Unlock instant, AI-driven research and patent intelligence for your innovation.

A cryptographic anti-peeping device and anti-peeping method

A password and coordinate technology, which is applied in the password anti-peeping device and its anti-peeping field, can solve the problems of increasing the probability of leaking secrets, and achieve the effects of avoiding leaks, safe and reliable passwords, and improving security and reliability

Active Publication Date: 2016-05-04
李思洋
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the existing password has been attacked many times, the attacker can eliminate it by comparing the password input process several times, so that there are fewer possible passwords remaining and the chance of leaking will increase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cryptographic anti-peeping device and anti-peeping method
  • A cryptographic anti-peeping device and anti-peeping method
  • A cryptographic anti-peeping device and anti-peeping method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Such as figure 1 As shown, this example provides a cryptographic anti-peeping device, including:

[0038] Coordinate input module for randomly generating coordinate digital table;

[0039] A processing module, which is connected to the coordinate input module, receives and compares the coordinate digital information pressed by the coordinate input module;

[0040] A data center module for storing cryptographic data, and the data center module is connected to the processing module.

[0041] Wherein, the coordinate input module is used to randomly generate a coordinate number table, that is, a random number table corresponding to the coordinates, such as a two-dimensional random number table, so that the user can input a password according to the coordinates, and the coordinates corresponding to the coordinate numbers are the passwords, referred to as coordinate passwords; After each coordinate number is input, the coordinate input module will randomly generate a new random coor...

Embodiment 2

[0044] The difference from Example 1 is that the data center module in this example stores 6 sets of two-dimensional coordinate numbers. Preferably, the two-dimensional coordinate numbers are array-type coordinate numbers.

[0045] Wherein, the coordinate numbers corresponding to the 6 sets of two-dimensional coordinate numbers are 12 digits, which means that the password is a 12-digit coordinate password. The change password is preferably an array-type coordinate number, so that the user can remember the password by recording the array coordinates.

[0046] In the prior art, there is a one-to-one mapping between the traditional password and the password input operation. The operation of the user inputting the password is that the password number directly corresponds to the key number. Then the attacker only needs to crack the password number or Peeping the operation process is enough, so this process is reversible. If the input operation is leaked, the password can be easily crack...

Embodiment 3

[0057] This example also provides an anti-peeping method of the above cryptographic anti-peeping device, which includes the following steps:

[0058] Step of generating coordinate numbers, randomly generating coordinate number tables;

[0059] Press key step, when the key information is received, record the coordinates corresponding to the pressed coordinate number, and return to the step of generating coordinate numbers until the confirmation signal pressed by the user is received;

[0060] In the verification step, compare whether the coordinate password of the pressed coordinate number corresponds to the set password, until yes, the verification is completed; if it is not, it will prompt the password error and return to the coordinate number generation step.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a password anti-peeping device and an anti-peeping method of the of password anti-peeping device, the password anti-peeping device comprises a coordinate input module, a processing module and a data center module, wherein the coordinate input module is used for generating coordinate numeration table randomly; the processing module is connected with the coordinate input module and used for receiving and comparing coordinate numeration information pressed by the coordinate input module; and the data center module is used for storing password data and connected with the processing module. According to the anti-peeping method, after every one coordinate number is pressed, the new coordinate numeration table is generated randomly, therefore, the input operation leakage can be avoided, so that the attacker cannot crack the password; even if the password is attacked for several times, the removing possibility when inputting password for several times can be reduced greatly, and the leakage probability is low.

Description

Technical field [0001] The invention relates to a cryptographic anti-peeping field, in particular to a cryptographic anti-peeping device and an anti-peeping method thereof. Background technique [0002] In the digital information society, the use of passwords is very common. It is a big problem to protect the security of the password during the input process. The traditional password and the password input operation are one-to-one mapping, so this process is reversible, if the input operation If it is leaked, the password can be easily cracked by an attacker. After the existing password has been attacked many times, the attacker can eliminate it by comparing several password input processes, so that there are fewer possible passwords, and the probability of leaking will increase. Summary of the invention [0003] The technical problem to be solved by the present invention is to provide an irreversible password anti-peeping device that can prevent being cracked or peeped, and furt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45G06F21/36
Inventor 李鹏程
Owner 李思洋