CN107203282A - The cipher-code input method encoded based on UNICODE - Google Patents
The cipher-code input method encoded based on UNICODE Download PDFInfo
- Publication number
- CN107203282A CN107203282A CN201710500138.1A CN201710500138A CN107203282A CN 107203282 A CN107203282 A CN 107203282A CN 201710500138 A CN201710500138 A CN 201710500138A CN 107203282 A CN107203282 A CN 107203282A
- Authority
- CN
- China
- Prior art keywords
- password
- tip
- code
- unicode
- cipher
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 12
- 230000008521 reorganization Effects 0.000 claims abstract description 3
- 230000001965 increasing effect Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 4
- 241001481710 Cerambycidae Species 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- CTJBHIROCMPUKL-UHFFFAOYSA-N butoxycarboxim Chemical class CNC(=O)ON=C(C)C(C)S(C)(=O)=O CTJBHIROCMPUKL-UHFFFAOYSA-N 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000003446 memory effect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
- G06F3/0233—Character input methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Document Processing Apparatus (AREA)
Abstract
The present invention relates to a kind of cipher-code input method encoded based on UNICODE, comprise the following steps:Code characters are classified, numeral and symbol, capitalization, lowercase, figure, language and the major class of press figure six is specifically divided into;The code characters classified are arranged on TIP, the input of password is carried out by clicking on the character on TIP;The character position path reorganization often inputted on TIP on a code characters, TIP is to increase the security of Password Input.The present invention does not need special input equipment, with facilitating current text password input, and compatible text password input scheme currently.
Description
Technical field
The present invention relates to a kind of cipher-code input method encoded based on UNICODE.
Background technology
In the last few years with the rapid development of information technology, the particularly very fast development of mobile interchange, people provide to information
The degree of dependence in source is increasing, and various information resources are not only obtained from network daily, also stores the various information of oneself
Or be shared on network.The privacy information of a large amount of personal or enterprises and institutions is contained in these information, there is the bank of individual
Various policy documents of account, the property form of enterprise or public institution etc., these privacy informations are needed by closing
The mandate of method accesses the safety that just can guarantee that these information.A kind of conventional mandated program is exactly to carry out authentication.At present should
Authentication is carried out with most commonly used identification authentication mode is input username and password, this is a kind of based on text password
Identification authentication mode, it is only necessary to the username and password being made up of text can just be inputted by keyboard, it is easy to use, it is general
Property is strong.However, because these texts are in itself without too many connotation, if setting digit longer and there is no any rule again
High intensity password, user is difficult to remember such password for a long time.Particularly there are multiple different types of accounts in user, these
In the case that account sets different passwords again, these passwords are more difficult to remember and distinguished.Then user is in order to being easier to
Remember these passwords in ground, it has to set some regular or significant numeral or English word are as password, as
The so regular significant weak passwurd such as " 123456 ", " 888888 " and " password " firmly gets the preference of many users.Together
When, the password space of these passwords is less, is easier to by Brute Force.Although the password space of these text passwords has 95N
(N is the length of password), but actually most people prefers the alphabetical or digital plus small of the simple digital small character of use
Write mother, so password space generally only 36N, it is seen that this password space is more much smaller than actual password space, is more easy to
By Brute Force.
To solve the above problems, the cryptography scheme of many is occurred in that, such as biometrics password, sound password and graphical passwords,
All limited mostly by various conditions in these passwords and fail popularization, relatively a kind of alternative solution of popularization is close for figure at present
Code, the most frequently used graphical passwords are the gesture unlocking pin of mobile phone, and these passwords all employ figure as the input of password, and
And input is also very convenient, but the use of both approaches is all on intelligent terminal or mobile phone, it is desirable to have special input is set
It is standby(Such as touch-screen).
The content of the invention
In view of this, it is an object of the invention to provide a kind of cipher-code input method encoded based on UNICODE, it is not necessary to
Special input equipment, with facilitating current text password input, and compatible text password input scheme currently.
To achieve the above object, the present invention is adopted the following technical scheme that:
A kind of cipher-code input method encoded based on UNICODE, it is characterised in that comprise the following steps:
Step S1:Code characters are classified, numeral and symbol, capitalization, lowercase, figure, language is specifically divided into
With the major class of press figure six;
Step S2:The code characters classified are arranged on TIP, it is close by clicking on the progress of the character on TIP
The input of code;
Step S3:The character position path reorganization often inputted on TIP on a code characters, TIP with
Just the security of Password Input is increased.
Further, some sub-panels are distributed with the TIP to be respectively used to set sorted code characters.
Further, the language includes Chinese, Latin language and Japanese.
Further, the code characters are UNICODE code characters.
The present invention has the advantages that compared with prior art:Present invention mainly solves the password of current character password
Space it is small and be difficult memory the problem of.Presently most used password is text password, and text password is easy to use, but the password
Input character there was only 95, according to the custom of general user, conventional character is about 40 or so, thus text password space compared with
It is small, it is easier to crack by way of Brute Force, and text password not specific too many implication in itself, memory is not easy to, such as
Fruit is set to regular character string, then security is substantially reduced, and is easier to be cracked.Then, increase password space and be easy to
User is remembered just into current text cryptography scheme improvement direction.The character scheme encoded using UNICODE is solved well
The problem of current text is present.UNICODE passwords can be by current text password space by 95NExpand to 60000NSignificantly
The password space of password is improved also to substantially increase the security of password.And not only contained in these code characters
Conventional text and numeral, further comprises substantial amounts of various countries' word and various figures, these figures and word contain in itself compared with
Many meanings, are easy to the memory of user.
Brief description of the drawings
Fig. 1 is the TIP schematic diagram of one embodiment of the invention.
Fig. 2 is the schematic diagram of another sub-panel on TIP of the present invention.
Fig. 3 is the code characters schematic diagram that one embodiment of the invention is rearranged.
Fig. 4 is the code characters schematic diagram that another embodiment of the present invention is rearranged.
Embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention will be further described.
The present invention provides a kind of cipher-code input method encoded based on UNICODE, comprises the following steps:
Step S1:Code characters are classified, numeral and symbol, capitalization, lowercase, figure, language is specifically divided into
With the major class of press figure six;Wherein language can be configured according to the actual demand of user, as country variant can set difference
Language, as shown in Fig. 2 including Chinese, Latin language and Japanese;
Step S2:Fig. 1 to Fig. 4 be refer to there is provided a TIP, the code characters classified are arranged on TIP,
The input of password is carried out by clicking on the character on TIP;Because character password is more, it is preferred that on the TIP
Some sub-panels are distributed with to be respectively used to set sorted code characters;Arabic numerals, big small character English in this example
Letter is respectively divided into a class, is respectively arranged on one piece of sub-panel, conventional sign is dispersed on this three pieces of panels, in addition also has and schemes
Shape, each point of class of language and press figure, and be all independently distributed on one piece of sub-panel, wherein language has divided Chinese, drawn again
The subclass of three language of fourth and Japanese.
Step S3:The character position often inputted on TIP on a code characters, TIP is arranged again at random
Arrange to increase the security of Password Input;In one embodiment, after input code characters " 1 ", the character row on TIP
Row are as shown in figure 3, this arrangement is random;In another embodiment, then input after " 2 ", the character on TIP is again
Random alignment, as shown in Figure 4.
In the present embodiment, the code characters are UNICODE code characters.In the present embodiment except conventional 0-9 this 10
Individual Arabic numerals, this 52 capital and small letter English characters of Aa-Zz and!#$% ...-*()Outside 33 symbols, also include
26 figures such as ♀ ♂, Yi Ding Yu seven
Lofty or bottomless about three Jis of Shang Xia Myeon are not with 30 Chinese characters of grade, 25 Latin characters and 25 Japanese characters and 1.
2. 40 press figures are 3. 4. 5. 6. 7. 8. 9. 10. waited, as depicted in figs. 1 and 2.
It is password to like compared with multi-user with the birthday of oneself, and this password has actual meaning so easily remembeing, but this
Plant pin mode to be easier to be cracked, because the number of combinations of birthday is less, be easier to Brute Force.It is encoded using UNICODE
The number of combinations of password can be increased afterwards, the difficulty that so increase is cracked is so as to improve security.Just with sunrise in January nineteen ninety 1
Raw people sets birthday password to be that exemplified by 19900101, former literary style only has one kind, that is, 19900101, and in this implementation
In example, have 19900101,90010 (1), (19) (9) 00 1. 0 (1), (1) (9) 00 (1) 0 (1), (9) 00 (1) 0 thousands of kinds such as (1)
Literary style, substantially increases the quantity in password space, improves the security of password;
In addition to the above-mentioned character of upper use is as password, figure can also be used to be used as password, play enhancing memory
Effect so that password is easier to remember, such as 19900101 passwords can set the figure of constellation as password, birth on January 1
For Capricorn, figure is that can then set password to be 1990 or 1,990 01 etc..Using this figure as password not only
The interest of password is improved, memory of the user to password is also helped, to add Memorability of the user to password.
The foregoing is only presently preferred embodiments of the present invention, all equivalent changes done according to scope of the present invention patent with
Modification, should all belong to the covering scope of the present invention.
Claims (4)
1. a kind of cipher-code input method encoded based on UNICODE, it is characterised in that comprise the following steps:
Step S1:Code characters are classified, numeral and symbol, capitalization, lowercase, figure, language is specifically divided into
With the major class of press figure six;
Step S2:The code characters classified are arranged on TIP, it is close by clicking on the progress of the character on TIP
The input of code;
Step S3:The character position path reorganization often inputted on TIP on a code characters, TIP with
Just the security of Password Input is increased.
2. the cipher-code input method according to claim 1 encoded based on UNICODE, it is characterised in that:The input face
Some sub-panels are distributed with plate to be respectively used to set sorted code characters.
3. the cipher-code input method according to claim 1 encoded based on UNICODE, it is characterised in that:The language pack
Include Chinese, Latin language and Japanese.
4. the cipher-code input method according to claim 1 encoded based on UNICODE, it is characterised in that:The cipher word
Accord with as UNICODE code characters.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710500138.1A CN107203282A (en) | 2017-06-27 | 2017-06-27 | The cipher-code input method encoded based on UNICODE |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710500138.1A CN107203282A (en) | 2017-06-27 | 2017-06-27 | The cipher-code input method encoded based on UNICODE |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107203282A true CN107203282A (en) | 2017-09-26 |
Family
ID=59907019
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710500138.1A Pending CN107203282A (en) | 2017-06-27 | 2017-06-27 | The cipher-code input method encoded based on UNICODE |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107203282A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107665298A (en) * | 2017-09-29 | 2018-02-06 | 厦门大学嘉庚学院 | Password generation system and method based on figure |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1431575A (en) * | 2003-01-22 | 2003-07-23 | 王洋 | Intelligent secret keyboard with key values being changed randomly |
CN1588280A (en) * | 2004-07-08 | 2005-03-02 | 上海交通大学 | Dynamic cipher input method and its keyboard |
CN1892542A (en) * | 2005-07-08 | 2007-01-10 | 尹赞 | Cipher safety inputting method of intelligent communication terminal |
CN106528132A (en) * | 2016-10-27 | 2017-03-22 | 四川长虹电器股份有限公司 | Cross-platform security keyboard realization method for mobile terminal |
-
2017
- 2017-06-27 CN CN201710500138.1A patent/CN107203282A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1431575A (en) * | 2003-01-22 | 2003-07-23 | 王洋 | Intelligent secret keyboard with key values being changed randomly |
CN1588280A (en) * | 2004-07-08 | 2005-03-02 | 上海交通大学 | Dynamic cipher input method and its keyboard |
CN1892542A (en) * | 2005-07-08 | 2007-01-10 | 尹赞 | Cipher safety inputting method of intelligent communication terminal |
CN106528132A (en) * | 2016-10-27 | 2017-03-22 | 四川长虹电器股份有限公司 | Cross-platform security keyboard realization method for mobile terminal |
Non-Patent Citations (1)
Title |
---|
北漂周: "Android安全输入设计与思考", 《HTTPS://BLOG.CSDN.NET/YZZST/ARTICLE/DETAILS/46741681》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107665298A (en) * | 2017-09-29 | 2018-02-06 | 厦门大学嘉庚学院 | Password generation system and method based on figure |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10404683B2 (en) | Strength-based password expiration | |
CN106161006B (en) | Digital encryption algorithm | |
US20130269016A1 (en) | Method for integrating account management function in input method software | |
US9171147B2 (en) | Process and system for strengthening password security | |
CN104063169B (en) | Unlocking method based on touch screen | |
Gunes | Unblocking the impasse in Turkey's Kurdish question | |
US20110010763A1 (en) | Tool and method for generating passwords | |
US20180181742A1 (en) | Server system, communication system, communication terminal device, program, recording medium, and communication method | |
Haque et al. | Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets | |
CN107203282A (en) | The cipher-code input method encoded based on UNICODE | |
CN107665298A (en) | Password generation system and method based on figure | |
Ciren et al. | From arranged marriage to autonomous marriage: Marriage liberalization in India, Ancient Rome, United Kingdom and China | |
CN112329003B (en) | Method and system for generating password with good security | |
US10353486B1 (en) | Password help using color keys | |
CN110110517A (en) | Judge the method for date type weak password | |
US10552599B2 (en) | Authentication system and method | |
KR101166676B1 (en) | Method for providing English keypad and mobile device using the same | |
KR102673785B1 (en) | Method and system for authenticating user | |
JP6173504B1 (en) | Password setting method for information processing terminal | |
Kraus et al. | Implications of the use of emojis in mobile authentication | |
CA2895597A1 (en) | Secure off-line password generation and recall device | |
Stepnov et al. | Brazil's financial and technological leadership. The results of a 5-year revolution in the banking sector | |
CN101561717B (en) | Chinese character input method for combining, arranging and encoding Chinese character strokes | |
KR101351785B1 (en) | certification method for Touch or Pointing Device | |
JP2017169207A (en) | Password setting method for information processing terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170926 |
|
RJ01 | Rejection of invention patent application after publication |