A cryptographic anti-peeping device and anti-peeping method
A password and coordinate technology, which is applied in the password anti-peeping device and its anti-peeping field, can solve the problems of increasing the probability of leaking secrets, and achieve the effects of avoiding leaks, safe and reliable passwords, and improving security and reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] Such as figure 1 As shown, this example provides a cryptographic anti-peeping device, including:
[0038] Coordinate input module for randomly generating coordinate digital table;
[0039] A processing module, which is connected to the coordinate input module, receives and compares the coordinate digital information pressed by the coordinate input module;
[0040] A data center module for storing cryptographic data, and the data center module is connected to the processing module.
[0041] Wherein, the coordinate input module is used to randomly generate a coordinate number table, that is, a random number table corresponding to the coordinates, such as a two-dimensional random number table, so that the user can input a password according to the coordinates, and the coordinates corresponding to the coordinate numbers are the passwords, referred to as coordinate passwords; After each coordinate number is input, the coordinate input module will randomly generate a new random coor...
Embodiment 2
[0044] The difference from Example 1 is that the data center module in this example stores 6 sets of two-dimensional coordinate numbers. Preferably, the two-dimensional coordinate numbers are array-type coordinate numbers.
[0045] Wherein, the coordinate numbers corresponding to the 6 sets of two-dimensional coordinate numbers are 12 digits, which means that the password is a 12-digit coordinate password. The change password is preferably an array-type coordinate number, so that the user can remember the password by recording the array coordinates.
[0046] In the prior art, there is a one-to-one mapping between the traditional password and the password input operation. The operation of the user inputting the password is that the password number directly corresponds to the key number. Then the attacker only needs to crack the password number or Peeping the operation process is enough, so this process is reversible. If the input operation is leaked, the password can be easily crack...
Embodiment 3
[0057] This example also provides an anti-peeping method of the above cryptographic anti-peeping device, which includes the following steps:
[0058] Step of generating coordinate numbers, randomly generating coordinate number tables;
[0059] Press key step, when the key information is received, record the coordinates corresponding to the pressed coordinate number, and return to the step of generating coordinate numbers until the confirmation signal pressed by the user is received;
[0060] In the verification step, compare whether the coordinate password of the pressed coordinate number corresponds to the set password, until yes, the verification is completed; if it is not, it will prompt the password error and return to the coordinate number generation step.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 