CN102999714A - Password security judgment method and system - Google Patents

Password security judgment method and system Download PDF

Info

Publication number
CN102999714A
CN102999714A CN2011102708035A CN201110270803A CN102999714A CN 102999714 A CN102999714 A CN 102999714A CN 2011102708035 A CN2011102708035 A CN 2011102708035A CN 201110270803 A CN201110270803 A CN 201110270803A CN 102999714 A CN102999714 A CN 102999714A
Authority
CN
China
Prior art keywords
character
judge
password
inputting interface
numerical value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102708035A
Other languages
Chinese (zh)
Other versions
CN102999714B (en
Inventor
蔡景升
江玉如
林志祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acer Inc
Original Assignee
Acer Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Acer Inc filed Critical Acer Inc
Priority to CN201110270803.5A priority Critical patent/CN102999714B/en
Publication of CN102999714A publication Critical patent/CN102999714A/en
Application granted granted Critical
Publication of CN102999714B publication Critical patent/CN102999714B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a password security judgment method and a system. The password security judgment method is applied on the password security judgment system; the password security judgment system is connected with an input interface, and is used for judging whether a password built by a user through utilizing the input interface is safe or not; the input interface comprises a plurality of input characters; the password comprises a plurality of password characters; and each password character is selected from one of the input characters. The password security judgment method comprises the following steps of: receiving a first judgment character, wherein the first judgment character is selected from one of the password characters; receiving a second judgment character, wherein the second judgment character is selected from one of the password characters; providing a relative position relationship of the first judgment character and the second judgment character on the input interface; and judging whether the password is safe or not according to the relative position relationship through processor. According to the method and the system, the safety of the password can be improved.

Description

Cipher safety determination methods and system
Technical field
The present invention relates to a kind of cipher safety determination methods and system, particularly a kind of can be according to the relative position relation of code characters on inputting interface to judge cipher safety determination methods and the system of cipher safety.
Background technology
In modern's life, often have an opportunity to set up password, as found account, when concluding the business etc.And in order to protect individual privacy safety, system can give the password setting safety criterion, and the suggestion user should avoid using personal data when setting up password, such as date of birth, telephone number etc.And in user input or more during new password, give the intensity prompting of this group password, advise whether the user should use this group password.
And the way that the Current Password security detects is to judge whether the user inputs continuity numeral or word mostly, or no have with personal data such as birthday or phones detect.So when the user is convenient for figure, when using button setting code contiguous on the inputting interface, it is not enough that system just can't judge the security of this password.For example work as the user and use general keyboard, when inputting the password of 1QAZ or ZXCV and so on, that looks from the password content is also uncorrelated with user's personal data; But observing with keyboard configuration, but is one group of password of being attempted out easily, because above-mentioned password all uses button adjacent on the keyboard to set up.Therefore, be necessary to provide a kind of cipher safety determination methods and system, to solve the disappearance of prior art.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of cipher safety determination methods, this cipher safety determination methods is used for a cipher safety judgement system, this cipher safety judges that system is connected with an inputting interface, in order to judge that a user utilizes whether safety of a password that this inputting interface sets up, wherein this inputting interface comprises a plurality of input characters, this password comprises a plurality of code characters, wherein respectively this code characters be selected from these a plurality of input characters one of them, this cipher safety determination methods comprises: receive one first and judge character, wherein this first judge character be selected from these a plurality of code characters one of them; Receive one second and judge character, wherein this second judge character be selected from these a plurality of code characters one of them; This first judgement character and this second judgement character relative position relation at this inputting interface is provided; And by a processor, according to this relative position relation, judge whether safety of this password.
Another fundamental purpose of the present invention is to provide a kind of cipher safety to judge system, this cipher safety judges that system is connected with an inputting interface, in order to judge that a user utilizes whether safety of a password that this inputting interface sets up, wherein this inputting interface comprises a plurality of input characters, this password comprises a plurality of code characters, wherein respectively this code characters be selected from these a plurality of input characters one of them, this cipher safety judgement system comprises: a receiver module, provides module and a processor; This receiver module judges that in order to receive one first character and one second judges character, wherein this first judge character and this second judge character be selected from respectively these a plurality of code characters one of them; This provides module in order to this first judgement character and this second judgement character relative position relation at this inputting interface to be provided; This processor connects in the mode that is electrically connected and controls this receiver module and this provides module, and in order to according to this relative position relation, judges whether safety of this password.
The computer program that the present invention also provides a kind of interior storage to be used for continuity password determining program after computing machine is written into this program and carries out, can be finished said method.
The present invention also provides a kind of computer-readable recording medium of internally stored program, after computing machine is written into this program and carries out, can finish said method.
The present invention can judge whether safety of password, the security that improves password according to the relative position relation of code characters on inputting interface.
Description of drawings
Fig. 1 is the embodiment that cipher safety of the present invention is judged the environment for use of system.
Fig. 2 is the embodiment that cipher safety of the present invention is judged the system of systems framework.
Fig. 3 is that input character of the present invention is at an embodiment of the relative position relation of inputting interface.
Fig. 4 is an embodiment of the preparation process flow process of cipher safety determination methods of the present invention.
Fig. 5 (A) and Fig. 5 (B) are embodiment of the determining step flow process of cipher safety determination methods of the present invention.
Fig. 6 is that cipher safety determination methods of the present invention determines a whether embodiment of the steps flow chart of safety of password.
Fig. 7 is an embodiment of the correlation parameter of cipher safety determination methods of the present invention.
Fig. 8 is that code characters of the present invention is at an embodiment of the relative position relation of inputting interface.
The primary clustering symbol description:
Cipher safety is judged system's 1 receiver module 10
Provide module 20 mark computing modules 30
Total points numerical value 31 first numerical value 32
Second value 33 critical values 34
Processor 40 inputting interfaces 90
Input character 91
Adjacent character 92a, 92b, 92c, 92d, 92e, 92f
Relative direction 93a, 93b, 93c, 93d, 93e, 93f
User's 100 passwords 110,111
First password character 111a the second code characters 111b
The 3rd code characters 111c the 4th code characters 111d
The 5th code characters 111e the first moving direction 140
The second moving direction 141 the 3rd moving direction 142
Embodiment
For above and other purpose of the present invention, feature and advantage can be become apparent, cited below particularlyly go out specific embodiments of the invention, and cooperate appended accompanying drawing, be described in detail below.
Below please refer to Fig. 1, Fig. 1 is an embodiment who judges the environment for use of system about cipher safety of the present invention.In one embodiment of this invention, cipher safety judges that system 1 can be connected with inputting interface 90, utilizes whether safety of password that inputting interface 90 sets up 110 in order to judge user 100.Wherein inputting interface 90 comprises a plurality of input characters, and password 110 comprises a plurality of code characters, and each code characters is selected from a plurality of input characters one of them.
In one embodiment of this invention, cipher safety judges that system 1 is a desktop PC, but the present invention can be the electronic installation as notebook computer, mobile phone etc. not as limit.Inputting interface 90 is external physical keyboard, but the present invention is as limit, can also be dummy keyboard commonly used when logining Bank Account Number, or directly is attached to the physical keyboard on notebook computer or the mobile phone.
Then please refer to Fig. 2, Fig. 2 is an embodiment who judges the system of systems framework about cipher safety of the present invention.In one embodiment of this invention, cipher safety judge that system 1 comprises receiver module 10, module 20 is provided, mark computing module 30 and processor 40.Should be noted that above-mentioned modules is except can be configured to hardware unit, software program, firmware or its combination, but also mat circuit loop or the configuration of other suitable forms; And, modules except the configuration of form that can be independent, can also in conjunction with the form configuration.In addition, present embodiment is only illustrated preferred embodiment of the present invention for example, for avoiding giving unnecessary details, does not put down in writing in detail all possible variation combination.Yet those of ordinary skill in the art should be appreciated that above-mentioned each module or assembly may not be all necessity.And for implementing the present invention, also may comprise other than known module or the assembly of details.Each module or assembly all may the demand of looking be omitted or be revised, and wantonly two intermodules surely exist other modules or assembly.
Next please refer to Fig. 4 to Fig. 6, Fig. 4 to Fig. 6 is the embodiment about the steps flow chart of cipher safety determination methods of the present invention; And please in the lump with reference to figure 3, Fig. 7 and Fig. 8, Fig. 3, Fig. 7 and Fig. 8 are about a specific embodiment of the present invention.Below will judge that system 1 as example, illustrates cipher safety determination methods of the present invention take cipher safety shown in Figure 2.But should be noted that cipher safety determination methods of the present invention is not so that be used in cipher safety judgement system shown in Figure 2 and be limited.
Before carrying out the cipher safety judgement, need carry out first preparation process.Please examine Fig. 4, Fig. 4 is the embodiment about the preparation process flow process of cipher safety determination methods of the present invention.
At first carry out step 401: the relative position relation of obtaining the input character of inputting interface.
At first cipher safety judges that system 1 must obtain first the relative position relation of the input character of inputting interface 90, can be by providing module 20 to finish.Please refer to Fig. 3, Fig. 3 is about the embodiment of input character of the present invention at the relative position relation of inputting interface.Inputting interface 90 comprises a plurality of input characters as an external physical keyboard.Wherein input character 91 (being in the present embodiment D) has six adjacent character 92a~92f (being respectively in the present embodiment E, R, F, C, X, S) in inputting interface 90, and other characters and input character 91 are all non-adjacent.In addition, having six relative direction 93a~93f between input character 91 and six adjacent character 92a~92f (is respectively in the present embodiment D and shifts to E (upper left), D shifts to R (upper right), D shifts to F (right side), D shifts to C (bottom right), D shifts to X (lower-left) and D shifts to S (left side)), the relative direction that also defines between D and the D is the exception relative direction.In the present embodiment, cipher safety judges that system 1 is before carrying out the cipher safety judgement, must obtain first the relative position relation of the input character of inputting interface 90, namely each input character is adjacent with which input character, and the relative direction between these input characters adjacent one another are.But should be noted that cipher safety determination methods of the present invention might not need can also after receiving a certain input character, do indivedual judgements for this input character again obtaining at the very start the relative position relation of inputting interface 90 whole input characters; And the inputting interface that cipher safety determination methods of the present invention is suitable for is not limited with inputting interface shown in Figure 3 90.In addition, the relative position relation of the input character of inputting interface, not adjacent with which input character with certain input character, and the relative direction between input character adjacent one another are is limited, and can also comprise the relative position relation of other types.Also relevant for the relative position relation of input character how to obtain inputting interface 90, can judge in advance, be stored in the database after finishing, take when needed, also can judge that system 1 judges to obtain voluntarily by cipher safety.
Then carry out step 402: the initial value of setting total points numerical value.
Please refer to Fig. 7, Fig. 7 is the embodiment about the correlation parameter of cipher safety determination methods of the present invention.Behind the relative position relation of the input character of obtaining inputting interface 90, then need to set the initial value of total points numerical value.In the present embodiment, first the initial value of total points numerical value 31 is made as 0 at the beginning, this step can be carried out by mark computing module 30.
After preparation process is finished, can begin to receive password to carry out the judgement of cipher safety.Please refer to Fig. 5 (A) and Fig. 5 (B), Fig. 5 (A) and Fig. 5 (B) are the embodiment about the determining step flow process of cipher safety determination methods of the present invention.
At first carry out step 501: receive first and judge character.
Please refer to Fig. 7, in the present embodiment, suppose user's wish input password 111 (being in the present embodiment DFGGA), then at first receive first password character 111a (being D in the present embodiment) by receiver module 10 and judge character as first.Relevant for how receiving and identifying the code characters that receives, belong to the category of known technology, so do not give unnecessary details.
Then carry out step 502: receive second and judge character.
Please refer to Fig. 7, receiving the second code characters 111b by receiver module 10 equally is F in the present embodiment) judge character as second.
Then carry out step 503: judge that first judges that character and second judges whether character is identical or adjacent.
After receiving the first judgement character (D) and the second judgement character (F), then need by providing module 20 to judge that first judges that character (D) and second judges whether character (F) is identical or adjacent, provide module 20 to judge according to the relative position relation of the input character of the inputting interface 90 of in step 401, obtaining in advance, then carry out step 504 if be judged as; If be judged as otherwise carry out step 506.Please refer to Fig. 8, in the present embodiment, first judges that character (D) is adjacent one another are in inputting interface 90 with the second judgement character (F), so can proceed step 504.
If judge that first judges that character and the second judgement character are identical or adjacent, then carry out step 504: increase by the first numerical value to total points numerical value.
Please refer to Fig. 7.Judge first judge that character (D) and second judges that character (F) is adjacent after, can increase the first numerical value 32 (being 1 in the present embodiment) to total points numerical value 31 by mark computing module 30.After increasing by the first numerical value 32 in the present embodiment, the value of total points numerical value 31 changes to 1 by 0.
Then carry out step 505: judge the first relative direction of judging character from the first judgement character migration second.
Please refer to Fig. 8.If first judges that character (D) and the second judgement character (F) are identical or adjacent, then can judge the first moving direction 140 (in the present embodiment for to the right) of judging character (F) from the first judgement character (D) migration second by providing module 20 to continue, as the first relative direction.Provide module 20 to judge according to the relative position relation of the input character of the inputting interface 90 of in step 401, obtaining in advance.
Whether need increase by first numerical value to total points numerical value, then can continue to receive remaining code characters, and judge whether to need to increase second value to total points numerical value if judging.
Then carry out step 506: receive the 3rd and judge character.
Please refer to Fig. 7.Receive the 3rd code characters 111c (being G in the present embodiment) by receiver module 10 and judge character as the 3rd.
Then carry out step 507: judge that second judges that character and the 3rd judges whether character is identical or adjacent.
By being provided, module 20 judges that second judges that character (F) and the 3rd judges whether character (G) is identical or adjacent, provide module 20 to judge according to the relative position relation of the input character of the inputting interface 90 of in step 401, obtaining in advance, then carry out step 508 if be judged as; Otherwise carry out step 512.Please refer to Fig. 8, in the present embodiment, second judges that character (F) is adjacent one another are in inputting interface 90 with the 3rd judgement character (G), so can proceed step 508.
If judge that second judges that character and the 3rd judgement character are identical or adjacent, then carry out step 508: increase by the first numerical value to total points numerical value.
Please refer to Fig. 7.Judge second judge that character (F) and the 3rd judges that character (G) is adjacent after, can increase the first numerical value 32 (being 1 in the present embodiment) to total points numerical value 31 by mark computing module 30.After increasing by the first numerical value 32 in the present embodiment, the value of total points numerical value 31 changes to 2 by 1.
Then carry out step 509: judge the second relative direction of judging character from the second judgement character migration the 3rd.
Please refer to Fig. 8.If second judges that character (F) and the 3rd judgement character (G) are identical or adjacent, then can judge the second moving direction 141 (in the present embodiment for to the right) of judging character (G) from the second judgement character (F) migration the 3rd by providing module 20 to continue, as the second relative direction.Provide module 20 to judge according to the relative position relation of the input character of the inputting interface 90 of in step 401, obtaining in advance.
Then carry out step 510: judge whether the first relative direction and the second relative direction be identical.
Please refer to Fig. 8.After judging the second relative direction (to the right), can be by providing module 20 to judge whether the first relative direction (to the right) is identical with the second relative direction (to the right), if identically then carry out step 511; Otherwise carry out step 512.In the present embodiment, provide module 20 can judge the first relative direction and the second relative direction all is to right-hand movement, so can carry out step 511.
If it is identical judging the first relative direction and the second relative direction, then carry out step 511: increase second value to total points numerical value.
Please refer to Fig. 7.After judging that the first relative direction is identical with the second relative direction, can increase second value 33 (being 1 in the present embodiment) to total points numerical value 31 by mark computing module 30.After increasing second value 33 in the present embodiment, the value of total points numerical value 31 changes to 3 by 2.
Carry out step 512 at last: judge whether end of input of password.
Next need judge whether end of input of password.If inputted completely, then can carry out step 601 to judge the security of this password; If Password Length is greater than three characters, but then repeating step 506 is judged ensuing code characters to the flow process of step 512.
Please refer to Fig. 7, in the present embodiment, password 111 also comprises the 4th code characters 111d and the 5th code characters 111e (being respectively in the present embodiment G and A), so execution in step 506 again receives the 4th code characters 111d (G).This moment, the second code characters 111b (F), the 3rd code characters 111c (G) and the 4th code characters 111d (G) became respectively the judgement of first in cipher safety determination methods character, the second judgement character and the 3rd judgement character, and the second moving direction 141 of the second code characters 111b (F) migration the 3rd code characters 111c (G) becomes the first new relative direction.Then execution in step 507 judges that second judges that character (G) and the 3rd judges whether character (G) is identical or adjacent.Judged result finds that second judges that character (G) and the 3rd judgement character (G) are identical, so can proceed step 508, increase the first numerical value 32 (being 1 in the present embodiment) to total points numerical value 31, so the value of total points numerical value 31 changes to 4 by 3 by mark computing module 30.Then carry out step 509 again, judge the second relative direction of shifting to the 3rd judgement character (G) from the second judgement character (G).In this step, will shift to take the 3rd code characters 111c (G) the 3rd moving direction 142 (in the present embodiment as the exception relative direction) of the 4th code characters 111d (G), as the second relative direction.Then carry out step 510, judge whether the first relative direction is identical with the second relative direction, and the result is no, so total points numerical value 31 does not have any change, still maintains 4.Then execution in step 512 is judged not yet end of input of password 111 again, so execution in step 506 again.
In step 506, receive the 5th code characters 111e (A) by receiver module 10.This moment, the 3rd code characters 111c (G), the 4th code characters 111d (G) and the 5th code characters 111e (A) became respectively the judgement of first in cipher safety determination methods character, the second judgement character and the 3rd judgement character, and the 3rd moving direction 142 of the 3rd code characters 111c (G) migration the 4th code characters 111d (G) becomes the first new relative direction.Then execution in step 507 judges that second judges that character (G) and the 3rd judges whether character (A) is identical or adjacent.Judged result finds that both are not identical also non-conterminous, so total points numerical value 31 does not have any change, still maintains 4.Then directly carry out step 512, judge end of input of password 111, and stop the flow process of judgement.
At last, inputted completely when password, judged then whether this password is the flow process of a security password.Please refer to Fig. 6, Fig. 6 determines the whether flow chart of steps of safety of password about cipher safety determination methods of the present invention.
Carry out step 601: according to total points numerical value whether more than or equal to critical value, to judge that this password is as dangerous.
Please refer to Fig. 7.Complete in password 111 input, after total points numerical value 31 calculates and finishes, can be by processor 40 according to total points numerical value 31 whether more than or equal to critical value 34, to judge that password 111 is as dangerous.In the present embodiment, the account form of critical value 34 is that Password Length (being 5 in the present embodiment) multiply by a basic value (being 0.5 in the present embodiment), so critical value 34 is made as 2.5.Processor 40 is total points numerical value 31 and critical value 34 relatively, judges total points numerical value 31 greater than critical value 34, so judge that password 111 is dangerous.
Should be noted that herein cipher safety determination methods of the present invention is not limited with above-mentioned order of steps, as long as can reach purpose of the present invention, but the also change of above-mentioned order of steps.
To sum up institute is old, and no matter the present invention everywhere all shows it totally different in the feature of known technology with regard to purpose, means and effect, earnestly asks the auditor to perceive, and grants early quasi patent, makes Jiahui society, and the true feeling moral just.Only it should be noted that above-mentioned many embodiment give an example for convenience of explanation, the present invention's interest field required for protection should be as the criterion so that the scope of claims is described naturally, but not only limits to above-described embodiment.

Claims (12)

1. cipher safety determination methods, this cipher safety determination methods is used for a cipher safety judgement system, this cipher safety judges that system is connected with an inputting interface, in order to judge that a user utilizes whether safety of a password that this inputting interface sets up, wherein this inputting interface comprises a plurality of input characters, this password comprises a plurality of code characters, wherein respectively this code characters be selected from these a plurality of input characters one of them, this cipher safety determination methods comprises:
Receive one first and judge character, wherein this first judge character be selected from these a plurality of code characters one of them;
Receive one second and judge character, wherein this second judge character be selected from these a plurality of code characters one of them;
This first judgement character and this second judgement character relative position relation at this inputting interface is provided; And
By a processor, according to this relative position relation, judge whether safety of this password.
2. cipher safety determination methods as claimed in claim 1, wherein this relative position relation comprises that this first judges that character and this second judge whether character is identical or adjacent in the position of this inputting interface.
3. cipher safety determination methods as claimed in claim 2, wherein this relative position relation also is included in this inputting interface, first judges this second one first relative direction of judging character of character migration from this.
4. cipher safety determination methods as claimed in claim 3 also comprises:
Calculate a total points numerical value according to this relative position relation, wherein this total points numerical value is in order to judge whether safety of this password; And
If this first judgement character and this second judgement character are identical or adjacent in the position of this inputting interface, then increase by one first numerical value to this total points numerical value.
5. cipher safety determination methods as claimed in claim 4 also comprises:
Receive one the 3rd and judge character, wherein the 3rd judge character be selected from these a plurality of code characters one of them;
Judge that this second judges that character and the 3rd judges whether character is identical or adjacent in the position of this inputting interface; And
If this second judgement character and the 3rd judges that character is identical or adjacent in the position of this inputting interface, then carry out following steps:
Increase this first numerical value to this total points numerical value;
Judgement is judged one second relative direction of character from this second judgement character migration the 3rd in this inputting interface;
Judge whether this first relative direction is identical with this second relative direction; And
If this first relative direction is identical with this second relative direction, then increase by a second value to this total points numerical value.
6. cipher safety determination methods as claimed in claim 5, wherein this processor according to this total points numerical value whether more than or equal to a critical value, to judge that this password is as dangerous.
7. a cipher safety is judged system, this cipher safety judges that system is connected with an inputting interface, in order to judge that a user utilizes whether safety of a password that this inputting interface sets up, wherein this inputting interface comprises a plurality of input characters, this password comprises a plurality of code characters, wherein respectively this code characters be selected from these a plurality of input characters one of them, this cipher safety judgement system comprises:
One receiver module, this receiver module judges that in order to receive one first character and one second judges character, wherein this first judge character and this second judge character be selected from respectively these a plurality of code characters one of them;
One provides module, and this provides module in order to this first judgement character and this second judgement character relative position relation at this inputting interface to be provided; And
One processor, this processor connect in the mode that is electrically connected and control this receiver module and this provides module, and in order to according to this relative position relation, judge whether safety of this password.
8. cipher safety as claimed in claim 7 is judged system, and wherein this relative position relation comprises that this first judges that character and this second judge whether character is identical or adjacent in the position of this inputting interface.
9. cipher safety as claimed in claim 8 is judged system, and wherein this relative position relation also is included in this inputting interface, from one first relative direction of this this second judgement character of the first judgement character migration.
10. cipher safety as claimed in claim 9 is judged system, also comprises:
One mark computing module, this mark computing module and this processor are electrically connected, in order to calculate a total points numerical value according to this relative position relation, wherein this total points numerical value is in order to judge whether safety of this password, if and this first judges that character and this second judge that character is identical or adjacent in the position of this inputting interface, then increase by one first numerical value to this total points numerical value.
11. cipher safety as claimed in claim 10 is judged system, wherein this receiver module also can be judged character in order to receive one the 3rd, the 3rd judge character be selected from these a plurality of code characters one of them, this provides module also can second judge that character and the 3rd judges whether character is identical or adjacent in the position of this inputting interface in order to judge this, if this provides module to judge that this second judgement character and the 3rd judgement character are identical or adjacent in the position of this inputting interface, then this mark computing module also can be in order to increase this first numerical value to this total points numerical value, this provides the module also can be in order to judge in this inputting interface, judge one second relative direction of character from this second judgement character migration the 3rd, and judge whether this first relative direction is identical with this second relative direction, if this provides module to judge that this first relative direction is identical with this second relative direction, then this mark computing module also can be in order to increase by a second value to this total points numerical value.
12. judge system such as claim 10 or 11 described cipher safeties, wherein this processor also can in order to according to this total points numerical value whether more than or equal to a critical value, to judge that this password is as dangerous.
CN201110270803.5A 2011-09-14 2011-09-14 Password security judgment method and system Active CN102999714B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110270803.5A CN102999714B (en) 2011-09-14 2011-09-14 Password security judgment method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110270803.5A CN102999714B (en) 2011-09-14 2011-09-14 Password security judgment method and system

Publications (2)

Publication Number Publication Date
CN102999714A true CN102999714A (en) 2013-03-27
CN102999714B CN102999714B (en) 2016-04-06

Family

ID=47928272

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110270803.5A Active CN102999714B (en) 2011-09-14 2011-09-14 Password security judgment method and system

Country Status (1)

Country Link
CN (1) CN102999714B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573445A (en) * 2015-01-22 2015-04-29 陆忠敏 Password input method and device
CN107871075A (en) * 2016-09-28 2018-04-03 京瓷办公信息系统株式会社 Cipher authentication device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030074566A1 (en) * 2001-10-12 2003-04-17 Ari Hypponen Computer security method and apparatus
CA2637972A1 (en) * 2007-07-18 2009-01-18 Research In Motion Limited Security system based on input shortcuts for a computer device
CN101377804A (en) * 2008-09-28 2009-03-04 北京飞天诚信科技有限公司 Method and system for implementing start-up protection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030074566A1 (en) * 2001-10-12 2003-04-17 Ari Hypponen Computer security method and apparatus
CA2637972A1 (en) * 2007-07-18 2009-01-18 Research In Motion Limited Security system based on input shortcuts for a computer device
CN101377804A (en) * 2008-09-28 2009-03-04 北京飞天诚信科技有限公司 Method and system for implementing start-up protection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
何伊圣: "提高密码安全性的策略", 《信息安全与技术》, 10 December 2010 (2010-12-10), pages 17 - 22 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573445A (en) * 2015-01-22 2015-04-29 陆忠敏 Password input method and device
CN107871075A (en) * 2016-09-28 2018-04-03 京瓷办公信息系统株式会社 Cipher authentication device
CN107871075B (en) * 2016-09-28 2021-04-09 京瓷办公信息系统株式会社 Password authentication device

Also Published As

Publication number Publication date
CN102999714B (en) 2016-04-06

Similar Documents

Publication Publication Date Title
US8639295B2 (en) Method for unlocking screen, mobile electronic device using the same and storage medium thereof
CN101464741B (en) Touch panel and its use method and notebook computer with the same
US20130091468A1 (en) Individualized method for unlocking display screen on mobile computing device and system thereof
CN103139390A (en) Method, system of unlocking screen of mobile phone and mobile phone
CN105354474A (en) Method and device for avoiding misoperation by fingerprint confirmation, and mobile terminal
JP2013131164A (en) Information processing device having lock function and program for executing lock function
CN102193666A (en) Touch sensing method and system
EP2933988A1 (en) Information terminal device, information terminal control method, and program
CN108196928A (en) A kind of smart mobile phone or intelligent wearable equipment
CN103885772A (en) Unlocking method and electronic device
CN101911115A (en) Inter-pattern feature corresponding device, inter-pattern feature corresponding method used for the same, and program therefor
CN107370874A (en) Startup method, mobile terminal and the storage medium of application
CN102999714A (en) Password security judgment method and system
CN105930076A (en) Mobile communication terminal and method thereof for hiding selected object
CN104808933B (en) The solution lock control method and device of intelligent terminal
CN108650423A (en) Control method for screen display and device
CN106407761A (en) An unlocking method and unlocking device
CN102999295A (en) Electronic device provided with touch screen and method for selecting characters
CN105786370A (en) Method and device for unlocking user interface
CN106529264A (en) Application locking and unlocking method and apparatus
CN110188578A (en) A kind of method and apparatus of automatic shield information
CN103106015A (en) Electronic device with multiple unlocking functions and unlocking method thereof
CN105631297A (en) Method and device for multi-user unlocking
CN105574391A (en) Fingerprint unlocking method and terminal
CN105740692A (en) Unlocking method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant