Unlock instant, AI-driven research and patent intelligence for your innovation.

Password inputting method and device based on target identification technology

A password input and target recognition technology, applied in the field of electronic security protection, can solve the problems of lack of user experience, easy to be cracked, and no input masking, and achieve the effect of increasing the difficulty and complexity of password cracking

Active Publication Date: 2016-07-20
SMART ELECTRONICS IND DONG GUAN
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods all have great deficiencies. Among them, inputting by touching the buttons is easy to be peeped by others and the password is leaked, and the password input by taking pictures of faces is easy to be cracked by static pictures.
It can be seen that none of the above password input methods has sufficient concealment and reliability, and is easy to be cracked.
[0003] In addition, the specific operation process of the solution described in the above-mentioned prior art is either directly selected through the touch screen, or the operation is realized by clicking the function keys set separately, which not only does not have good input masking , also lacks a good user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password inputting method and device based on target identification technology
  • Password inputting method and device based on target identification technology
  • Password inputting method and device based on target identification technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The embodiments of the present invention are described in detail below. Examples of the embodiments are shown in the accompanying drawings, in which the same or similar reference numerals indicate the same or similar elements or elements with the same or similar functions. The embodiments described below with reference to the accompanying drawings are exemplary, and are only used to explain the present invention, and cannot be construed as limiting the present invention.

[0076] Those skilled in the art can understand that, unless specifically stated otherwise, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the term "comprising" used in the specification of the present invention refers to the presence of the described features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, eleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a password inputting method and device based on a target identification technology.The method comprises the following steps that a user interface used for inputting a password is provided, multiple picture and text areas are displayed, each picture and text area is provided with multiple information units which are distributed in position in a discrete mode and generated randomly, each information unit comprises multiple information elements, one or more information elements are defined as password characters to be input, and the rests are object attributes of the password characters; a camera device is driven to obtain video images, the position and motion direction of an intended target are identified, the corresponding picture and text area is determined according to the position of the intended target, and the corresponding information unit is determined according to the motion direction of the intended target; the object attributes in the information units are filtered out according to a default rule, and the information elements serving as the password characters to be input in the information units are obtained to serve as corresponding bits of the password for password inputting.

Description

Technical field [0001] The present invention relates to the technical field of electronic security protection. Specifically, the present invention relates to a method and device for password input based on target recognition technology. Background technique [0002] With the development of society, various security issues continue to occur, and human security awareness continues to increase. Nowadays, the widely used smart terminals usually set passwords for verification. Therefore, the safe input method of passwords has become particularly important and gradually applied to life. All aspects of work. For example, in a mobile terminal, a display screen based on touch feedback is usually provided, and the password can be input by means of touch keys to input numbers, input passwords, and take pictures of faces for facial recognition. These methods all have great shortcomings. Among them, the password input by touching the button is easy to be peeped by others and leaks the passwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/36
CPCG06F21/36
Inventor 郑犁
Owner SMART ELECTRONICS IND DONG GUAN