic implicit conversion of the key pressing codes acquired by the information acquisition module according to an implicit conversion strategy defined by the implicit conversion definition module, and a password combination module is used to combine the implicit password and the password after the implicit conversion automatically to form a final password according to self-defined strategies in the implicit code definition module and the implicit conversion definition module, and a password verification module is used to verify the validity of the final password. The cell phone password protection system is capable of solving safety problems of a cell phone password system such as peeping and cracking.

Description

Based on the identification of hidden code and the cell phone password protection system of implicit conversion
Technical field
A kind of a kind of the present invention relates to cipher protection system, in particular it relates to hand recognized based on hidden code with implicit conversion Machine cipher protection system.
Background technology
Password, as the patron saint of information security, is the important leverage of safeguarding of assets and information security.At present, extensively make Cryptographic system mainly has the biological information password such as numerical ciphers and fingerprint, brush face, DNA.Traditional numerical ciphers easily by People peeps, uses steathily, thereby results in the stolen case of property loss, personal information of common occurrence.Mobile phone, it has also become in people's life A part, be frequently utilized that mobile phone preserves personal information, shopping online etc..Therefore, the security of mobile telephone cipher system to close weight Will.At present, even if pattern password, finger-print cipher have been used for mobile phone, but still fail to solve how to prevent other people using shooting, steal The problem of decryption such as peep, for finger-print cipher also there is a problem of just changing Yi Dan being replicated by people.How hand is solved The anti-peeping, anti-of secret code system itself cracks safety issue, is the basic of solution cell phone password safety.
It is 2015 03 that literature searches of the Jing to prior art finds a notification number for CN 104408363A, the day for announcing Months 11 days, patent name for " security code system " Chinese patent, the patented technology includes input terminal, to store user pre- If fundamental cryptographic information database, for fundamental cryptographic to be encrypted computing and forms checking password according to encryption principle Cryptographic calculation unit and for verify the effective code in the password of user input whether with the encrypted computing of cryptographic calculation unit The authentication unit for verifying that the valid code word included by password is consistent of formation, input terminal are provided with for user input interference code With the input button of effective code, user is input into according to the input prompting of the encryption on input terminal display screen when password is input into Interference code and it is encrypted after effective code, strengthen Password Input security.Which is disadvantageous in that, by spying on, imaging, Can still obtain the password of input, and after being input into can by verifying, so as to do not reach cryptographic system itself it is anti-peeping, The anti-purpose for cracking.
The content of the invention
For defect of the prior art, it is an object of the invention to provide a kind of hand recognized based on hidden code with implicit conversion Machine cipher protection system, the anti-peeping, anti-of its current mobile telephone cipher system of energy effectively solving itself crack safety issue, and can Directly apply on existing mobile phone, realize the protection to people's information security and property safety.
For achieving the above object, the present invention is achieved by the following technical solutions.
The present invention based on the identification of hidden code and the cell phone password protection system of implicit conversion, including Password Input module, press It is key behavioural information acquisition module, hidden code definition module, hidden code identification module, implicit conversion definition module, implicit conversion module, close Code composite module, password authentication module, wherein:The button behavioural information acquisition module obtains defeated from the Password Input module Keyboard-coding when entering password and button behavioural information, the hidden code identification module define mould according to button behavioural information by hidden code The encoded radio of the hidden code defined in block automatically forms hidden cipher, and the implicit conversion module presses implicit conversion definition module automatically Defined in implicit conversion strategy implicit expression change is carried out to the keyboard-coding collected from the button behavioural information acquisition module Change, the password combination module automatically by the password after the hidden cipher, the implicit conversion by the hidden code definition module, Self-defined strategy combination in implicit conversion definition module is into final password, final described in the password authentication module automated validation The legitimacy of password.
Preferably, the cell phone password protection system is additionally provided with Password Input tactile feedback module, by controlling mobile phone Vibrations, to user's finger feed back key press size and/or the length of time and/or mobile phone angle of inclination size, with Improve user friendly.
Preferably, the coding of each button when the information of the button behavioural information acquisition module collection includes being input into password And the time length of button, the angle information of mobile phone level meter, for the key information of implicit conversion, can also be to adopting 3D- The pressure size of button during the mobile phone collection input password of Touch screens.
Preferably, " volume+" and " volume-" button of the button for implicit conversion for mobile phone.
Preferably, time length and/or the input of pressure size and/or button of the hidden code module using the button The size at the mobile phone angle of inclination in cryptographic processes or after just input one is digital, automatically forms pressure code and/or time respectively The hidden cipher such as code and/or angle code, position and/or these hidden ciphers of the hidden cipher in the final password Encoded radio is defined in the hidden code definition module and can be by User Defined.
Preferably, the implicit conversion module utilizes " volume+" and " volume-" key information to Password Input process In keyboard-coding value carry out implicit conversion, make user's keyboard-coding entered from the keyboard similar and different with true password, so as to Realize that same password has different flexible input methods;The amount of implicit conversion defined in the implicit conversion definition module simultaneously Can be by User Defined.
Preferably, the password authentication module is for the legitimate verification to the final password:In the final password All digital and its order it is correct, and hidden cipher therein is when being from hidden cipher module, judges final close Code is correct;Otherwise, judge final password for mistake.
Being recognized based on hidden code for the present invention is as follows with the course of work and principle of the cell phone password protection system of implicit conversion:
(1) in input cryptographic processes, the coding of the button of button behavioural information acquisition module automatic data collection input password Value, while in gathering the pressure size of button, the time length of button and input cryptographic processes or after just input one is digital The button behavioural information such as the size at mobile phone angle of inclination, and the hidden code module formation hidden ciphers of Jing state hidden code definition mould to be encrypted in Password position defined in block, Jing implicit conversions module carry out implicit expression change, Jing cipher code set matched moulds to the keyboard-coding value for gathering Block forms final password, final password is verified by password authentication module;
(2) realizing that cryptographic system itself is anti-peeping, prevent the principle for cracking is:
A. due to the means None- identified button such as human eye, shooting pressure size, be difficult to distinguish the time length of button, make The hidden cipher input password during " invisible ", can only during Password Input according to key press, press The key time automatically generates, password authentication module certification described in Jing, and its hidden code value seems do not have with other numbers in password What difference, even hidden cipher value is also preset by User Defined in place for institute, with personal unique and confidentiality.Therefore, Even if password is seen by people during input through keyboard, other people also will because not correctly entering, though mobile phone angle of inclination is visible, due to angle The encoded radio of degree code and its password position at place, other people cannot know, therefore other people will be unable to pass through by the input password seen Certification, so that realize that the anti-peeping, anti-of password is cracked.
B. as the operation of mobile phone volume key has disguise, to the amount of the implicit conversion of coding that directly inputs can by with Family is self-defined, therefore the implicit conversion realizes that same password has different flexible input methods, even if others sees input Key-press digital during password, also cannot be further enhanced the anti-peeping, anti-of password and is cracked by certification after same input.
Compared with prior art, the present invention has following beneficial effect:
(1) present invention achieves the anti-peeping and anti-of mobile telephone cipher system itself cracks security, people can be released to certainly The worry that own password is revealed.
(2) intelligent cipher protection system of the invention, anti-peeping, anti-can not cracking for more existing numerical ciphers itself, will The anti-peeping, anti-of password cracks security lifting to 100%.
(3) intelligent cipher protection system of the invention, releases the biological information passwords such as fingerprint, DNA and is replicated, Er Qieyi The stolen problem that will be unable to change of denier.
(4) Jing tests, the intelligent cipher protection system of the present invention is with the user discrimination suitable with existing password system And user friendly.
Description of the drawings
Detailed description non-limiting example made with reference to the following drawings by reading, the further feature of the present invention, Objects and advantages will become more apparent upon:
Fig. 1 is the present invention based on the identification of hidden code and the flow chart of the cell phone password protection system of implicit conversion.
Specific embodiment
With reference to specific embodiment, the present invention is described in detail.Following examples will be helpful to the technology of this area Personnel further understand the present invention, but the invention is not limited in any way.It should be pointed out that the ordinary skill to this area For personnel, without departing from the inventive concept of the premise, some changes and improvements can also be made.These belong to the present invention Protection domain.
Embodiment 1
Shown in Fig. 1, embodiments providing a kind of cell phone password protection based on the identification of hidden code with implicit conversion is System, it is fixed including Password Input module, button behavioural information acquisition module, hidden code definition module, hidden code identification module, implicit conversion Adopted module, implicit conversion module, password combination module, password authentication module, wherein:The button behavioural information acquisition module from Keyboard-coding and button behavioural information when the Password Input module obtains input password, the hidden code identification module is according to pressing Key behavioural information is pressed the encoded radio of the hidden code defined in hidden code definition module and automatically forms hidden cipher, the implicit conversion module Automatically the implicit conversion strategy defined in implicit conversion definition module is pressed to gathering from the button behavioural information acquisition module To keyboard-coding carry out implicit conversion, the password combination module is automatically by after the hidden cipher, the implicit conversion Password is by the self-defined strategy combination in the hidden code definition module, implicit conversion definition module into final password, the password The legitimacy of final password described in authentication module automated validation.
The cell phone password protection system is additionally provided with Password Input tactile feedback module, by controlling the vibrations of mobile phone, The length of key press time is fed back to user's finger, to improve user friendly.
When the information of button behavioural information acquisition module collection includes being input into password the coding of each button and by The time length of key, the angle information of mobile phone level meter, " volume+" and " volume-" button for the mobile phone of implicit conversion are believed Breath.
The hidden code module using the button time length and input cryptographic processes in or after just input one is digital Mobile phone angle of inclination size, automatically form the hidden cipher such as timing code and angle code respectively, the timing code, angle code exist Position and its encoded radio in the final password is predefined in the hidden code definition module, also can be made by oneself by user again Justice.
The implicit conversion module utilize " volume+" and " volume-" key information to Password Input during press Key encoded radio carries out implicit conversion, after input number:Often by once " volume+" button, then the keyboard-coding of input is added into one Number (e.g., plus 1) or next letter;By once " volume-" button, then the keyboard-coding of firm input is ignored.So as to make user Directly input keyboard-coding similar and different with true password, realize that same password has different flexible input methods.Wherein, The amount of implicit conversion is predefined in the implicit conversion definition module, also can be by User Defined.
The password authentication module is for the legitimate verification to the final password:Whole numbers in the final password Code and its order are correct, and timing code therein, angle code are when being from hidden cipher module, judge that final password is Correctly;Otherwise, judge final password for mistake.
The course of work and principle of the system is as follows:
(1) in input cryptographic processes, the coding of the button of button behavioural information acquisition module automatic data collection input password Value, at the same gather the button of button time length and input cryptographic processes in or mobile phone inclination angle after just input one is digital The button behavioural information such as size of degree, and the hidden code modules of Jing form hidden cipher and state defined in hidden code definition module to be encrypted in Password position, Jing implicit conversions module to gather keyboard-coding value carry out implicit expression change, Jing password combination modules are formed finally Password, is verified to final password by password authentication module;
(2) realizing that cryptographic system itself is anti-peeping, prevent the principle for cracking is:A. as the means such as human eye, shooting are difficult to area Divide the time length of button so that the hidden cipher, can only be in Password Input mistake during input password " invisible " Automatically generated according to key press time in journey, password authentication module certification described in Jing, and other numbers in its hidden code value and password Code seems to have no difference, and even hidden cipher value is also preset by User Defined in place for institute, with personal unique and protect Close property.Therefore, even if password is seen by people during input through keyboard, other people also will because not correctly entering, though mobile phone angle of inclination can See, but the password position at the encoded radio due to angle code and its place, other people cannot know, therefore other people are by the input password seen Will be unable to by certification, so as to realize that the anti-peeping, anti-of password is cracked.B. as the operation of mobile phone volume key has disguise, Can be by User Defined to the amount of the implicit conversion of the coding for directly inputting, therefore the implicit conversion realizes that same password has Different flexible input methods, even if others sees key-press digital when being input into password, cannot also pass through certification after same input, Further enhance the anti-peeping, anti-of password to crack.
The cell phone password protection system of the present embodiment, the keyboard-coding information being input on mobile phone by collection during password, Simultaneously collection and key range pressure, key press time, by mobile phone as behaviors such as the angle informations of level meter during certain angle Information, increases pressure, angle, three kinds of hidden ciphers of time in the digital code information of input, and has by volume key etc. Operate concealed button to carry out the flexible input that implicit conversion realizes the distinct methods to same password, realize cell phone password The anti-peeping and anti-of system itself cracks security, can release the worry that people are revealed to oneself password;More existing numerical ciphers Itself anti-peeping, anti-can not crack, anti-peeping, anti-by password cracks security and lift 100%;Release fingerprint, DNA It has been replicated etc. biological information password, once and the stolen problem that will be unable to change;Jing test, with existing password system Suitable user discrimination and user friendly.
Embodiment 2
The present embodiment is for the mobile phone using 3D-touch screens.On the basis of embodiment 1, the Password Input sense of touch Feedback module, also feeds back the size of key press to user's finger;The information of the button behavioural information acquisition module collection is also Including the pressure size of each button during input password;The hidden code module is also automatically formed using the pressure size of the button The hidden cipher of pressure code, position and its encoded radio of the pressure code in the final password also define mould in the hidden code Predefine in block, also can be again self-defined by user;The password authentication module also verifies pressure code:In the final password All digital and its order is correct, and timing code therein, angle code, pressure code are when being from hidden cipher module, Judge that final password is correct;Otherwise, judge final password for mistake.
Embodiment 3
The present embodiment is for being provided without the mobile phone of 3D-touch screens and wishing the application demand of pressure code.Implementing On the basis of example 2, the pressure size of the button, according to finger and the bigger original of the more big then pressure of mobile phone screen contact area Reason, is judged by recognizing the contact area of finger and Mobile phone screen, and automatically forms the hidden cipher of pressure code.
Above the specific embodiment of the present invention is described.It is to be appreciated that the invention is not limited in above-mentioned Particular implementation, those skilled in the art can make a variety of changes within the scope of the claims or change, this not shadow Ring the flesh and blood of the present invention.In the case where not conflicting, the feature in embodiments herein and embodiment can any phase Mutually combine.

Claims (10)

1. it is a kind of based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that including Password Input mould Block, button behavioural information acquisition module, hidden code definition module, hidden code identification module, implicit conversion definition module, implicit conversion mould Block, password combination module, password authentication module, wherein:The button behavioural information acquisition module is from the Password Input module Keyboard-coding when being input into password and button behavioural information is obtained, the hidden code identification module presses hidden code according to button behavioural information The encoded radio of the hidden code defined in definition module automatically forms hidden cipher, and it is fixed that the implicit conversion module presses implicit conversion automatically Implicit conversion strategy defined in adopted module is carried out to the keyboard-coding collected from the button behavioural information acquisition module The hidden cipher and the password after implicit conversion are defined mould by the hidden code by implicit conversion, the password combination module automatically Self-defined strategy combination in block, implicit conversion definition module into final password, described in the password authentication module automated validation The legitimacy of final password.
2. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that Also include Password Input tactile feedback module, by control mobile phone vibrations, to user's finger feed back key press size and/ Or the length and/or the size at mobile phone angle of inclination of time, to improve user friendly.
3. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that The coding of each button and the time of button when the information of the button behavioural information acquisition module collection includes being input into password Length, the angle information of mobile phone level meter, for the key information of implicit conversion.
4. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that The pressure of button when the button behavioural information acquisition module can be input into password to the mobile phone collection using 3D-Touch screens Size.
5. according to claim 3 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that For implicit conversion button for mobile phone " volume+" and " volume-" button.
6. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that The hidden code module is using the pressure size of button and/or the time length of button and/or is input in cryptographic processes or just input One it is digital after mobile phone angle of inclination size, automatically form hidden cipher respectively, including:Pressure code and/or timing code and/ Or angle code.
7. according to claim 6 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that Position of the hidden cipher in the final password and/or encoded radio are defined in the hidden code definition module and can be by User Defined.
8. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that The implicit conversion module utilizes " volume+" and " volume-" key information to carry out the keyboard-coding value during Password Input Implicit conversion, makes user's keyboard-coding entered from the keyboard similar and different with true password, so as to realize that same password has not Same flexible input method.
9. according to claim 8 based on the identification of hidden code and the cell phone password protection system of implicit conversion, it is characterised in that The amount of implicit conversion is defined in the implicit conversion definition module and can be by User Defined.
10. according to claim 1 based on the identification of hidden code and the cell phone password protection system of implicit conversion, its feature exists In the password authentication module is for the legitimate verification to the final password:All digital in the final password and Its order is correct, and hidden cipher therein is when being from hidden cipher module, judges that final password is correct;It is no Then, judge final password for mistake.
CN201610819200.9A 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation Expired - Fee Related CN106534479B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610819200.9A CN106534479B (en) 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610819200.9A CN106534479B (en) 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation

Publications (2)

Publication Number Publication Date
CN106534479A true CN106534479A (en) 2017-03-22
CN106534479B CN106534479B (en) 2019-12-20

Family

ID=58343907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610819200.9A Expired - Fee Related CN106534479B (en) 2016-09-12 2016-09-12 Mobile phone password protection system based on hidden code identification and hidden transformation

Country Status (1)

Country Link
CN (1) CN106534479B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109801050A (en) * 2019-01-22 2019-05-24 深圳瑞银信信息技术有限公司 A kind of mobile payment SDK and method of payment for online store
CN110659461A (en) * 2018-06-28 2020-01-07 Oppo(重庆)智能科技有限公司 Screen unlocking method and device, terminal and storage medium
CN111444554A (en) * 2020-02-28 2020-07-24 张家口浩扬科技有限公司 Anti-peeping cipher device and cipher anti-peeping method thereof
CN116030558A (en) * 2023-03-27 2023-04-28 长沙鑫特科技有限公司 Four kinds of business libraries of bank based on face identification and dynamic trick lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598750A (en) * 2004-07-27 2005-03-23 天津大学 Gradient induction encrypted method
CN104217142A (en) * 2013-05-30 2014-12-17 华为终端有限公司 Method and device for protecting terminal through power-on password
CN105279405A (en) * 2015-10-28 2016-01-27 同济大学 Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof
CN105354458A (en) * 2015-11-03 2016-02-24 广东欧珀移动通信有限公司 Password input verification method and system
US20160202877A1 (en) * 2008-02-08 2016-07-14 Apple Inc. Emergency information access on portable electronic devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598750A (en) * 2004-07-27 2005-03-23 天津大学 Gradient induction encrypted method
US20160202877A1 (en) * 2008-02-08 2016-07-14 Apple Inc. Emergency information access on portable electronic devices
CN104217142A (en) * 2013-05-30 2014-12-17 华为终端有限公司 Method and device for protecting terminal through power-on password
CN105279405A (en) * 2015-10-28 2016-01-27 同济大学 Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof
CN105354458A (en) * 2015-11-03 2016-02-24 广东欧珀移动通信有限公司 Password input verification method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659461A (en) * 2018-06-28 2020-01-07 Oppo(重庆)智能科技有限公司 Screen unlocking method and device, terminal and storage medium
CN109801050A (en) * 2019-01-22 2019-05-24 深圳瑞银信信息技术有限公司 A kind of mobile payment SDK and method of payment for online store
CN109801050B (en) * 2019-01-22 2023-12-26 瑞银信支付技术有限公司 Mobile payment SDK and payment method for online mall
CN111444554A (en) * 2020-02-28 2020-07-24 张家口浩扬科技有限公司 Anti-peeping cipher device and cipher anti-peeping method thereof
CN116030558A (en) * 2023-03-27 2023-04-28 长沙鑫特科技有限公司 Four kinds of business libraries of bank based on face identification and dynamic trick lock

Also Published As

Publication number Publication date
CN106534479B (en) 2019-12-20

Similar Documents

Publication Publication Date Title
CN105429761B (en) A kind of key generation method and device
AU2016269267B2 (en) Encoding methods and systems
KR101451639B1 (en) Identification and theft prevention system using one times random key, and method thereof
US20110128121A1 (en) Remote access procedure for electronic locks
CN104537300A (en) Safe password setting and verifying mode
CN106534479A (en) Cell phone password protection system based on implicit code identification and implicit conversion
WO2014141263A1 (en) Asymmetric otp authentication system
Shafique et al. Modern authentication techniques in smart phones: Security and usability perspective
CN107864124A (en) A kind of end message method for security protection, terminal and bluetooth lock
CN105956452A (en) Method and system for unlocking device
JP6399605B2 (en) Authentication apparatus, authentication method, and program
US20160188855A1 (en) Secure PIN Entry
CN106355078A (en) Intelligent password protecting system based on multifunctional-key behavior recognition
CN106101140A (en) A kind of method of authentification of message and server
CN105653993A (en) Password inputting method, apparatus and electronic device
KR20040025004A (en) Certification system to certify password combined fingerprints
KR101624394B1 (en) Device for authenticating password and operating method thereof
JP5774461B2 (en) INPUT INFORMATION AUTHENTICATION DEVICE, SERVER DEVICE, INPUT INFORMATION AUTHENTICATION SYSTEM, AND DEVICE PROGRAM
Divya et al. Visual authentication using QR code to prevent keylogging
CN112182556A (en) Pressure dimension test system for intelligent unlocking
KR101860443B1 (en) Password management system and method using wearable augmented reality device
CN111241531A (en) Transaction identity authentication system based on block chain technology
CN104702414A (en) Identity authentication method based on fingerprint information
CN211127846U (en) Authentication terminal for compiling password based on identity authentication digital signature
CN114579945A (en) Method for presetting unlocking password and fingerprint and character combined unlocking method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191220

CF01 Termination of patent right due to non-payment of annual fee