A password generation system and method based on slice graphics

A technology for generating systems and graphics, applied in the field of information security, can solve the problems of small password space, low security, inconvenient input, etc., to achieve the effect of resisting the threat of shoulder peeping, resisting violent attacks, and convenient input operation

Active Publication Date: 2022-05-06
XIAMEN UNIV TAN KAH KEE COLLEGE
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to overcome the problem that the current text password system in the above-mentioned prior art is not easy to memorize, and the security is not high, and too many graphics input restrictions in the graphic password are inconvenient to input, and the excessive number of graphics requires a large amount of storage space. Graphical features are too complex and difficult to memorize, anti-shoulder peeping performance is not good, can not effectively prevent spyware, can not resist brute force attacks, password space is small and other defects, and provide a password generation system and method based on slice graphics, this new type of graphics The password scheme only needs to occupy a small amount of storage space for storing password graphics, and it can be used as conveniently as a text password, and the password is easier to remember and recall than the text password series. It has the advantages of simple and convenient operation, large password space, easy memory, and storage space Advantages such as small size and anti-shoulder peeping

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A password generation system and method based on slice graphics
  • A password generation system and method based on slice graphics
  • A password generation system and method based on slice graphics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0039] Such as figure 1 As shown, a password generation system based on sliced ​​graphs includes:

[0040] The graphic setting module is used for selecting the graphic and its quantity for password input. Graphics are classified into general graphics and custom graphics according to the setting type.

[0041] General-purpose graphics can be set to some common and distinctive graphics in the world, such as blue sky and white clouds pictures of WINDOWS, etc.; custom graphics can be set to personal pictures that users like, such as personally designed pictures, Selfie pictures or even ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a system and method for generating passwords based on sliced ​​graphics. The system includes: a graphics setting module for selecting graphics and their quantity for password input; a graphics slicing module for setting the slicing mode and Slicing quantity, and slice each graphic according to the slicing mode and the slicing quantity; input password collection module, for collecting the user's input password information, said input password information refers to the graphic blocks selected by the user and the order of the selected graphic blocks; Password generating module, for converting the graphic blocks in the input password information into encoding conversion based on the HASH algorithm to obtain the text strings of the corresponding graphic blocks, and storing each text string as a password in the order of selecting graphic blocks in the input password information; password database. Compared with the prior art, the present invention has the advantages of simple and convenient operation, large password space, easy memory, small storage space, anti-shoulder peeping and the like.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a password generation system and method based on slice graphics. Background technique [0002] In recent years, researchers at home and abroad have continuously proposed many new graphic cipher schemes. According to the memory form and input method of passwords, the existing graphic password schemes can be roughly divided into three categories: graphic passwords based on image recognition (recognition-based), graphic passwords based on recall (recall-based) and clue-based passwords. Graphical cipher for recall (cued-recall). [0003] (1) Graphic password scheme based on image recognition [0004] The earliest graphic password scheme based on image recognition is the Déjà Vu scheme proposed by Dhamija et al. at the USENIX Security Annual Conference in 2000, which uses random artistic pictures generated by hash functions to replace meaningless strings. When authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36G06F21/46
CPCG06F21/36G06F21/46
Inventor 曾党泉
Owner XIAMEN UNIV TAN KAH KEE COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products