CN103607274B - A kind of method generating dynamic password with static password for source - Google Patents

A kind of method generating dynamic password with static password for source Download PDF

Info

Publication number
CN103607274B
CN103607274B CN201310499072.0A CN201310499072A CN103607274B CN 103607274 B CN103607274 B CN 103607274B CN 201310499072 A CN201310499072 A CN 201310499072A CN 103607274 B CN103607274 B CN 103607274B
Authority
CN
China
Prior art keywords
password
tographic
static
keyboard
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310499072.0A
Other languages
Chinese (zh)
Other versions
CN103607274A (en
Inventor
周灿旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310499072.0A priority Critical patent/CN103607274B/en
Publication of CN103607274A publication Critical patent/CN103607274A/en
Application granted granted Critical
Publication of CN103607274B publication Critical patent/CN103607274B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of method generating dynamic password with static password for source, including: S1 server end storage static password and index code;S2 server end is when receiving the Password Input request that user side sends every time, stochastic generation intermediate cryp-tographic mapping relations collection, index code as the intermediate cryp-tographic used when time Password Input, then generates dynamic password by the dynamic password mapping relations between this intermediate cryp-tographic and input keyboard in order to specify that these intermediate cryp-tographic mapping relations concentrate one;Intermediate cryp-tographic mapping relations collection is shown on the operation interface of user side by S3 server end, to point out user to utilize index code to find out intermediate cryp-tographic, then draws dynamic password by the dynamic password mapping relations of this intermediate cryp-tographic Yu input keyboard;The dynamic password that user inputs is sent to server end by S4 user side, and server end verifies that the dynamic password that the dynamic password that this user inputs obtains with step S2 is the most consistent.The present invention can improve the protection to static password.

Description

A kind of method generating dynamic password with static password for source
Technical field
The present invention relates to a kind of dynamic cipher method, specifically a kind of the closeest with static password for source generation The method of code.
Background technology
At present, the password input mode of the various fields such as finance, the Internet is still using static password as main body Part verification mode, individually inputs as authentication using static password, there is following many defects:
The most easily stolen take: due to the input of static password be user directly on keyboard by corresponding numeral or Letter is keyed in, and the 3rd people only need to record or watch the input process of this password, it is possible to obtains this password, and And be the full detail seen and the most likely steal password, therefore, static password is easy to by other people once Property is all stolen.
The most easily it is decrypted: even if the process of input password can only far be seen, also can be according to inputting static password every time Fixed position on keyboard, infers this password.
For solving the easily stolen defect taken of static password, prior art many employings dynamic verification code is as auxiliary Authentication mode, user, in the case of static password and dynamic password all input correctly, can obtain corresponding Operating right.
Existing dynamic verification code is the random digit combination producing change according to special algorithm, the reality of its main flow Existing form has short message password, hardware token, handset token.Wherein, short message password is to be received by SMS The dynamic verification code that server end generates, this dynamic verification code is inputted user together with static password by user again End, then carried out authentication by server end;The authentication flow process of hardware token and handset token is close with note The flow process of code is similar, and they are utilized respectively hardware token and cell phone software using real-time time as the variation factor, The dynamic verification code with server sync is produced by special algorithm.
The password input mode of above-mentioned " static password+dynamic verification code " has the disadvantage that
First, dynamic verification code needs extra equipment to receive or generates, exist dynamic verification code be intercepted or Person generates the risk that the tailor-made algorithm of dynamic verification code is cracked;
Second, the static password of user and existing dynamic password are to separate uncorrelated, need and dynamic verification code one Play input user side, it is impossible to reach the purpose protecting the former static password of user not peeped by other people, dynamic authentication Code is only capable of playing increases by one layer of effect ensured into authentication, and the risk that static password is stolen fails to reduce.
Summary of the invention
It is an object of the invention to provide a kind of in the case of not increasing ancillary equipment, static password can be pressed by user It is that input is dynamic that rule take its partial character to become the dynamic cipher method that the mode of dynamic password inputs, i.e. user Password rather than static password are as certificate data, even if being peeped the input process of static password by people, also Cannot disposably steal this static password such that it is able to be effectively improved the protection to static password.The present invention Purpose be to be realized by following technical measures, mentality of designing be every time input password time merely enter static state A part of character of password, the partial character of this input is determined by certain regular random:
A kind of method generating dynamic password with static password for source, the method comprises the following steps:
(S1) server end stores the static password by user preset and index code;
(S2) server end is when receiving the Password Input request that user is sent by user side every time, at random Generating intermediate cryp-tographic mapping relations collection, described index code is then to concentrate wherein as to these intermediate cryp-tographic mapping relations Article one, password mapping relations carry out the basic point selected, in order to the row culture specifying these intermediate cryp-tographic mapping relations to concentrate By the intermediate cryp-tographic used when time Password Input, then the closeest by between this intermediate cryp-tographic and input keyboard Code mapping relations generate dynamic password;
(S3) described intermediate cryp-tographic mapping relations collection is shown on the operation interface of user side by server end, with Prompting user utilizes index code to find out intermediate cryp-tographic, then maps with the dynamic password of this intermediate cryp-tographic with input keyboard Relation draws dynamic password, and inputs in the certificate data input window on user side operation interface;
(S4) dynamic password that user inputs is sent to server end by user side, and server end verifies this user The dynamic password of input is the most consistent with the dynamic password that described step (S2) obtains.
One embodiment of the present invention is: the intermediate cryp-tographic mapping relations collection of described server end stochastic generation shows Showing on the operation interface of user side, this operate the location arranged on interface and represent with reference to bar, location is with reference to bar It is one by multiple prohibition flags and to allow labelling alternately to intert the character sequence bar rearranged, is used for setting up static state Mapping relations between password and intermediate cryp-tographic, wherein, prohibition flag is defined as the static password symbol being labeled Forbid that input, i.e. intermediate cryp-tographic not use;The static password symbol permission allowing tag definitions to be labeled is defeated Enter, i.e. allow the character as intermediate cryp-tographic;Described index code is the random natural number value in 0~9, is used for Specify location with reference to corresponding using the labelling of the specific ranking based on this index code numerical value as static password in bar The first map tag, and regulation static password puts in order one by static password itself in location is with reference to bar One is corresponding, and wherein, the start bit symbol of static password is corresponding, by described taboo with described the first map tag Only static password is reduced into intermediate cryp-tographic by labelling.
The present invention can do following improvement: described location is with reference to prohibition flag on bar and allows alternately wearing of labelling Insert row sequential mode, it can be provided a kind of fixing mode;Can also be by server end at described step (S2) Middle random arrangement, makes dynamic sortord, when needing to carry out subscriber authentication every time, and server End all can generate new prohibition flag and allow the most interspersed sortord of labelling.
The present invention can quickly utilize location, with reference to bar, static password is converted into intermediate cryp-tographic for the ease of user, As location in the present invention with reference to the preferred implementation of bar, described location with reference to bar by BAIGE with color in lattice table Show, i.e. BAIGE represents that prohibition flag, the lattice that color in represent permission labelling, or turns around good, i.e. BAIGE represents Allow labelling, the lattice that color in represent prohibition flag, and BAIGE shows that it is in location is with reference to bar in the lattice that color in Ranking sequence number.
The specific pass that dynamic password mapping relations of the present invention are built upon between intermediate cryp-tographic and input keyboard Fastening, described input keyboard is made up of two or above keyboard lattice, and each keyboard lattice are by the numbering that puts in order And being wherein assigned different characters, described character can be some or multiple different English alphabet, no Same numeral or different letters combine with numeral, and numbering is then the numeral in 0~9, it is stipulated that intermediate cryp-tographic Every cipher symbol correspond to described input keyboard is assigned the keyboard lattice of identical characters by the order of self, And using the numbering on corresponding keyboard lattice as the symbol of dynamic password, i.e. generate one group of dynamic password.
The present invention can do following improvement further: on described input keyboard, the numbering of each keyboard lattice is all the time It is fixing, but the set-up mode of character in keyboard lattice, both can be to be changeless form;Can also be by taking The character that business device end is distributed on each keyboard lattice of random arrangement, i.e. input keyboard in described step (S2) exists Every time during Password Input all can change at random, even intermediate cryp-tographic is identical, the dynamic password of generation also can be different, Thus strengthen the decoding difficulty of static password, further improve the safety of static password.
In order to make static password have abundant compound mode to improve the difficulty that cracks of static password, and Being easy to user can quickly utilize keyboard lattice that intermediate cryp-tographic is converted into dynamic password, as keyboard lattice in the present invention Preferred implementation, described static password can be from " A~Z " 26 English alphabet symbols and " 0~9 " 10 Choosing optional sign in individual digit symbol to combine, described input keyboard is at least nine grids, in described step (S2) in, server end wherein three English alphabet symbols of eight equal random assortment of keyboard lattice to these nine grids With a digit symbol, to remaining two English alphabet symbols of a cell random assortment and two digits Number.
Index code of the present invention positions the basis with reference to map tag the first in bar as static password correspondence, Can by index code directly as static password in location with reference to the first map tag position on bar;Can also set Specific reckoning rule, the first map tag position as described in (index code+X) is, X is the Arbitrary Digit in 0~9 Word.
In order to improve the confidentiality of index code further, described index code specifies location with reference to specific ranking in bar The method of labelling is: look for the keyboard lattice of corresponding numbering with described index code, by the digit of distribution in these keyboard lattice Number subtract each other the numerical value obtained by the difference+1 of acquisition with index code and be i.e. appointed as described location with reference to the static state in bar Map tag position, password first place.When the keyboard lattice of index code reference numeral are assigned two digit symbols, by User presets select location preceding one or the posterior digit symbol conduct in position in server end The numeral that described difference operation is used.
The present invention can also do following improvement further: draws described intermediate cryp-tographic for the ease of user, In location with reference to arranging the first map tag option on bar, and prohibition flag can be made blank screen, it is allowed to labelling Directly display the user's static password character allowing input, after user selects any one the first map tag, Location is with reference to all demonstrating an intermediate cryp-tographic on bar, but only first place map tag option is shown time correct Intermediate cryp-tographic be correct.This scheme beneficially user quickly obtains intermediate cryp-tographic, without user Hua Shi Between comparison draw intermediate cryp-tographic with reference to bar forbidden symbol, but it can increase the risk being decrypted, it is therefore desirable to Use under conditions of described location is dynamic order mode with reference to bar.
In order to improve the safety of user cipher input further, in step (S2), described server is given birth at random The password mapping relations collection become is provided with effective time, after this effective time, closes when the password of secondary generation maps Assembly lost efficacy at once.
Compared with prior art, the present invention has a following beneficial effect:
First, the present invention passes through server end stochastic generation intermediate cryp-tographic mapping relations collection, and this is random close Code mapping relations collection shows on the operation interface of user side, and the intermediate cryp-tographic determined according to index code maps and closes Dynamic password mapping relations between intermediate cryp-tographic and keyboard that system generates generate dynamic password, and user is by above-mentioned Default static password can be converted into dynamic password by intermediate cryp-tographic mapping relations and dynamic password mapping relations, And with this dynamic password input user side thus realize password authentification, therefore, the present invention without user directly by quiet State password and index code input user side, but come real by the conversion regime of above-mentioned static password and dynamic password Existing password authentification, utilizes above-mentioned conversion regime that static password is achieved self-protection, greatly reduces static state Password and index code are stolen the risk of (being intercepted in transmitting procedure by spying on during including Password Input), Substantially increase the safety of certificate data.
Second, the present invention utilizes the mapping relations that location is set up between static password and intermediate cryp-tographic with reference to bar, will Static password is reduced into intermediate cryp-tographic according to location with reference to the corresponded manner of bar, and utilizes keyboard lattice to set up centre The mapping relations that intermediate cryp-tographic is randomly formed by server end are turned by the mapping relations between password and dynamic password Changing dynamic password into, therefore, the present invention accords with without using whole static passwords during a Password Input Number, but only using the static password symbol having arrived intermediate cryp-tographic part so that static password will not be the closeest Being leaked completely in code input process, the safety of static password will be ensured greatly, and at intermediate cryp-tographic In the case of being converted into dynamic password again, the safety of static password is further enhanced;
3rd, the present invention each password mapping relations all can be randomly formed mode to use so that static password is broken The difficulty translated increases significantly;
4th, the dynamic cipher method of the present invention can be implemented without extra equipment, has easy to use excellent Point;
5th, the present invention represents password mapping relations collection by location with reference to bar and keyboard lattice, therefore, and this Bright password mapping relations collection graphically can be changed mode and show on the operation interface of user side, contribute to user Index code therefrom rapid interpretive is utilized to go out required password mapping relations;
6th, index code of the present invention combines display digit symbol in keyboard lattice and calculates, to determine index code pair Location is with reference to the ranking number of map tag the first in bar, therefore, and the index code of the present invention finger to the first map tag Surely there is randomness, improve the confidentiality of index code, thus further such that the safety of static password obtains Improve.
Accompanying drawing explanation
The present invention is described in further detail with specific embodiment below in conjunction with the accompanying drawings:
Fig. 1 is the FB(flow block) of the embodiment of the present invention one;
Fig. 2 be the embodiment of the present invention one the first example in the location at user side operation interface with reference to bar and keyboard The schematic diagram of lattice;
Fig. 3 be the embodiment of the present invention one the first example in location set up static password and intermediate cryp-tographic with reference to bar Between the schematic diagram of mapping relations;
Fig. 4 is the user side operation interface schematic diagram of the first example of the embodiment of the present invention one;
Fig. 5 be the embodiment of the present invention one the second example in the location at user side operation interface with reference to bar and keyboard The schematic diagram of lattice;
Fig. 6 be the embodiment of the present invention one the second example in location set up static password and intermediate cryp-tographic with reference to bar Between the schematic diagram of mapping relations;
Fig. 7 is location reference bar and the schematic diagram of keyboard lattice at user side operation interface in the embodiment of the present invention two;
Fig. 8 is to position the mapping setting up between static password and intermediate cryp-tographic with reference to bar in the embodiment of the present invention two The schematic diagram of relation;
Fig. 9 is location reference bar and the schematic diagram of keyboard lattice at user side operation interface in the embodiment of the present invention three;
Figure 10 is to position the mapping setting up between static password and intermediate cryp-tographic with reference to bar in the embodiment of the present invention three The schematic diagram of relation;
In figure, A1-location is with reference to bar;A2-input keyboard.
Detailed description of the invention
Embodiment one
As shown in Figure 1 and Figure 4, the method generating dynamic password with static password for source of the embodiment of the present invention one Comprise the following steps:
(S1) server end stores the static password by user preset and index code;
(S2) server end is when receiving the Password Input request that user is sent by user side every time, at random Generating intermediate cryp-tographic mapping relations collection, described index code is then to concentrate wherein as to these intermediate cryp-tographic mapping relations Article one, password mapping relations carry out the basic point selected, in order to the row culture specifying these intermediate cryp-tographic mapping relations to concentrate By the intermediate cryp-tographic used when time Password Input, then the closeest by between this intermediate cryp-tographic and input keyboard Code mapping relations generate dynamic password;Further, when the password mapping relations collection of server stochastic generation is provided with effective Between, after this effective time, when the password mapping relations collection of secondary generation lost efficacy at once, need by user side weight The new Password Input that sends is asked, to generate new valid password mapping relations collection;
(S3) described intermediate cryp-tographic mapping relations collection is shown on the operation interface of user side by server end, with Prompting user utilizes index code to find out intermediate cryp-tographic, then maps with the dynamic password of this intermediate cryp-tographic with input keyboard Relation draws dynamic password, and inputs the certificate data input window on user side operation interface, i.e. Fig. 4 Keyboard lattice window in;
Wherein, above-mentioned display intermediate cryp-tographic mapping relations collection on the operation interface of user side is operated interface by this The location of upper setting represents (seeing Fig. 2) with reference to bar, and positioning with reference to bar is one by multiple prohibition flags and permission The most interspersed character sequence bar rearranged of labelling, for setting up the mapping between static password and intermediate cryp-tographic Relation, wherein, the static password symbol that prohibition flag is defined as being labeled forbids that input, i.e. intermediate cryp-tographic are not Use;Allowing tag definitions is that labeled static password symbol allows input, i.e. allows as intermediate cryp-tographic Character;Position the most interspersed sortord with reference to prohibition flag on bar and permission labelling by server end described Random arrangement in step (S2), makes dynamic sortord, needs to carry out subscriber authentication every time Time, server end all can generate new prohibition flag and allow the most interspersed sortord of labelling;Described location Representing by BAIGE and the lattice that color in reference to bar, BAIGE represents that permission labelling, the lattice that color in represent prohibition flag, and in vain Its ranking sequence number in location is with reference to bar of display in lattice and the lattice that color in.Described index code is any in 0~9 Natural numerical value, in specifying location with reference to bar using the labelling of the specific ranking based on this index code numerical value as The first map tag that static password is corresponding, and specify static password in location with reference in bar by static password itself The one_to_one corresponding that puts in order, wherein, the start bit symbol of static password is corresponding with described the first map tag, By described prohibition flag, static password is reduced into intermediate cryp-tographic.
Above-mentioned index code appointment location with reference to the method for the labelling of ranking specific in bar is: look for phase with described index code The keyboard lattice that should number, subtract each other difference+1 institute of acquisition by the digit symbol of distribution and index code in these keyboard lattice The numerical value obtained i.e. is appointed as described location with reference to the map tag position, static password first place in bar.When index code pair When the keyboard lattice that should number are assigned two digit symbols, user in server end, preset select location and exist Before one or the numeral that used as described difference operation of the posterior digit symbol in position.
Above-mentioned dynamic password mapping relations are built upon on the particular kind of relationship between intermediate cryp-tographic and input keyboard , owing to the static password of the present embodiment one is from " A~Z " 26 English alphabet symbols and " 0~9 " 10 Digit symbol is chosen optional sign combine, so described input keyboard is at least nine grids, the present embodiment One have chosen the nine grids being made up of nine keyboard lattice presses arrangement as keyboard lattice (seeing Fig. 2), each keyboard lattice Serial number and be wherein assigned different characters, described character can be some or multiple different English Alphabetical, different numerals or different letters combine with numeral, and numbering is then the numeral in 0~9, input On keyboard, the numbering of each keyboard lattice is fixing all the time, but in keyboard lattice, the set-up mode of character is by server end The character distributed on each keyboard lattice of random arrangement, i.e. input keyboard in described step (S2) is the closeest During code input all can change at random, even intermediate cryp-tographic is identical, the dynamic password of generation also can be different, thus Strengthen the decoding difficulty of static password, further improve the safety of static password;The present embodiment one services The device end wherein three English alphabet symbols of eight equal random assortment of keyboard lattice and a digit to these nine grids Number, to remaining two English alphabet symbols of a cell random assortment and two digit symbols.In the middle of regulation Every cipher symbol of password is pressed self order and is corresponded to be assigned in described input keyboard the key of identical characters Dish lattice, and using the numbering on corresponding keyboard lattice as the symbol of dynamic password, i.e. generate one group of dynamic password.
(S4) dynamic password that user inputs is sent to server end by user side, and server end verifies this user The dynamic password of input is the most consistent with the dynamic password that described step (S2) obtains.
Illustrate in above-mentioned steps (S3) below by two examples, user utilize index code pass through to show with The concrete operation step of password mapping relations collection acquisition dynamic password on the operation interface of family end:
First example is as in figure 2 it is shown, for server end to receive the password that user sent by user side defeated When entering to ask, stochastic generation password mapping relations collection, including location with reference to bar A1 and keyboard lattice A2;
Assuming that the static password that user presets in server end is " 123456 ", index code is " 2 ";
First, user specifies location with reference to the rule of the first map tag of bar according to index code, finds index code 2 pointed numberings are similarly the cell of 2, and the digit symbol in this cell 2 is 5 in this example, then Show that this digit symbol 5 is 3 with the difference of index code 2, then location is with reference to the ranking of the first map tag of bar Number it is 3+1=4;
Then, seeing Fig. 3, user is according to positioning reflecting between static password and intermediate cryp-tographic with reference to bar foundation Penetrating relation, corresponding to the first of static password cipher symbol " 1 " position the ranking number with reference to bar A1 is 4 The first map tag, in like manner, the second of static password to the 6th cipher symbol " 23456 " is successively with fixed Position is corresponding with reference to the labelling that ranking number is 5 to 9 of bar A1, thus according to should be used as allowing the sky of labelling The static password symbol permission input of BAIGE, the cipher symbol to the spacer-frame that should be used as prohibition flag forbid input Rule, show that intermediate cryp-tographic is " 1346 ";
Finally, the mapping relations between intermediate cryp-tographic and dynamic password that user sets up according to keyboard lattice, find out this In the keyboard lattice of example, be assigned to digit symbol 1 for numbered 4 cell, be assigned to digit symbol 3 For numbered 9 cell, be assigned to digit symbol 4 for numbered 1 cell, be assigned to numeral Symbol 6 for numbered 6 cell, it follows that the dynamic password in this Password Input is " 4916 ".
Shown in second instance graph 5, receiving, for server end, the Password Input that user is sent by user side During request, stochastic generation password mapping relations collection, including location with reference to bar A1 and keyboard lattice A2;Further, User presets in server end, when the keyboard lattice of index code reference numeral are assigned two digit symbols, The numeral that select location is used as difference operation at a digit symbol above.
Assuming that the static password that user presets in server end is " fd45gh54v ", index code is " 4 ";
First, user specifies location with reference to the rule of the first map tag of bar according to index code, finds index code 4 pointed numberings are similarly the cell of 4, and the previous digit symbol in this cell 4 is in this example 2, then show that this digit symbol 2 is 2 with the difference of index code 4, then location is with reference to the first map tag of bar Ranking number be 2+1=3;
Then, seeing Fig. 6, user is according to positioning reflecting between static password and intermediate cryp-tographic with reference to bar foundation Penetrating relation, corresponding to the first of static password cipher symbol " f " position the ranking number with reference to bar A1 is 3 The first map tag, in like manner, the second of static password to the 9th cipher symbol " d45gh54v " successively with Position the labelling that ranking number is 4 to 11 with reference to bar A1 corresponding, thus according to should be used as allowing labelling The static password symbol of blank cell allow input, the cipher symbol of the spacer-frame that should be used as prohibition flag forbidden The rule of input, show that intermediate cryp-tographic is " f45h4 ";
Finally, the mapping relations between intermediate cryp-tographic and dynamic password that user sets up according to keyboard lattice, find out this In the keyboard lattice of example, be assigned to alphabetic character f for numbered 3 cell, be assigned to digit symbol 4 For numbered 8 cell, be assigned to digit symbol 5 for numbered 7 cell, be assigned to letter Symbol h for numbered 5 cell, be assigned to digit symbol 4 for numbered 8 cell, thus Show that the dynamic password in this Password Input is " 38758 ".
Embodiment two
The method phase basic with embodiment one generating dynamic password with static password for source of the embodiment of the present invention two With, their difference is: the use index code that is not required to of the present embodiment two calculates rule meter by specific Calculate the location ranking number with reference to the first map tag of bar, but index code+1 is being determined as static password Position is with reference to the first map tag position on bar, and now index code is random natural number value, it is of course also possible to directly Using the numerical value of index code as static password in location with reference to the first map tag position on bar, but now index code Should be preset as be not 0 random natural number value, this kind of mode no longer illustrates.
Illustrate that user utilizes index code to pass through at the present embodiment two in step (S3) below by an example Display is the concrete operation step of password mapping relations collection acquisition dynamic password on the operation interface of user side:
As it is shown in fig. 7, for server end when receiving the Password Input request that user is sent by user side, Stochastic generation password mapping relations collection, including location with reference to bar A1 and keyboard lattice A2;
Assuming that the static password that user presets in server end is " gh2d0h4d6w1 ", index code is " 3 ";
First, the ranking number of the first map tag of location reference bar, equal to the numerical value+1 of index code, is 3+1=4;
Then, seeing Fig. 8, user is according to positioning reflecting between static password and intermediate cryp-tographic with reference to bar foundation Penetrating relation, corresponding to the first of static password cipher symbol " g " position the ranking number with reference to bar A1 is 4 The first map tag, in like manner, the second of static password to the 11st cipher symbol " h2d0h4d6w1 " Corresponding with reference to the labelling that ranking number is 5 to 14 of bar A1 with location successively, thus according to should be used as permitting Permitted the static password symbol permission input of the blank cell of labelling, the password symbol to the spacer-frame that should be used as prohibition flag Number forbid the rule of input, show that intermediate cryp-tographic is " g20hd61 ";
Finally, the mapping relations between intermediate cryp-tographic and dynamic password that user sets up according to keyboard lattice, find out this In the keyboard lattice of example, be assigned to alphabetic character g for numbered 4 cell, be assigned to digit symbol 2 For numbered 7 cell, be assigned to digit symbol 0 for numbered 4 cell, be assigned to letter Symbol h for numbered 4 cell, be assigned to alphabetic character d for numbered 8 cell, distribution To digit symbol 6 for numbered 2 cell, be assigned to digit symbol 1 for numbered 5 cell, Thus show that the dynamic password in this Password Input is " 4744825 ".
Embodiment three
The method phase basic with embodiment one generating dynamic password with static password for source of the embodiment of the present invention three With, their difference is: the input keyboard of the present embodiment three comprises ten keyboard lattice.It addition, input key Dish can also comprise 11 or above keyboard lattice, and adds the English character numbering as keyboard lattice, in fact Execute principle identical with the present embodiment three, do not repeat them here.
Illustrate that user utilizes index code to pass through at the present embodiment three in step (S3) below by an example Display is the concrete operation step of password mapping relations collection acquisition dynamic password on the operation interface of user side:
As it is shown in figure 9, for server end when receiving the Password Input request that user is sent by user side, Stochastic generation password mapping relations collection, including location with reference to bar A1 and keyboard lattice A2;Wherein, the present embodiment Illustrate as a example by the input keyboard that three employings comprise ten keyboard lattice and assume what user preset in server end Static password is " g34fg43fd ", and index code is " 0 ";
First, user specifies location with reference to the rule of the first map tag of bar according to index code, finds index code 0 pointed numbering is similarly the cell of 0, and the digit symbol in this cell 0 is 2 in this example, then Show that this digit symbol 2 is 2 with the difference of index code 0, then location is with reference to the ranking of the first map tag of bar Number it is 2+1=3;
Then, see Figure 10, between user's static password and intermediate cryp-tographic according to location reference bar foundation Mapping relations, correspond to the location ranking number with reference to bar A1 by the first of static password cipher symbol " g " Being the first map tag of 3, in like manner, the second of static password to the 9th cipher symbol " 34fg43fd " depends on Secondary corresponding with reference to the labelling that ranking number is 4 to 11 of bar A1 with location, thus according to should be used as allowing The static password symbol permission input of the blank cell of labelling, the cipher symbol to the spacer-frame that should be used as prohibition flag Forbid the rule of input, show that intermediate cryp-tographic is " g4f43d ";
Finally, the mapping relations between intermediate cryp-tographic and dynamic password that user sets up according to keyboard lattice, find out this In the keyboard lattice of example, be assigned to alphabetic character g for numbered 5 cell, be assigned to digit symbol 4 For numbered 2 cell, be assigned to alphabetic character f for numbered 5 cell, be assigned to numeral Symbol 4 for numbered 2 cell, be assigned to digit symbol 3 for numbered 1 cell, distribution To alphabetic character d for numbered 2 cell, it follows that the dynamic password in this Password Input is “525212”。
The present invention does not limit to and above-mentioned detailed description of the invention, according to foregoing, according to the ordinary skill of this area Knowledge and customary means, without departing under the present invention above-mentioned basic fundamental thought premise, the present invention can also make The equivalent modifications of other various ways, replace or change, all fall among protection scope of the present invention.Such as go up State location and also can be represented that prohibition flag, the lattice that color in represent permission labelling by BAIGE with reference in bar, color can be used Or shape is distinguished prohibition flag and allows labelling;And for example, keyboard lattice also can be by two or above numbering Cell forms, and each cell is assigned at least one intermediate cryp-tographic symbol;For another example, above-mentioned steps (S3) Middle location is with reference to prohibition flag on bar and allows the sortord that alternately interts of labelling can also be arranged to a kind of solid Fixed mode, or, on above-mentioned input keyboard, the numbering of each keyboard lattice is fixing all the time, word in keyboard lattice The set-up mode of symbol can also be changeless form;Selection range finally, for static password is less than " A~Z " 26 English alphabet symbols and the situation of " 0~9 " 10 digit symbols, such as, be only capable of from " A~Z " 26 English alphabet symbols are chosen, or is only capable of choosing from " 0~9 " 10 digit symbols, then input Keyboard can also only arrange eight keyboard lattice or less.

Claims (10)

1. the method generating dynamic password with static password for source, the method comprises the following steps:
(S1) server end stores the static password by user preset and index code;
(S2) server end is when receiving the Password Input request that user is sent by user side every time, at random Generating intermediate cryp-tographic mapping relations collection, described index code is then to concentrate wherein as to these intermediate cryp-tographic mapping relations Article one, password mapping relations carry out the basic point selected, in order to the row culture specifying these intermediate cryp-tographic mapping relations to concentrate By the intermediate cryp-tographic used when time Password Input, then the closeest by between this intermediate cryp-tographic and input keyboard Code mapping relations generate dynamic password;
(S3) described intermediate cryp-tographic mapping relations collection is shown on the operation interface of user side by server end, with Prompting user utilizes index code to find out intermediate cryp-tographic, then maps with the dynamic password of this intermediate cryp-tographic with input keyboard Relation draws dynamic password, and inputs in the certificate data input window on user side operation interface;
(S4) dynamic password that user inputs is sent to server end by user side, and server end verifies this user The dynamic password of input is the most consistent with the dynamic password that described step (S2) obtains.
The method generating dynamic password with static password for source the most according to claim 1, it is characterised in that: The intermediate cryp-tographic mapping relations collection of described server end stochastic generation shows on the operation interface of user side, by this Operation interface on arrange location represent with reference to bar, location with reference to bar be one by multiple prohibition flags and permission labelling The most interspersed character sequence bar rearranged, closes for setting up the mapping between static password and intermediate cryp-tographic System, wherein, the static password symbol that prohibition flag is defined as being labeled forbids input, i.e. intermediate cryp-tographic is not adopted With;Allowing tag definitions is that labeled static password symbol allows input, i.e. allows the word as intermediate cryp-tographic Symbol;Described index code is random natural number value, be used for specifying location with reference in bar based on this index code numerical value The labelling of specific ranking as the first map tag corresponding to static password, and specify that static password is in location ginseng According in bar by the one_to_one corresponding that puts in order of static password itself, wherein, the start bit symbol of static password and institute State the first map tag corresponding, by described prohibition flag, static password is reduced into intermediate cryp-tographic.
The method generating dynamic password with static password for source the most according to claim 2, it is characterised in that: The described the most interspersed sortord positioned with reference to prohibition flag on bar and permission labelling, is arranged to a kind of fixing Mode;Or, by server end random arrangement in described step (S2), make the side of sequence dynamically Formula, when needing to carry out subscriber authentication, server end all can generate new prohibition flag and allow labelling every time Alternately intert sortord.
The method generating dynamic password with static password for source the most according to claim 3, it is characterised in that: Described location is represented by BAIGE and the lattice that color in reference to bar, i.e. BAIGE represents that prohibition flag, the lattice that color in represent permission mark Note, or turns around good, i.e. BAIGE represents that permission labelling, the lattice that color in represent prohibition flag, and BAIGE and The lattice that color in its ranking sequence number in location is with reference to bar of interior display.
The method generating dynamic password with static password for source the most according to claim 2, it is characterised in that: Described dynamic password mapping relations are built upon on the particular kind of relationship between intermediate cryp-tographic and input keyboard, described Input keyboard is made up of two or above keyboard lattice, and each keyboard lattice are numbered by putting in order and wherein distributed Having different characters, described character is some or multiple different English alphabet, different numerals or difference Letter with numeral combination, numbering be then the numeral in 0~9, it is stipulated that every cipher symbol of intermediate cryp-tographic is pressed The order of self corresponds to be assigned in described input keyboard the keyboard lattice of identical characters, and by correspondence keyboard lattice Numbering as the symbol of dynamic password, i.e. generate one group of dynamic password.
The method generating dynamic password with static password for source the most according to claim 5, it is characterised in that: On described input keyboard, the numbering of each keyboard lattice is fixing all the time;But the set-up mode of character in keyboard lattice, It is changeless form, or, by server end random arrangement in described step (S2), i.e. input key The character distributed on each keyboard lattice of dish all can change at random when each Password Input.
The method generating dynamic password with static password for source the most according to claim 6, it is characterised in that: Described static password is to choose to appoint from " A~Z " 26 English alphabet symbols with " 0~9 " 10 digit symbols Meaning symbol combination, described input keyboard is at least nine grids, in described step (S2), server The end wherein three English alphabet symbols of eight equal random assortment of keyboard lattice and a digit symbol to these nine grids, To two English alphabet symbols of a remaining keyboard lattice random assortment and two digit symbols.
The method generating dynamic password with static password for source the most according to claim 7, it is characterised in that: Described index code appointment location with reference to the method for the labelling of ranking specific in bar is: look for corresponding volume with described index code Number keyboard lattice, obtained by these keyboard lattice, digit symbol and the index code of distribution subtract each other the difference+1 of acquisition Numerical value be i.e. appointed as described location with reference to the map tag position, static password first place in bar, and when index code pair When the keyboard lattice that should number are assigned two digit symbols, user in server end, preset select location and exist Before one or the numeral that used as described difference operation of the posterior digit symbol in position.
The method generating dynamic password with static password for source the most according to claim 2, it is characterised in that: In location with reference to arranging the first map tag option on bar, and prohibition flag is made blank screen, it is allowed to labelling is direct Display allows user's static password character of input, after user selects any one the first map tag, and location With reference to all demonstrating an intermediate cryp-tographic on bar, but during only first place map tag option is shown time correct Between password be correct.
10. according to the side generating dynamic password with static password for source described in claim 1 to 9 any one Method, it is characterised in that: in step (S2), the password mapping relations collection of described server stochastic generation has been provided with The effect time, after this effective time, when the password mapping relations collection of secondary generation lost efficacy at once.
CN201310499072.0A 2013-10-22 2013-10-22 A kind of method generating dynamic password with static password for source Expired - Fee Related CN103607274B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310499072.0A CN103607274B (en) 2013-10-22 2013-10-22 A kind of method generating dynamic password with static password for source

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310499072.0A CN103607274B (en) 2013-10-22 2013-10-22 A kind of method generating dynamic password with static password for source

Publications (2)

Publication Number Publication Date
CN103607274A CN103607274A (en) 2014-02-26
CN103607274B true CN103607274B (en) 2016-08-17

Family

ID=50125475

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310499072.0A Expired - Fee Related CN103607274B (en) 2013-10-22 2013-10-22 A kind of method generating dynamic password with static password for source

Country Status (1)

Country Link
CN (1) CN103607274B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187421A (en) * 2015-08-28 2015-12-23 张大圣 Account password command protection method
CN105871546A (en) * 2016-05-24 2016-08-17 张雪莱 Verification method combining static password and dynamic password and terminal equipment
CN106570363B (en) * 2016-10-26 2020-04-21 中国银联股份有限公司 Verification code generation and verification method
CN106650397B (en) * 2016-12-28 2019-12-13 深圳市忆捷创新科技有限公司 password generation method and device based on pattern lock and terminal
CN109472906B (en) * 2018-12-26 2020-11-10 上海银基信息安全技术股份有限公司 Digital key generation method, application method, device, system, terminal and medium
CN113660253A (en) * 2021-08-12 2021-11-16 上海酷栈科技有限公司 Terminal controller, method and system based on remote desktop protocol
CN115242450A (en) * 2022-06-23 2022-10-25 北卡科技有限公司 Password data input method, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6668369B1 (en) * 1999-12-29 2003-12-23 International Business Machines Corporation Software debugging tool for displaying dynamically written software code
CN1987938A (en) * 2006-12-25 2007-06-27 中国工商银行股份有限公司 Dynamic cipher method, system and dynamic cipher card
CN101442410A (en) * 2008-12-09 2009-05-27 深圳市戴文科技有限公司 Method and apparatus for generating dynamic cipher, and application system containing the apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6668369B1 (en) * 1999-12-29 2003-12-23 International Business Machines Corporation Software debugging tool for displaying dynamically written software code
CN1987938A (en) * 2006-12-25 2007-06-27 中国工商银行股份有限公司 Dynamic cipher method, system and dynamic cipher card
CN101442410A (en) * 2008-12-09 2009-05-27 深圳市戴文科技有限公司 Method and apparatus for generating dynamic cipher, and application system containing the apparatus

Also Published As

Publication number Publication date
CN103607274A (en) 2014-02-26

Similar Documents

Publication Publication Date Title
CN103607274B (en) A kind of method generating dynamic password with static password for source
US20190130092A1 (en) Fraud Resistant Passcode Entry System
CN103957106B (en) Self-defined two-way dynamic security Verification System
CN109891418A (en) Method for protecting the transaction executed from non-security terminal
US8850603B2 (en) System and method for enhancing device passcode security
CN105956857A (en) System and method for generating security virtual password keyboard
CN103034798A (en) Random password generation method and device
KR101473640B1 (en) Touch device and method for password generating on touch device
CN103996011A (en) Method and device for protecting codes to be input safely
CN102340402B (en) Identity authentication method based on visual cryptography
CN1220128C (en) Intelligent secret keyboard with key values being changed randomly
CN102710657B (en) A kind of one-time password generates method and system
CN102957688A (en) Password input and verification method and device
CN101655768A (en) Anti-peep password input method
JP2004213117A (en) Authentication system
CN107665298A (en) Password generation system and method based on figure
CN103631507A (en) Method and device for providing virtual keyboard
CN1848726A (en) Dynamic identifying method
US20170154173A1 (en) Array password authentication system and method thereof
CN101645123A (en) Identity certification system and method of hand-held mobile equipment with touch screen
CN101561714B (en) Group password input method
CN103034442A (en) Electronic equipment, device and method for unlocking screen thereof, and device and method for setting unlocking information
KR101039909B1 (en) User authentication system and method for immunizing from hacking
CN109102616B (en) Verifiable computer ranking method
CN106203010A (en) The unlocking pin method to set up of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 515000, Chaoyang District, Guangdong City, Shantou Province Cotton Street Cotton Street cotton road sixty acres, twenty-eight horizontal 24, 102

Applicant after: Zhou Canxu

Address before: A-501 garden 517000 east of Guangdong Province Guangzhou mountain Heyuan City

Applicant before: Zhou Canxu

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160817

Termination date: 20161022