Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A password generation system and a method based on slice graphics

A technology for generating systems and graphics, applied in the field of information security, can solve the problems of small password space, low security, inconvenient input, etc., and achieve the effect of resisting the threat of shoulder peeping, resisting violent attacks, and convenient input operation

Active Publication Date: 2019-01-04
XIAMEN UNIV TAN KAH KEE COLLEGE
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to overcome the problem that the current text password system in the above-mentioned prior art is not easy to memorize, and the security is not high, and too many graphics input restrictions in the graphic password are inconvenient to input, and the excessive number of graphics requires a large amount of storage space. Graphical features are too complex and difficult to memorize, anti-shoulder peeping performance is not good, can not effectively prevent spyware, can not resist brute force attacks, password space is small and other defects, and provide a password generation system and method based on slice graphics, this new type of graphics The password scheme only needs to occupy a small amount of storage space for storing password graphics, and it can be used as conveniently as a text password, and the password is easier to remember and recall than the text password series. It has the advantages of simple and convenient operation, large password space, easy memory, and storage space Advantages such as small size and anti-shoulder peeping

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A password generation system and a method based on slice graphics
  • A password generation system and a method based on slice graphics
  • A password generation system and a method based on slice graphics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0039] Such as figure 1 As shown, a password generation system based on sliced ​​graphs includes:

[0040] The graphic setting module is used for selecting the graphic and its quantity for password input. Graphics are classified into general graphics and custom graphics according to the setting type.

[0041] General-purpose graphics can be set to some common and distinctive graphics in the world, such as blue sky and white clouds pictures of WINDOWS, etc.; custom graphics can be set to personal pictures that users like, such as personally designed pictures, Selfie pictures or even ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a password generation system and a password generation method based on slice graphics. The system comprises a graphics setting module, which is used for selecting graphics used for password input and the quantity thereof; a graphics slicing module which is used for setting the slicing mode and the number of slices of each graph, and slicing each graph according to the slicing mode and the number of slices; an input cipher collecting module, configured to collect input cipher information of a user, wherein the input cipher information refers to a graphics block selectedby the user and an order of selecting the graphics block; a cipher generation module, configured to code and convert the graphics blocks in the input cipher information to obtain text strings of thecorresponding graphics blocks based on the HASH algorithm, and store the text strings as ciphers according to the order of the selected graphics blocks in the input cipher information; a password database. Compared with the prior art, the invention has the advantages of simple and convenient operation, large cipher space, easy memory, small storage space, shoulder peep resistance and the like.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a password generation system and method based on slice graphics. Background technique [0002] In recent years, researchers at home and abroad have continuously proposed many new graphic cipher schemes. According to the memory form and input method of passwords, the existing graphic password schemes can be roughly divided into three categories: graphic passwords based on image recognition (recognition-based), graphic passwords based on recall (recall-based) and clue-based passwords. Graphical cipher for recall (cued-recall). [0003] (1) Graphic password scheme based on image recognition [0004] The earliest graphic password scheme based on image recognition is the Déjà Vu scheme proposed by Dhamija et al. at the USENIX Security Annual Conference in 2000, which uses random artistic pictures generated by hash functions to replace meaningless strings. When authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F21/46
CPCG06F21/36G06F21/46
Inventor 曾党泉
Owner XIAMEN UNIV TAN KAH KEE COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products