CN103607274B - A kind of method generating dynamic password with static password for source - Google Patents
A kind of method generating dynamic password with static password for source Download PDFInfo
- Publication number
- CN103607274B CN103607274B CN201310499072.0A CN201310499072A CN103607274B CN 103607274 B CN103607274 B CN 103607274B CN 201310499072 A CN201310499072 A CN 201310499072A CN 103607274 B CN103607274 B CN 103607274B
- Authority
- CN
- China
- Prior art keywords
- password
- tographic
- static
- keyboard
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The invention discloses a kind of method generating dynamic password with static password for source, including: S1 server end storage static password and index code;S2 server end is when receiving the Password Input request that user side sends every time, stochastic generation intermediate cryp-tographic mapping relations collection, index code as the intermediate cryp-tographic used when time Password Input, then generates dynamic password by the dynamic password mapping relations between this intermediate cryp-tographic and input keyboard in order to specify that these intermediate cryp-tographic mapping relations concentrate one;Intermediate cryp-tographic mapping relations collection is shown on the operation interface of user side by S3 server end, to point out user to utilize index code to find out intermediate cryp-tographic, then draws dynamic password by the dynamic password mapping relations of this intermediate cryp-tographic Yu input keyboard;The dynamic password that user inputs is sent to server end by S4 user side, and server end verifies that the dynamic password that the dynamic password that this user inputs obtains with step S2 is the most consistent.The present invention can improve the protection to static password.
Description
Technical field
The present invention relates to a kind of dynamic cipher method, specifically a kind of the closeest with static password for source generation
The method of code.
Background technology
At present, the password input mode of the various fields such as finance, the Internet is still using static password as main body
Part verification mode, individually inputs as authentication using static password, there is following many defects:
The most easily stolen take: due to the input of static password be user directly on keyboard by corresponding numeral or
Letter is keyed in, and the 3rd people only need to record or watch the input process of this password, it is possible to obtains this password, and
And be the full detail seen and the most likely steal password, therefore, static password is easy to by other people once
Property is all stolen.
The most easily it is decrypted: even if the process of input password can only far be seen, also can be according to inputting static password every time
Fixed position on keyboard, infers this password.
For solving the easily stolen defect taken of static password, prior art many employings dynamic verification code is as auxiliary
Authentication mode, user, in the case of static password and dynamic password all input correctly, can obtain corresponding
Operating right.
Existing dynamic verification code is the random digit combination producing change according to special algorithm, the reality of its main flow
Existing form has short message password, hardware token, handset token.Wherein, short message password is to be received by SMS
The dynamic verification code that server end generates, this dynamic verification code is inputted user together with static password by user again
End, then carried out authentication by server end;The authentication flow process of hardware token and handset token is close with note
The flow process of code is similar, and they are utilized respectively hardware token and cell phone software using real-time time as the variation factor,
The dynamic verification code with server sync is produced by special algorithm.
The password input mode of above-mentioned " static password+dynamic verification code " has the disadvantage that
First, dynamic verification code needs extra equipment to receive or generates, exist dynamic verification code be intercepted or
Person generates the risk that the tailor-made algorithm of dynamic verification code is cracked;
Second, the static password of user and existing dynamic password are to separate uncorrelated, need and dynamic verification code one
Play input user side, it is impossible to reach the purpose protecting the former static password of user not peeped by other people, dynamic authentication
Code is only capable of playing increases by one layer of effect ensured into authentication, and the risk that static password is stolen fails to reduce.
Summary of the invention
It is an object of the invention to provide a kind of in the case of not increasing ancillary equipment, static password can be pressed by user
It is that input is dynamic that rule take its partial character to become the dynamic cipher method that the mode of dynamic password inputs, i.e. user
Password rather than static password are as certificate data, even if being peeped the input process of static password by people, also
Cannot disposably steal this static password such that it is able to be effectively improved the protection to static password.The present invention
Purpose be to be realized by following technical measures, mentality of designing be every time input password time merely enter static state
A part of character of password, the partial character of this input is determined by certain regular random:
A kind of method generating dynamic password with static password for source, the method comprises the following steps:
(S1) server end stores the static password by user preset and index code;
(S2) server end is when receiving the Password Input request that user is sent by user side every time, at random
Generating intermediate cryp-tographic mapping relations collection, described index code is then to concentrate wherein as to these intermediate cryp-tographic mapping relations
Article one, password mapping relations carry out the basic point selected, in order to the row culture specifying these intermediate cryp-tographic mapping relations to concentrate
By the intermediate cryp-tographic used when time Password Input, then the closeest by between this intermediate cryp-tographic and input keyboard
Code mapping relations generate dynamic password;
(S3) described intermediate cryp-tographic mapping relations collection is shown on the operation interface of user side by server end, with
Prompting user utilizes index code to find out intermediate cryp-tographic, then maps with the dynamic password of this intermediate cryp-tographic with input keyboard
Relation draws dynamic password, and inputs in the certificate data input window on user side operation interface;
(S4) dynamic password that user inputs is sent to server end by user side, and server end verifies this user
The dynamic password of input is the most consistent with the dynamic password that described step (S2) obtains.
One embodiment of the present invention is: the intermediate cryp-tographic mapping relations collection of described server end stochastic generation shows
Showing on the operation interface of user side, this operate the location arranged on interface and represent with reference to bar, location is with reference to bar
It is one by multiple prohibition flags and to allow labelling alternately to intert the character sequence bar rearranged, is used for setting up static state
Mapping relations between password and intermediate cryp-tographic, wherein, prohibition flag is defined as the static password symbol being labeled
Forbid that input, i.e. intermediate cryp-tographic not use;The static password symbol permission allowing tag definitions to be labeled is defeated
Enter, i.e. allow the character as intermediate cryp-tographic;Described index code is the random natural number value in 0~9, is used for
Specify location with reference to corresponding using the labelling of the specific ranking based on this index code numerical value as static password in bar
The first map tag, and regulation static password puts in order one by static password itself in location is with reference to bar
One is corresponding, and wherein, the start bit symbol of static password is corresponding, by described taboo with described the first map tag
Only static password is reduced into intermediate cryp-tographic by labelling.
The present invention can do following improvement: described location is with reference to prohibition flag on bar and allows alternately wearing of labelling
Insert row sequential mode, it can be provided a kind of fixing mode;Can also be by server end at described step (S2)
Middle random arrangement, makes dynamic sortord, when needing to carry out subscriber authentication every time, and server
End all can generate new prohibition flag and allow the most interspersed sortord of labelling.
The present invention can quickly utilize location, with reference to bar, static password is converted into intermediate cryp-tographic for the ease of user,
As location in the present invention with reference to the preferred implementation of bar, described location with reference to bar by BAIGE with color in lattice table
Show, i.e. BAIGE represents that prohibition flag, the lattice that color in represent permission labelling, or turns around good, i.e. BAIGE represents
Allow labelling, the lattice that color in represent prohibition flag, and BAIGE shows that it is in location is with reference to bar in the lattice that color in
Ranking sequence number.
The specific pass that dynamic password mapping relations of the present invention are built upon between intermediate cryp-tographic and input keyboard
Fastening, described input keyboard is made up of two or above keyboard lattice, and each keyboard lattice are by the numbering that puts in order
And being wherein assigned different characters, described character can be some or multiple different English alphabet, no
Same numeral or different letters combine with numeral, and numbering is then the numeral in 0~9, it is stipulated that intermediate cryp-tographic
Every cipher symbol correspond to described input keyboard is assigned the keyboard lattice of identical characters by the order of self,
And using the numbering on corresponding keyboard lattice as the symbol of dynamic password, i.e. generate one group of dynamic password.
The present invention can do following improvement further: on described input keyboard, the numbering of each keyboard lattice is all the time
It is fixing, but the set-up mode of character in keyboard lattice, both can be to be changeless form;Can also be by taking
The character that business device end is distributed on each keyboard lattice of random arrangement, i.e. input keyboard in described step (S2) exists
Every time during Password Input all can change at random, even intermediate cryp-tographic is identical, the dynamic password of generation also can be different,
Thus strengthen the decoding difficulty of static password, further improve the safety of static password.
In order to make static password have abundant compound mode to improve the difficulty that cracks of static password, and
Being easy to user can quickly utilize keyboard lattice that intermediate cryp-tographic is converted into dynamic password, as keyboard lattice in the present invention
Preferred implementation, described static password can be from " A~Z " 26 English alphabet symbols and " 0~9 " 10
Choosing optional sign in individual digit symbol to combine, described input keyboard is at least nine grids, in described step
(S2) in, server end wherein three English alphabet symbols of eight equal random assortment of keyboard lattice to these nine grids
With a digit symbol, to remaining two English alphabet symbols of a cell random assortment and two digits
Number.
Index code of the present invention positions the basis with reference to map tag the first in bar as static password correspondence,
Can by index code directly as static password in location with reference to the first map tag position on bar;Can also set
Specific reckoning rule, the first map tag position as described in (index code+X) is, X is the Arbitrary Digit in 0~9
Word.
In order to improve the confidentiality of index code further, described index code specifies location with reference to specific ranking in bar
The method of labelling is: look for the keyboard lattice of corresponding numbering with described index code, by the digit of distribution in these keyboard lattice
Number subtract each other the numerical value obtained by the difference+1 of acquisition with index code and be i.e. appointed as described location with reference to the static state in bar
Map tag position, password first place.When the keyboard lattice of index code reference numeral are assigned two digit symbols, by
User presets select location preceding one or the posterior digit symbol conduct in position in server end
The numeral that described difference operation is used.
The present invention can also do following improvement further: draws described intermediate cryp-tographic for the ease of user,
In location with reference to arranging the first map tag option on bar, and prohibition flag can be made blank screen, it is allowed to labelling
Directly display the user's static password character allowing input, after user selects any one the first map tag,
Location is with reference to all demonstrating an intermediate cryp-tographic on bar, but only first place map tag option is shown time correct
Intermediate cryp-tographic be correct.This scheme beneficially user quickly obtains intermediate cryp-tographic, without user Hua Shi
Between comparison draw intermediate cryp-tographic with reference to bar forbidden symbol, but it can increase the risk being decrypted, it is therefore desirable to
Use under conditions of described location is dynamic order mode with reference to bar.
In order to improve the safety of user cipher input further, in step (S2), described server is given birth at random
The password mapping relations collection become is provided with effective time, after this effective time, closes when the password of secondary generation maps
Assembly lost efficacy at once.
Compared with prior art, the present invention has a following beneficial effect:
First, the present invention passes through server end stochastic generation intermediate cryp-tographic mapping relations collection, and this is random close
Code mapping relations collection shows on the operation interface of user side, and the intermediate cryp-tographic determined according to index code maps and closes
Dynamic password mapping relations between intermediate cryp-tographic and keyboard that system generates generate dynamic password, and user is by above-mentioned
Default static password can be converted into dynamic password by intermediate cryp-tographic mapping relations and dynamic password mapping relations,
And with this dynamic password input user side thus realize password authentification, therefore, the present invention without user directly by quiet
State password and index code input user side, but come real by the conversion regime of above-mentioned static password and dynamic password
Existing password authentification, utilizes above-mentioned conversion regime that static password is achieved self-protection, greatly reduces static state
Password and index code are stolen the risk of (being intercepted in transmitting procedure by spying on during including Password Input),
Substantially increase the safety of certificate data.
Second, the present invention utilizes the mapping relations that location is set up between static password and intermediate cryp-tographic with reference to bar, will
Static password is reduced into intermediate cryp-tographic according to location with reference to the corresponded manner of bar, and utilizes keyboard lattice to set up centre
The mapping relations that intermediate cryp-tographic is randomly formed by server end are turned by the mapping relations between password and dynamic password
Changing dynamic password into, therefore, the present invention accords with without using whole static passwords during a Password Input
Number, but only using the static password symbol having arrived intermediate cryp-tographic part so that static password will not be the closeest
Being leaked completely in code input process, the safety of static password will be ensured greatly, and at intermediate cryp-tographic
In the case of being converted into dynamic password again, the safety of static password is further enhanced;
3rd, the present invention each password mapping relations all can be randomly formed mode to use so that static password is broken
The difficulty translated increases significantly;
4th, the dynamic cipher method of the present invention can be implemented without extra equipment, has easy to use excellent
Point;
5th, the present invention represents password mapping relations collection by location with reference to bar and keyboard lattice, therefore, and this
Bright password mapping relations collection graphically can be changed mode and show on the operation interface of user side, contribute to user
Index code therefrom rapid interpretive is utilized to go out required password mapping relations;
6th, index code of the present invention combines display digit symbol in keyboard lattice and calculates, to determine index code pair
Location is with reference to the ranking number of map tag the first in bar, therefore, and the index code of the present invention finger to the first map tag
Surely there is randomness, improve the confidentiality of index code, thus further such that the safety of static password obtains
Improve.
Accompanying drawing explanation
The present invention is described in further detail with specific embodiment below in conjunction with the accompanying drawings:
Fig. 1 is the FB(flow block) of the embodiment of the present invention one;
Fig. 2 be the embodiment of the present invention one the first example in the location at user side operation interface with reference to bar and keyboard
The schematic diagram of lattice;
Fig. 3 be the embodiment of the present invention one the first example in location set up static password and intermediate cryp-tographic with reference to bar
Between the schematic diagram of mapping relations;
Fig. 4 is the user side operation interface schematic diagram of the first example of the embodiment of the present invention one;
Fig. 5 be the embodiment of the present invention one the second example in the location at user side operation interface with reference to bar and keyboard
The schematic diagram of lattice;
Fig. 6 be the embodiment of the present invention one the second example in location set up static password and intermediate cryp-tographic with reference to bar
Between the schematic diagram of mapping relations;
Fig. 7 is location reference bar and the schematic diagram of keyboard lattice at user side operation interface in the embodiment of the present invention two;
Fig. 8 is to position the mapping setting up between static password and intermediate cryp-tographic with reference to bar in the embodiment of the present invention two
The schematic diagram of relation;
Fig. 9 is location reference bar and the schematic diagram of keyboard lattice at user side operation interface in the embodiment of the present invention three;
Figure 10 is to position the mapping setting up between static password and intermediate cryp-tographic with reference to bar in the embodiment of the present invention three
The schematic diagram of relation;
In figure, A1-location is with reference to bar;A2-input keyboard.
Detailed description of the invention
Embodiment one
As shown in Figure 1 and Figure 4, the method generating dynamic password with static password for source of the embodiment of the present invention one
Comprise the following steps:
(S1) server end stores the static password by user preset and index code;
(S2) server end is when receiving the Password Input request that user is sent by user side every time, at random
Generating intermediate cryp-tographic mapping relations collection, described index code is then to concentrate wherein as to these intermediate cryp-tographic mapping relations
Article one, password mapping relations carry out the basic point selected, in order to the row culture specifying these intermediate cryp-tographic mapping relations to concentrate
By the intermediate cryp-tographic used when time Password Input, then the closeest by between this intermediate cryp-tographic and input keyboard
Code mapping relations generate dynamic password;Further, when the password mapping relations collection of server stochastic generation is provided with effective
Between, after this effective time, when the password mapping relations collection of secondary generation lost efficacy at once, need by user side weight
The new Password Input that sends is asked, to generate new valid password mapping relations collection;
(S3) described intermediate cryp-tographic mapping relations collection is shown on the operation interface of user side by server end, with
Prompting user utilizes index code to find out intermediate cryp-tographic, then maps with the dynamic password of this intermediate cryp-tographic with input keyboard
Relation draws dynamic password, and inputs the certificate data input window on user side operation interface, i.e. Fig. 4
Keyboard lattice window in;
Wherein, above-mentioned display intermediate cryp-tographic mapping relations collection on the operation interface of user side is operated interface by this
The location of upper setting represents (seeing Fig. 2) with reference to bar, and positioning with reference to bar is one by multiple prohibition flags and permission
The most interspersed character sequence bar rearranged of labelling, for setting up the mapping between static password and intermediate cryp-tographic
Relation, wherein, the static password symbol that prohibition flag is defined as being labeled forbids that input, i.e. intermediate cryp-tographic are not
Use;Allowing tag definitions is that labeled static password symbol allows input, i.e. allows as intermediate cryp-tographic
Character;Position the most interspersed sortord with reference to prohibition flag on bar and permission labelling by server end described
Random arrangement in step (S2), makes dynamic sortord, needs to carry out subscriber authentication every time
Time, server end all can generate new prohibition flag and allow the most interspersed sortord of labelling;Described location
Representing by BAIGE and the lattice that color in reference to bar, BAIGE represents that permission labelling, the lattice that color in represent prohibition flag, and in vain
Its ranking sequence number in location is with reference to bar of display in lattice and the lattice that color in.Described index code is any in 0~9
Natural numerical value, in specifying location with reference to bar using the labelling of the specific ranking based on this index code numerical value as
The first map tag that static password is corresponding, and specify static password in location with reference in bar by static password itself
The one_to_one corresponding that puts in order, wherein, the start bit symbol of static password is corresponding with described the first map tag,
By described prohibition flag, static password is reduced into intermediate cryp-tographic.
Above-mentioned index code appointment location with reference to the method for the labelling of ranking specific in bar is: look for phase with described index code
The keyboard lattice that should number, subtract each other difference+1 institute of acquisition by the digit symbol of distribution and index code in these keyboard lattice
The numerical value obtained i.e. is appointed as described location with reference to the map tag position, static password first place in bar.When index code pair
When the keyboard lattice that should number are assigned two digit symbols, user in server end, preset select location and exist
Before one or the numeral that used as described difference operation of the posterior digit symbol in position.
Above-mentioned dynamic password mapping relations are built upon on the particular kind of relationship between intermediate cryp-tographic and input keyboard
, owing to the static password of the present embodiment one is from " A~Z " 26 English alphabet symbols and " 0~9 " 10
Digit symbol is chosen optional sign combine, so described input keyboard is at least nine grids, the present embodiment
One have chosen the nine grids being made up of nine keyboard lattice presses arrangement as keyboard lattice (seeing Fig. 2), each keyboard lattice
Serial number and be wherein assigned different characters, described character can be some or multiple different English
Alphabetical, different numerals or different letters combine with numeral, and numbering is then the numeral in 0~9, input
On keyboard, the numbering of each keyboard lattice is fixing all the time, but in keyboard lattice, the set-up mode of character is by server end
The character distributed on each keyboard lattice of random arrangement, i.e. input keyboard in described step (S2) is the closeest
During code input all can change at random, even intermediate cryp-tographic is identical, the dynamic password of generation also can be different, thus
Strengthen the decoding difficulty of static password, further improve the safety of static password;The present embodiment one services
The device end wherein three English alphabet symbols of eight equal random assortment of keyboard lattice and a digit to these nine grids
Number, to remaining two English alphabet symbols of a cell random assortment and two digit symbols.In the middle of regulation
Every cipher symbol of password is pressed self order and is corresponded to be assigned in described input keyboard the key of identical characters
Dish lattice, and using the numbering on corresponding keyboard lattice as the symbol of dynamic password, i.e. generate one group of dynamic password.
(S4) dynamic password that user inputs is sent to server end by user side, and server end verifies this user
The dynamic password of input is the most consistent with the dynamic password that described step (S2) obtains.
Illustrate in above-mentioned steps (S3) below by two examples, user utilize index code pass through to show with
The concrete operation step of password mapping relations collection acquisition dynamic password on the operation interface of family end:
First example is as in figure 2 it is shown, for server end to receive the password that user sent by user side defeated
When entering to ask, stochastic generation password mapping relations collection, including location with reference to bar A1 and keyboard lattice A2;
Assuming that the static password that user presets in server end is " 123456 ", index code is " 2 ";
First, user specifies location with reference to the rule of the first map tag of bar according to index code, finds index code
2 pointed numberings are similarly the cell of 2, and the digit symbol in this cell 2 is 5 in this example, then
Show that this digit symbol 5 is 3 with the difference of index code 2, then location is with reference to the ranking of the first map tag of bar
Number it is 3+1=4;
Then, seeing Fig. 3, user is according to positioning reflecting between static password and intermediate cryp-tographic with reference to bar foundation
Penetrating relation, corresponding to the first of static password cipher symbol " 1 " position the ranking number with reference to bar A1 is 4
The first map tag, in like manner, the second of static password to the 6th cipher symbol " 23456 " is successively with fixed
Position is corresponding with reference to the labelling that ranking number is 5 to 9 of bar A1, thus according to should be used as allowing the sky of labelling
The static password symbol permission input of BAIGE, the cipher symbol to the spacer-frame that should be used as prohibition flag forbid input
Rule, show that intermediate cryp-tographic is " 1346 ";
Finally, the mapping relations between intermediate cryp-tographic and dynamic password that user sets up according to keyboard lattice, find out this
In the keyboard lattice of example, be assigned to digit symbol 1 for numbered 4 cell, be assigned to digit symbol 3
For numbered 9 cell, be assigned to digit symbol 4 for numbered 1 cell, be assigned to numeral
Symbol 6 for numbered 6 cell, it follows that the dynamic password in this Password Input is " 4916 ".
Shown in second instance graph 5, receiving, for server end, the Password Input that user is sent by user side
During request, stochastic generation password mapping relations collection, including location with reference to bar A1 and keyboard lattice A2;Further,
User presets in server end, when the keyboard lattice of index code reference numeral are assigned two digit symbols,
The numeral that select location is used as difference operation at a digit symbol above.
Assuming that the static password that user presets in server end is " fd45gh54v ", index code is " 4 ";
First, user specifies location with reference to the rule of the first map tag of bar according to index code, finds index code
4 pointed numberings are similarly the cell of 4, and the previous digit symbol in this cell 4 is in this example
2, then show that this digit symbol 2 is 2 with the difference of index code 4, then location is with reference to the first map tag of bar
Ranking number be 2+1=3;
Then, seeing Fig. 6, user is according to positioning reflecting between static password and intermediate cryp-tographic with reference to bar foundation
Penetrating relation, corresponding to the first of static password cipher symbol " f " position the ranking number with reference to bar A1 is 3
The first map tag, in like manner, the second of static password to the 9th cipher symbol " d45gh54v " successively with
Position the labelling that ranking number is 4 to 11 with reference to bar A1 corresponding, thus according to should be used as allowing labelling
The static password symbol of blank cell allow input, the cipher symbol of the spacer-frame that should be used as prohibition flag forbidden
The rule of input, show that intermediate cryp-tographic is " f45h4 ";
Finally, the mapping relations between intermediate cryp-tographic and dynamic password that user sets up according to keyboard lattice, find out this
In the keyboard lattice of example, be assigned to alphabetic character f for numbered 3 cell, be assigned to digit symbol 4
For numbered 8 cell, be assigned to digit symbol 5 for numbered 7 cell, be assigned to letter
Symbol h for numbered 5 cell, be assigned to digit symbol 4 for numbered 8 cell, thus
Show that the dynamic password in this Password Input is " 38758 ".
Embodiment two
The method phase basic with embodiment one generating dynamic password with static password for source of the embodiment of the present invention two
With, their difference is: the use index code that is not required to of the present embodiment two calculates rule meter by specific
Calculate the location ranking number with reference to the first map tag of bar, but index code+1 is being determined as static password
Position is with reference to the first map tag position on bar, and now index code is random natural number value, it is of course also possible to directly
Using the numerical value of index code as static password in location with reference to the first map tag position on bar, but now index code
Should be preset as be not 0 random natural number value, this kind of mode no longer illustrates.
Illustrate that user utilizes index code to pass through at the present embodiment two in step (S3) below by an example
Display is the concrete operation step of password mapping relations collection acquisition dynamic password on the operation interface of user side:
As it is shown in fig. 7, for server end when receiving the Password Input request that user is sent by user side,
Stochastic generation password mapping relations collection, including location with reference to bar A1 and keyboard lattice A2;
Assuming that the static password that user presets in server end is " gh2d0h4d6w1 ", index code is " 3 ";
First, the ranking number of the first map tag of location reference bar, equal to the numerical value+1 of index code, is
3+1=4;
Then, seeing Fig. 8, user is according to positioning reflecting between static password and intermediate cryp-tographic with reference to bar foundation
Penetrating relation, corresponding to the first of static password cipher symbol " g " position the ranking number with reference to bar A1 is 4
The first map tag, in like manner, the second of static password to the 11st cipher symbol " h2d0h4d6w1 "
Corresponding with reference to the labelling that ranking number is 5 to 14 of bar A1 with location successively, thus according to should be used as permitting
Permitted the static password symbol permission input of the blank cell of labelling, the password symbol to the spacer-frame that should be used as prohibition flag
Number forbid the rule of input, show that intermediate cryp-tographic is " g20hd61 ";
Finally, the mapping relations between intermediate cryp-tographic and dynamic password that user sets up according to keyboard lattice, find out this
In the keyboard lattice of example, be assigned to alphabetic character g for numbered 4 cell, be assigned to digit symbol 2
For numbered 7 cell, be assigned to digit symbol 0 for numbered 4 cell, be assigned to letter
Symbol h for numbered 4 cell, be assigned to alphabetic character d for numbered 8 cell, distribution
To digit symbol 6 for numbered 2 cell, be assigned to digit symbol 1 for numbered 5 cell,
Thus show that the dynamic password in this Password Input is " 4744825 ".
Embodiment three
The method phase basic with embodiment one generating dynamic password with static password for source of the embodiment of the present invention three
With, their difference is: the input keyboard of the present embodiment three comprises ten keyboard lattice.It addition, input key
Dish can also comprise 11 or above keyboard lattice, and adds the English character numbering as keyboard lattice, in fact
Execute principle identical with the present embodiment three, do not repeat them here.
Illustrate that user utilizes index code to pass through at the present embodiment three in step (S3) below by an example
Display is the concrete operation step of password mapping relations collection acquisition dynamic password on the operation interface of user side:
As it is shown in figure 9, for server end when receiving the Password Input request that user is sent by user side,
Stochastic generation password mapping relations collection, including location with reference to bar A1 and keyboard lattice A2;Wherein, the present embodiment
Illustrate as a example by the input keyboard that three employings comprise ten keyboard lattice and assume what user preset in server end
Static password is " g34fg43fd ", and index code is " 0 ";
First, user specifies location with reference to the rule of the first map tag of bar according to index code, finds index code
0 pointed numbering is similarly the cell of 0, and the digit symbol in this cell 0 is 2 in this example, then
Show that this digit symbol 2 is 2 with the difference of index code 0, then location is with reference to the ranking of the first map tag of bar
Number it is 2+1=3;
Then, see Figure 10, between user's static password and intermediate cryp-tographic according to location reference bar foundation
Mapping relations, correspond to the location ranking number with reference to bar A1 by the first of static password cipher symbol " g "
Being the first map tag of 3, in like manner, the second of static password to the 9th cipher symbol " 34fg43fd " depends on
Secondary corresponding with reference to the labelling that ranking number is 4 to 11 of bar A1 with location, thus according to should be used as allowing
The static password symbol permission input of the blank cell of labelling, the cipher symbol to the spacer-frame that should be used as prohibition flag
Forbid the rule of input, show that intermediate cryp-tographic is " g4f43d ";
Finally, the mapping relations between intermediate cryp-tographic and dynamic password that user sets up according to keyboard lattice, find out this
In the keyboard lattice of example, be assigned to alphabetic character g for numbered 5 cell, be assigned to digit symbol 4
For numbered 2 cell, be assigned to alphabetic character f for numbered 5 cell, be assigned to numeral
Symbol 4 for numbered 2 cell, be assigned to digit symbol 3 for numbered 1 cell, distribution
To alphabetic character d for numbered 2 cell, it follows that the dynamic password in this Password Input is
“525212”。
The present invention does not limit to and above-mentioned detailed description of the invention, according to foregoing, according to the ordinary skill of this area
Knowledge and customary means, without departing under the present invention above-mentioned basic fundamental thought premise, the present invention can also make
The equivalent modifications of other various ways, replace or change, all fall among protection scope of the present invention.Such as go up
State location and also can be represented that prohibition flag, the lattice that color in represent permission labelling by BAIGE with reference in bar, color can be used
Or shape is distinguished prohibition flag and allows labelling;And for example, keyboard lattice also can be by two or above numbering
Cell forms, and each cell is assigned at least one intermediate cryp-tographic symbol;For another example, above-mentioned steps (S3)
Middle location is with reference to prohibition flag on bar and allows the sortord that alternately interts of labelling can also be arranged to a kind of solid
Fixed mode, or, on above-mentioned input keyboard, the numbering of each keyboard lattice is fixing all the time, word in keyboard lattice
The set-up mode of symbol can also be changeless form;Selection range finally, for static password is less than
" A~Z " 26 English alphabet symbols and the situation of " 0~9 " 10 digit symbols, such as, be only capable of from " A~Z "
26 English alphabet symbols are chosen, or is only capable of choosing from " 0~9 " 10 digit symbols, then input
Keyboard can also only arrange eight keyboard lattice or less.
Claims (10)
1. the method generating dynamic password with static password for source, the method comprises the following steps:
(S1) server end stores the static password by user preset and index code;
(S2) server end is when receiving the Password Input request that user is sent by user side every time, at random
Generating intermediate cryp-tographic mapping relations collection, described index code is then to concentrate wherein as to these intermediate cryp-tographic mapping relations
Article one, password mapping relations carry out the basic point selected, in order to the row culture specifying these intermediate cryp-tographic mapping relations to concentrate
By the intermediate cryp-tographic used when time Password Input, then the closeest by between this intermediate cryp-tographic and input keyboard
Code mapping relations generate dynamic password;
(S3) described intermediate cryp-tographic mapping relations collection is shown on the operation interface of user side by server end, with
Prompting user utilizes index code to find out intermediate cryp-tographic, then maps with the dynamic password of this intermediate cryp-tographic with input keyboard
Relation draws dynamic password, and inputs in the certificate data input window on user side operation interface;
(S4) dynamic password that user inputs is sent to server end by user side, and server end verifies this user
The dynamic password of input is the most consistent with the dynamic password that described step (S2) obtains.
The method generating dynamic password with static password for source the most according to claim 1, it is characterised in that:
The intermediate cryp-tographic mapping relations collection of described server end stochastic generation shows on the operation interface of user side, by this
Operation interface on arrange location represent with reference to bar, location with reference to bar be one by multiple prohibition flags and permission labelling
The most interspersed character sequence bar rearranged, closes for setting up the mapping between static password and intermediate cryp-tographic
System, wherein, the static password symbol that prohibition flag is defined as being labeled forbids input, i.e. intermediate cryp-tographic is not adopted
With;Allowing tag definitions is that labeled static password symbol allows input, i.e. allows the word as intermediate cryp-tographic
Symbol;Described index code is random natural number value, be used for specifying location with reference in bar based on this index code numerical value
The labelling of specific ranking as the first map tag corresponding to static password, and specify that static password is in location ginseng
According in bar by the one_to_one corresponding that puts in order of static password itself, wherein, the start bit symbol of static password and institute
State the first map tag corresponding, by described prohibition flag, static password is reduced into intermediate cryp-tographic.
The method generating dynamic password with static password for source the most according to claim 2, it is characterised in that:
The described the most interspersed sortord positioned with reference to prohibition flag on bar and permission labelling, is arranged to a kind of fixing
Mode;Or, by server end random arrangement in described step (S2), make the side of sequence dynamically
Formula, when needing to carry out subscriber authentication, server end all can generate new prohibition flag and allow labelling every time
Alternately intert sortord.
The method generating dynamic password with static password for source the most according to claim 3, it is characterised in that:
Described location is represented by BAIGE and the lattice that color in reference to bar, i.e. BAIGE represents that prohibition flag, the lattice that color in represent permission mark
Note, or turns around good, i.e. BAIGE represents that permission labelling, the lattice that color in represent prohibition flag, and BAIGE and
The lattice that color in its ranking sequence number in location is with reference to bar of interior display.
The method generating dynamic password with static password for source the most according to claim 2, it is characterised in that:
Described dynamic password mapping relations are built upon on the particular kind of relationship between intermediate cryp-tographic and input keyboard, described
Input keyboard is made up of two or above keyboard lattice, and each keyboard lattice are numbered by putting in order and wherein distributed
Having different characters, described character is some or multiple different English alphabet, different numerals or difference
Letter with numeral combination, numbering be then the numeral in 0~9, it is stipulated that every cipher symbol of intermediate cryp-tographic is pressed
The order of self corresponds to be assigned in described input keyboard the keyboard lattice of identical characters, and by correspondence keyboard lattice
Numbering as the symbol of dynamic password, i.e. generate one group of dynamic password.
The method generating dynamic password with static password for source the most according to claim 5, it is characterised in that:
On described input keyboard, the numbering of each keyboard lattice is fixing all the time;But the set-up mode of character in keyboard lattice,
It is changeless form, or, by server end random arrangement in described step (S2), i.e. input key
The character distributed on each keyboard lattice of dish all can change at random when each Password Input.
The method generating dynamic password with static password for source the most according to claim 6, it is characterised in that:
Described static password is to choose to appoint from " A~Z " 26 English alphabet symbols with " 0~9 " 10 digit symbols
Meaning symbol combination, described input keyboard is at least nine grids, in described step (S2), server
The end wherein three English alphabet symbols of eight equal random assortment of keyboard lattice and a digit symbol to these nine grids,
To two English alphabet symbols of a remaining keyboard lattice random assortment and two digit symbols.
The method generating dynamic password with static password for source the most according to claim 7, it is characterised in that:
Described index code appointment location with reference to the method for the labelling of ranking specific in bar is: look for corresponding volume with described index code
Number keyboard lattice, obtained by these keyboard lattice, digit symbol and the index code of distribution subtract each other the difference+1 of acquisition
Numerical value be i.e. appointed as described location with reference to the map tag position, static password first place in bar, and when index code pair
When the keyboard lattice that should number are assigned two digit symbols, user in server end, preset select location and exist
Before one or the numeral that used as described difference operation of the posterior digit symbol in position.
The method generating dynamic password with static password for source the most according to claim 2, it is characterised in that:
In location with reference to arranging the first map tag option on bar, and prohibition flag is made blank screen, it is allowed to labelling is direct
Display allows user's static password character of input, after user selects any one the first map tag, and location
With reference to all demonstrating an intermediate cryp-tographic on bar, but during only first place map tag option is shown time correct
Between password be correct.
10. according to the side generating dynamic password with static password for source described in claim 1 to 9 any one
Method, it is characterised in that: in step (S2), the password mapping relations collection of described server stochastic generation has been provided with
The effect time, after this effective time, when the password mapping relations collection of secondary generation lost efficacy at once.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310499072.0A CN103607274B (en) | 2013-10-22 | 2013-10-22 | A kind of method generating dynamic password with static password for source |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310499072.0A CN103607274B (en) | 2013-10-22 | 2013-10-22 | A kind of method generating dynamic password with static password for source |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103607274A CN103607274A (en) | 2014-02-26 |
CN103607274B true CN103607274B (en) | 2016-08-17 |
Family
ID=50125475
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310499072.0A Expired - Fee Related CN103607274B (en) | 2013-10-22 | 2013-10-22 | A kind of method generating dynamic password with static password for source |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103607274B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187421A (en) * | 2015-08-28 | 2015-12-23 | 张大圣 | Account password command protection method |
CN105871546A (en) * | 2016-05-24 | 2016-08-17 | 张雪莱 | Verification method combining static password and dynamic password and terminal equipment |
CN106570363B (en) * | 2016-10-26 | 2020-04-21 | 中国银联股份有限公司 | Verification code generation and verification method |
CN106650397B (en) * | 2016-12-28 | 2019-12-13 | 深圳市忆捷创新科技有限公司 | password generation method and device based on pattern lock and terminal |
CN109472906B (en) * | 2018-12-26 | 2020-11-10 | 上海银基信息安全技术股份有限公司 | Digital key generation method, application method, device, system, terminal and medium |
CN113660253A (en) * | 2021-08-12 | 2021-11-16 | 上海酷栈科技有限公司 | Terminal controller, method and system based on remote desktop protocol |
CN115242450A (en) * | 2022-06-23 | 2022-10-25 | 北卡科技有限公司 | Password data input method, device and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6668369B1 (en) * | 1999-12-29 | 2003-12-23 | International Business Machines Corporation | Software debugging tool for displaying dynamically written software code |
CN1987938A (en) * | 2006-12-25 | 2007-06-27 | 中国工商银行股份有限公司 | Dynamic cipher method, system and dynamic cipher card |
CN101442410A (en) * | 2008-12-09 | 2009-05-27 | 深圳市戴文科技有限公司 | Method and apparatus for generating dynamic cipher, and application system containing the apparatus |
-
2013
- 2013-10-22 CN CN201310499072.0A patent/CN103607274B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6668369B1 (en) * | 1999-12-29 | 2003-12-23 | International Business Machines Corporation | Software debugging tool for displaying dynamically written software code |
CN1987938A (en) * | 2006-12-25 | 2007-06-27 | 中国工商银行股份有限公司 | Dynamic cipher method, system and dynamic cipher card |
CN101442410A (en) * | 2008-12-09 | 2009-05-27 | 深圳市戴文科技有限公司 | Method and apparatus for generating dynamic cipher, and application system containing the apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN103607274A (en) | 2014-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103607274B (en) | A kind of method generating dynamic password with static password for source | |
US20190130092A1 (en) | Fraud Resistant Passcode Entry System | |
CN103957106B (en) | Self-defined two-way dynamic security Verification System | |
CN109891418A (en) | Method for protecting the transaction executed from non-security terminal | |
US8850603B2 (en) | System and method for enhancing device passcode security | |
CN105956857A (en) | System and method for generating security virtual password keyboard | |
CN103034798A (en) | Random password generation method and device | |
KR101473640B1 (en) | Touch device and method for password generating on touch device | |
CN103996011A (en) | Method and device for protecting codes to be input safely | |
CN102340402B (en) | Identity authentication method based on visual cryptography | |
CN1220128C (en) | Intelligent secret keyboard with key values being changed randomly | |
CN102710657B (en) | A kind of one-time password generates method and system | |
CN102957688A (en) | Password input and verification method and device | |
CN101655768A (en) | Anti-peep password input method | |
JP2004213117A (en) | Authentication system | |
CN107665298A (en) | Password generation system and method based on figure | |
CN103631507A (en) | Method and device for providing virtual keyboard | |
CN1848726A (en) | Dynamic identifying method | |
US20170154173A1 (en) | Array password authentication system and method thereof | |
CN101645123A (en) | Identity certification system and method of hand-held mobile equipment with touch screen | |
CN101561714B (en) | Group password input method | |
CN103034442A (en) | Electronic equipment, device and method for unlocking screen thereof, and device and method for setting unlocking information | |
KR101039909B1 (en) | User authentication system and method for immunizing from hacking | |
CN109102616B (en) | Verifiable computer ranking method | |
CN106203010A (en) | The unlocking pin method to set up of mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 515000, Chaoyang District, Guangdong City, Shantou Province Cotton Street Cotton Street cotton road sixty acres, twenty-eight horizontal 24, 102 Applicant after: Zhou Canxu Address before: A-501 garden 517000 east of Guangdong Province Guangzhou mountain Heyuan City Applicant before: Zhou Canxu |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160817 Termination date: 20161022 |