Identity authentication improving method for pattern puzzle password in Android system

A graphic unlocking and Android system technology, applied in the computer field, can solve the problems of low utilization rate of graphic passwords, uneven distribution of graphic passwords, unapplied patterns, etc., increase the difficulty of dictionary attacks and brute force cracking, and overcome usage habits , high security effect

Active Publication Date: 2015-09-16
XIDIAN UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 2) The selected point cannot be selected again;
[0012] However, in practical applications, due to the user's habits in setting the starting point, selecting adjacent points, and pattern shapes, the distribution of the actual graphic ciphers in the theoretical cipher space is very uneven, and many patterns have not been applied. , so that the theore

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication improving method for pattern puzzle password in Android system
  • Identity authentication improving method for pattern puzzle password in Android system
  • Identity authentication improving method for pattern puzzle password in Android system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Example 1, enter the graphic to be authenticated on the graphic unlock password interface for identity verification:

[0057]Step 1, set the graphic unlock password interface.

[0058] refer to figure 2 , the specific implementation of this step is as follows:

[0059] 1a) Create an object array P representing a 4×4 dot matrix of the graphic unlocking password interface;

[0060] 1b) Fill in the elements of the object array P with the number id, abscissa pX, ordinate pY of the point in the lattice, abscissa pX, ordinate pY, and the abscissa sX and ordinate sY of the sensing area as parameters, and pass the object array P to the brush Ca;

[0061] 1c) Set three icons A, B, and C for representing points, and pass these three icons to the brush Ca through the decodeResource function;

[0062] 1d) After the brush Ca receives the object array P and each icon, draw the 4×4 dot matrix of the graphics unlocking password setting interface through the drawBitmap function in t...

Embodiment 2

[0081] Example 2, enter the graphic to be authenticated on the authentication interface of the graphic unlock password for identity verification:

[0082] Step 1, set the graphic unlock password interface.

[0083] refer to figure 2 , the specific realization of this step is the same as step 1 of embodiment 1.

[0084] Step 2, setting the authentication interface of the graphic unlock password.

[0085] The specific implementation of this step is the same as that of step 2 in Embodiment 1.

[0086] Step 3: Input the password graphic G on the graphic unlock password interface and read it.

[0087] The specific implementation of this step is the same as step 3 of Example 1.

[0088] Step 4: Input and read the graphic to be authenticated G1 on the graphic unlock password authentication interface.

[0089] refer to Figure 4 , this step is specifically implemented as follows:

[0090] 4a) Select any point from the 16 points on the graphic unlock password authentication int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication improving method for a pattern puzzle password in an Android system, and mainly aims to solve the problem of potential safety hazard due to revealing of the use habit of a user in practical application of existing Android pattern puzzle. An implementation scheme comprises the following steps: (1) setting a pattern puzzle password interface; (2) setting an authentication interface of the pattern puzzle password; (3) inputting a password pattern on the pattern puzzle password interface, and reading the character string representation form of the password pattern; (4) inputting a pattern to be authenticated on the pattern puzzle password interface or the authentication interface of the pattern puzzle password, and reading the character string representation form of the pattern to be authenticated; and (5) comparing whether or not the character string expression ways of the pattern to be authenticated and the password pattern are consistent in order to verify the identity. Through adoption of the identity authentication improving method, the password space is enlarged on the basis of the existing Android pattern puzzle; the security is enhanced; and the defense capability specific to dictionary attacks and brute force attacks is enhanced. The identity authentication improving method can be applied to identity authentication of graphical equipment such as smart phones.

Description

technical field [0001] The invention belongs to the field of computers, and further relates to an improved method for identity authentication of Android graphic unlocking passwords, which can be used for identity authentication of users. Background technique [0002] At present, graphic passwords are more in line with the requirements of portable graphic devices such as smart phones and tablet computers than text passwords composed of letters and numbers. The graphical and visualized input is easier for users to remember. The main design requirements are as follows: [0003] 1. Security. Security is the most important requirement for the design of graphic password schemes. It is necessary to ensure that the key space is large enough to resist commonly used password attack methods such as guessing passwords, brute force cracking, dictionary attacks, and shoulder spying, so as to prevent graphic passwords from leaking. [0004] 2. Availability. The graphic password scheme sh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/36
CPCG06F21/36H04L63/0853H04L63/0876
Inventor 熊思纯杨超马建峰陈东安迪罗丹付胧玉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products