[go: up one dir, main page]

CN107203282A - The cipher-code input method encoded based on UNICODE - Google Patents

The cipher-code input method encoded based on UNICODE Download PDF

Info

Publication number
CN107203282A
CN107203282A CN201710500138.1A CN201710500138A CN107203282A CN 107203282 A CN107203282 A CN 107203282A CN 201710500138 A CN201710500138 A CN 201710500138A CN 107203282 A CN107203282 A CN 107203282A
Authority
CN
China
Prior art keywords
password
tip
code
unicode
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710500138.1A
Other languages
Chinese (zh)
Inventor
曾党泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen University Tan Kah Kee College
Original Assignee
Xiamen University Tan Kah Kee College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen University Tan Kah Kee College filed Critical Xiamen University Tan Kah Kee College
Priority to CN201710500138.1A priority Critical patent/CN107203282A/en
Publication of CN107203282A publication Critical patent/CN107203282A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The present invention relates to a kind of cipher-code input method encoded based on UNICODE, comprise the following steps:Code characters are classified, numeral and symbol, capitalization, lowercase, figure, language and the major class of press figure six is specifically divided into;The code characters classified are arranged on TIP, the input of password is carried out by clicking on the character on TIP;The character position path reorganization often inputted on TIP on a code characters, TIP is to increase the security of Password Input.The present invention does not need special input equipment, with facilitating current text password input, and compatible text password input scheme currently.

Description

The cipher-code input method encoded based on UNICODE
Technical field
The present invention relates to a kind of cipher-code input method encoded based on UNICODE.
Background technology
In the last few years with the rapid development of information technology, the particularly very fast development of mobile interchange, people provide to information The degree of dependence in source is increasing, and various information resources are not only obtained from network daily, also stores the various information of oneself Or be shared on network.The privacy information of a large amount of personal or enterprises and institutions is contained in these information, there is the bank of individual Various policy documents of account, the property form of enterprise or public institution etc., these privacy informations are needed by closing The mandate of method accesses the safety that just can guarantee that these information.A kind of conventional mandated program is exactly to carry out authentication.At present should Authentication is carried out with most commonly used identification authentication mode is input username and password, this is a kind of based on text password Identification authentication mode, it is only necessary to the username and password being made up of text can just be inputted by keyboard, it is easy to use, it is general Property is strong.However, because these texts are in itself without too many connotation, if setting digit longer and there is no any rule again High intensity password, user is difficult to remember such password for a long time.Particularly there are multiple different types of accounts in user, these In the case that account sets different passwords again, these passwords are more difficult to remember and distinguished.Then user is in order to being easier to Remember these passwords in ground, it has to set some regular or significant numeral or English word are as password, as The so regular significant weak passwurd such as " 123456 ", " 888888 " and " password " firmly gets the preference of many users.Together When, the password space of these passwords is less, is easier to by Brute Force.Although the password space of these text passwords has 95N (N is the length of password), but actually most people prefers the alphabetical or digital plus small of the simple digital small character of use Write mother, so password space generally only 36N, it is seen that this password space is more much smaller than actual password space, is more easy to By Brute Force.
To solve the above problems, the cryptography scheme of many is occurred in that, such as biometrics password, sound password and graphical passwords, All limited mostly by various conditions in these passwords and fail popularization, relatively a kind of alternative solution of popularization is close for figure at present Code, the most frequently used graphical passwords are the gesture unlocking pin of mobile phone, and these passwords all employ figure as the input of password, and And input is also very convenient, but the use of both approaches is all on intelligent terminal or mobile phone, it is desirable to have special input is set It is standby(Such as touch-screen).
The content of the invention
In view of this, it is an object of the invention to provide a kind of cipher-code input method encoded based on UNICODE, it is not necessary to Special input equipment, with facilitating current text password input, and compatible text password input scheme currently.
To achieve the above object, the present invention is adopted the following technical scheme that:
A kind of cipher-code input method encoded based on UNICODE, it is characterised in that comprise the following steps:
Step S1:Code characters are classified, numeral and symbol, capitalization, lowercase, figure, language is specifically divided into With the major class of press figure six;
Step S2:The code characters classified are arranged on TIP, it is close by clicking on the progress of the character on TIP The input of code;
Step S3:The character position path reorganization often inputted on TIP on a code characters, TIP with Just the security of Password Input is increased.
Further, some sub-panels are distributed with the TIP to be respectively used to set sorted code characters.
Further, the language includes Chinese, Latin language and Japanese.
Further, the code characters are UNICODE code characters.
The present invention has the advantages that compared with prior art:Present invention mainly solves the password of current character password Space it is small and be difficult memory the problem of.Presently most used password is text password, and text password is easy to use, but the password Input character there was only 95, according to the custom of general user, conventional character is about 40 or so, thus text password space compared with It is small, it is easier to crack by way of Brute Force, and text password not specific too many implication in itself, memory is not easy to, such as Fruit is set to regular character string, then security is substantially reduced, and is easier to be cracked.Then, increase password space and be easy to User is remembered just into current text cryptography scheme improvement direction.The character scheme encoded using UNICODE is solved well The problem of current text is present.UNICODE passwords can be by current text password space by 95NExpand to 60000NSignificantly The password space of password is improved also to substantially increase the security of password.And not only contained in these code characters Conventional text and numeral, further comprises substantial amounts of various countries' word and various figures, these figures and word contain in itself compared with Many meanings, are easy to the memory of user.
Brief description of the drawings
Fig. 1 is the TIP schematic diagram of one embodiment of the invention.
Fig. 2 is the schematic diagram of another sub-panel on TIP of the present invention.
Fig. 3 is the code characters schematic diagram that one embodiment of the invention is rearranged.
Fig. 4 is the code characters schematic diagram that another embodiment of the present invention is rearranged.
Embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention will be further described.
The present invention provides a kind of cipher-code input method encoded based on UNICODE, comprises the following steps:
Step S1:Code characters are classified, numeral and symbol, capitalization, lowercase, figure, language is specifically divided into With the major class of press figure six;Wherein language can be configured according to the actual demand of user, as country variant can set difference Language, as shown in Fig. 2 including Chinese, Latin language and Japanese;
Step S2:Fig. 1 to Fig. 4 be refer to there is provided a TIP, the code characters classified are arranged on TIP, The input of password is carried out by clicking on the character on TIP;Because character password is more, it is preferred that on the TIP Some sub-panels are distributed with to be respectively used to set sorted code characters;Arabic numerals, big small character English in this example Letter is respectively divided into a class, is respectively arranged on one piece of sub-panel, conventional sign is dispersed on this three pieces of panels, in addition also has and schemes Shape, each point of class of language and press figure, and be all independently distributed on one piece of sub-panel, wherein language has divided Chinese, drawn again The subclass of three language of fourth and Japanese.
Step S3:The character position often inputted on TIP on a code characters, TIP is arranged again at random Arrange to increase the security of Password Input;In one embodiment, after input code characters " 1 ", the character row on TIP Row are as shown in figure 3, this arrangement is random;In another embodiment, then input after " 2 ", the character on TIP is again Random alignment, as shown in Figure 4.
In the present embodiment, the code characters are UNICODE code characters.In the present embodiment except conventional 0-9 this 10 Individual Arabic numerals, this 52 capital and small letter English characters of Aa-Zz and!#$% ...-*()Outside 33 symbols, also include 26 figures such as ♀ ♂, Yi Ding Yu seven Lofty or bottomless about three Jis of Shang Xia Myeon are not with 30 Chinese characters of grade, 25 Latin characters and 25 Japanese characters and 1. 2. 40 press figures are 3. 4. 5. 6. 7. 8. 9. 10. waited, as depicted in figs. 1 and 2.
It is password to like compared with multi-user with the birthday of oneself, and this password has actual meaning so easily remembeing, but this Plant pin mode to be easier to be cracked, because the number of combinations of birthday is less, be easier to Brute Force.It is encoded using UNICODE The number of combinations of password can be increased afterwards, the difficulty that so increase is cracked is so as to improve security.Just with sunrise in January nineteen ninety 1 Raw people sets birthday password to be that exemplified by 19900101, former literary style only has one kind, that is, 19900101, and in this implementation In example, have 19900101,90010 (1), (19) (9) 00 1. 0 (1), (1) (9) 00 (1) 0 (1), (9) 00 (1) 0 thousands of kinds such as (1) Literary style, substantially increases the quantity in password space, improves the security of password;
In addition to the above-mentioned character of upper use is as password, figure can also be used to be used as password, play enhancing memory Effect so that password is easier to remember, such as 19900101 passwords can set the figure of constellation as password, birth on January 1 For Capricorn, figure is that can then set password to be 1990 or 1,990 01 etc..Using this figure as password not only The interest of password is improved, memory of the user to password is also helped, to add Memorability of the user to password.
The foregoing is only presently preferred embodiments of the present invention, all equivalent changes done according to scope of the present invention patent with Modification, should all belong to the covering scope of the present invention.

Claims (4)

1. a kind of cipher-code input method encoded based on UNICODE, it is characterised in that comprise the following steps:
Step S1:Code characters are classified, numeral and symbol, capitalization, lowercase, figure, language is specifically divided into With the major class of press figure six;
Step S2:The code characters classified are arranged on TIP, it is close by clicking on the progress of the character on TIP The input of code;
Step S3:The character position path reorganization often inputted on TIP on a code characters, TIP with Just the security of Password Input is increased.
2. the cipher-code input method according to claim 1 encoded based on UNICODE, it is characterised in that:The input face Some sub-panels are distributed with plate to be respectively used to set sorted code characters.
3. the cipher-code input method according to claim 1 encoded based on UNICODE, it is characterised in that:The language pack Include Chinese, Latin language and Japanese.
4. the cipher-code input method according to claim 1 encoded based on UNICODE, it is characterised in that:The cipher word Accord with as UNICODE code characters.
CN201710500138.1A 2017-06-27 2017-06-27 The cipher-code input method encoded based on UNICODE Pending CN107203282A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710500138.1A CN107203282A (en) 2017-06-27 2017-06-27 The cipher-code input method encoded based on UNICODE

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710500138.1A CN107203282A (en) 2017-06-27 2017-06-27 The cipher-code input method encoded based on UNICODE

Publications (1)

Publication Number Publication Date
CN107203282A true CN107203282A (en) 2017-09-26

Family

ID=59907019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710500138.1A Pending CN107203282A (en) 2017-06-27 2017-06-27 The cipher-code input method encoded based on UNICODE

Country Status (1)

Country Link
CN (1) CN107203282A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107665298A (en) * 2017-09-29 2018-02-06 厦门大学嘉庚学院 Password generation system and method based on figure

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1431575A (en) * 2003-01-22 2003-07-23 王洋 Intelligent secret keyboard with key values being changed randomly
CN1588280A (en) * 2004-07-08 2005-03-02 上海交通大学 Dynamic cipher input method and its keyboard
CN1892542A (en) * 2005-07-08 2007-01-10 尹赞 Cipher safety inputting method of intelligent communication terminal
CN106528132A (en) * 2016-10-27 2017-03-22 四川长虹电器股份有限公司 Cross-platform security keyboard realization method for mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1431575A (en) * 2003-01-22 2003-07-23 王洋 Intelligent secret keyboard with key values being changed randomly
CN1588280A (en) * 2004-07-08 2005-03-02 上海交通大学 Dynamic cipher input method and its keyboard
CN1892542A (en) * 2005-07-08 2007-01-10 尹赞 Cipher safety inputting method of intelligent communication terminal
CN106528132A (en) * 2016-10-27 2017-03-22 四川长虹电器股份有限公司 Cross-platform security keyboard realization method for mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
北漂周: "Android安全输入设计与思考", 《HTTPS://BLOG.CSDN.NET/YZZST/ARTICLE/DETAILS/46741681》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107665298A (en) * 2017-09-29 2018-02-06 厦门大学嘉庚学院 Password generation system and method based on figure

Similar Documents

Publication Publication Date Title
US10404683B2 (en) Strength-based password expiration
CN106161006B (en) Digital encryption algorithm
US20130269016A1 (en) Method for integrating account management function in input method software
US9171147B2 (en) Process and system for strengthening password security
CN104063169B (en) Unlocking method based on touch screen
Gunes Unblocking the impasse in Turkey's Kurdish question
US20110010763A1 (en) Tool and method for generating passwords
US20180181742A1 (en) Server system, communication system, communication terminal device, program, recording medium, and communication method
Haque et al. Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets
CN107203282A (en) The cipher-code input method encoded based on UNICODE
CN107665298A (en) Password generation system and method based on figure
Ciren et al. From arranged marriage to autonomous marriage: Marriage liberalization in India, Ancient Rome, United Kingdom and China
CN112329003B (en) Method and system for generating password with good security
US10353486B1 (en) Password help using color keys
CN110110517A (en) Judge the method for date type weak password
US10552599B2 (en) Authentication system and method
KR101166676B1 (en) Method for providing English keypad and mobile device using the same
KR102673785B1 (en) Method and system for authenticating user
JP6173504B1 (en) Password setting method for information processing terminal
Kraus et al. Implications of the use of emojis in mobile authentication
CA2895597A1 (en) Secure off-line password generation and recall device
Stepnov et al. Brazil's financial and technological leadership. The results of a 5-year revolution in the banking sector
CN101561717B (en) Chinese character input method for combining, arranging and encoding Chinese character strokes
KR101351785B1 (en) certification method for Touch or Pointing Device
JP2017169207A (en) Password setting method for information processing terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170926

RJ01 Rejection of invention patent application after publication