[go: up one dir, main page]

CN1825796A - Network encryption system based on picture keyboard and operating method thereof - Google Patents

Network encryption system based on picture keyboard and operating method thereof Download PDF

Info

Publication number
CN1825796A
CN1825796A CN 200610046226 CN200610046226A CN1825796A CN 1825796 A CN1825796 A CN 1825796A CN 200610046226 CN200610046226 CN 200610046226 CN 200610046226 A CN200610046226 A CN 200610046226A CN 1825796 A CN1825796 A CN 1825796A
Authority
CN
China
Prior art keywords
comparisons
client terminal
registration
server
keyboard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200610046226
Other languages
Chinese (zh)
Inventor
刘大扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200610046226 priority Critical patent/CN1825796A/en
Publication of CN1825796A publication Critical patent/CN1825796A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Document Processing Apparatus (AREA)

Abstract

This invention discloses a system for realizing ciphered register or log of customer ends in the way of identity verification and a method, in which, the operation method includes: a customer end applies for register or log, a server responds it and generates a contrast list of each key character and an input code randomly and generates a contrast list of a soft keyboard or picture format then to send the picture, the register or log-on pages to the customer end, which displays it, a user logs on the register or the log verification information based on the keyboard picture or that of the contrast list to be transmitted to the server to check it in terms of the list.

Description

Network Encryption System and method of operation thereof based on picture keyboard
Technical field
The present invention relates to a kind of server end and interconnected network system of client of comprising, more particularly, relate to a kind of client that realizes with auth method encrypting registration or the system that lands, and the method that realizes identity ciphering, checking in the system.
Background technology
Known auth method is to use the method for username and password login in software especially network safety filed.The man-to-man usemame/password storage and the call-by mechanism of people's employing at present.But because password is too short, reason such as the anti-property decoded is not strong often causes user's username and password to be stolen in the transmission course on the net, or is decoded by computer.The password of Shi Yonging too short (simple numeral or letter below 8) for example, computer uses lexicographic investigation method, can try out right user name and password at short notice usually.Some trojan horse programs also can knock by the monitoring keyboard and obtain password.
Solution to the problems described above is as follows at present:
1, uses the password of numeral and monogram more than 8.Though present computer need crack this password for a long time, along with the develop rapidly of computer hardware and parallel computing, this time can be shorter and shorter, and random password is because longer more than eight, and the user is also difficult to be remembered.
2, cryptologist adopts some cryptographic algorithm (for example: symmetric cryptography, asymmetric encryption) that the username and password of online transmission is encrypted.These algorithms just do not find anti-effective when pushing away method at certain hour, along with research further deeply, every kind of algorithm all has the possibility that is cracked.In case the encryption method victim is grasped, therefore these username and passwords also just are cracked.And study the input that these algorithms need the most advanced and sophisticated talent of a large amount of mathematics, and take time and effort, construction cycle and cost are increased, and the amount of calculation of server end, client terminal is bigger, has increased facility load.
3, some large-scale websites adopt the method for appended drawings font code, as the identifying code mode.Though this kind method can prevent the malice computer and constantly verify username and password, can't guarantee that the user name and the encrypted message that are spread out of are not are not intercepted and captured and decoded.
4, some softwares have been selected soft keyboard, and the mode that allows the user import by mouse is monitored to avoid keyboard.But because of using mouse input username and password efficient too low, this method is not generally accepted by people yet, and can't protect user name, password equally in transmission course.
Summary of the invention
The present invention is directed to the problems referred to above, a kind of Network Encryption System is provided, thereby this system sends to client terminal, user according to the input of the keyboard key-position in picture authentication information realization encryption by the soft keyboard that server end generates picture format at random.The method of operation of this system and this system has solved following problem:
1, the problem of stealing on the net of password---because server passes to client is picture, and the malice computer can't therefrom read information automatically.What client was passed server back is character string, does not have real password, even these numerals are intercepted, also can't be inferred the content of password by character.
2, dictionary attack problem---because each corresponding relation of attempting being adopted when landing (two-dimensional array) all generates at random, can't adopt means such as Brute Force, dictionary attack that password is investigated one by one so attack computer.
3, keyboard is monitored problem---and since the user by the keyboard input be at random character string, this just makes keyboard monitor the effect that lost.
4, because the table of comparisons takes is the principle of the corresponding one or more random strings of key.With 4 random strings is example, and 2 passwords become 8 passwords after by correspondence.This allows the user use short cryptoguard personal information to become possibility.
In order to address the above problem, the present invention has realized a kind of Network Encryption System based on picture keyboard, comprises the server and the client terminal of the network interconnection, and client terminal comprises display and keyboard; Client terminal also comprises a registration, lands processing module, sends to described server by network and applies for the registration of or the login page request, and will register or login page is presented on the described display, and will register or land authorization information and be sent to server; The keyboard or the button table of comparisons that registration or login page require input to comprise the registration of username and password or land authorization information and show a picture format.Server comprises a registration, lands response processing module, and the request of acknowledged client terminal to apply registration or login page generates the table of comparisons of each button character and input code at random; Generate the soft keyboard of picture format or the table of comparisons of picture format according to the table of comparisons; Described picture and registration or login page are sent to client terminal; The registration that client terminal is returned or land authorization information with reference to described table of comparisons verification; Send registration or land success, register or land the page of failing or re-registering or landing to client terminal.
The present invention has also realized above-mentioned encryption based on the picture keyboard Network Encryption System, verification operation method, and system comprises the server and the client terminal of the network interconnection, and client terminal comprises display and keyboard; Method of operation comprises the steps: that client terminal sends application for registration or login page request by network to described server; The server acknowledge client terminal is applied for the registration of or the request of login page, generates the table of comparisons of each button character and input code at random, and the table of comparisons is stored in the memory; Server generates the soft keyboard of picture format or the table of comparisons of picture format according to the table of comparisons; Server sends to client terminal with described picture and registration or login page; Client terminal will be registered or login page shows on display, wherein, and registration or login page the Show Picture keyboard of form or the button table of comparisons and require input to comprise the registration of username and password or land authorization information; The user is according to after the keyboard of picture format or button table of comparisons typing registration or landing authorization information; Client terminal will be registered or land authorization information and be sent to described server; The registration that server returns client terminal or land authorization information with reference to table of comparisons verification, checking procedure comprises: after server is received the character string that client terminal transmits, decompose by figure place, in the table of comparisons, search corresponding character, then landing contrast original licensed information checking under the situation.The server page that sends success or failure page or land again to client terminal then.This method is owing to generate the corresponding relation of button and input code at random at server, after logon information returns, and according to this corresponding relation verification, thereby in the requirement of server end realization twin check.And adopt random " picture keyboard ", stop the leakage of password to a certain extent and cracked problem.
Under the optimal way, in the method for operation of the Network Encryption System that the present invention is based on picture keyboard, the pairing input code of each button character is 1 to 8 in the table of comparisons, and input code is numeral, letter, symbol or three's combination.Optimum is that the pairing input code of each button character is the 2-5 position in the table of comparisons.Input code is too much, is not easy to user's input; When input code is 1, need the user to keep the password of longer figure place firmly in mind again, be not easy to memory; Therefore the figure place of input code is determined as required, and preferred 2-5 position is a benefit.
In the method for operation of the Network Encryption System that the present invention is based on picture keyboard, the memory of the storage table of comparisons can be the equipment of internal memory or hard disk or flash memory and other types realization memory function.The mode of preferred internal memory realizes.
By technique scheme, the present invention has following characteristics: what at first adopt is that each login generates " picture keyboard ", and the method for going corresponding password content with random character is Data transmission on the net.Numeral dynamically is present in the middle of the internal memory of server with the corresponding relation of password, and each client visits again, overtime or close client, and the password table of comparisons that all can cause server end is from newly-generated.Because what transmit between client and server is picture and random character, this is with regard to the leakage of fundamentally having stopped password and crack problem.Present technique is not limited to use on web application, and the stand-alone application program also can adopt the method, monitors to prevent keyboard.Promoting the use of of this technology will bring reliable safety assurance to netizen's life, ecommerce, bank credit, network office, data management, financial settlement, website maintenance, confidential transmission, identity validation, national defence communication etc.
The present invention not only can be applied to web application, also can be used for stand-alone program.Can not only allow the username and password that is stolen invalid, support the original short password of user, need not to keep tediously long random password firmly in mind, be not afraid of the keyboard monitoring, and password can't be decoded automatically by machine.Fundamentally overcome the problem that existing password easily is stolen and decodes in encryption and transmission course, also alleviated the burden that the user memorizes a cipher code, the fail safe that has improved existing landing approach simultaneously.This method cooperates under the prerequisite of other encryption method because the message from the client terminal to the server need not to encrypt again in addition, can increase work efficiency, and alleviates the burden of server and client terminal.
Description of drawings
Fig. 1 is the operating process schematic diagram that the present invention is based in the Network Encryption System of picture keyboard;
Fig. 2 is the login page schematic diagram that the present invention is based in the Network Encryption System of picture keyboard;
Fig. 3 generates in the Network Encryption System of the present invention based on the picture format schematic diagram of soft keyboard embodiment at random;
Fig. 4 be generate in the Network Encryption System of the present invention another kind of based on the picture format schematic diagram of soft keyboard embodiment at random.
Embodiment
The present invention is based on the Network Encryption System of picture keyboard, on physical structure, comprise the server and the client terminal of the network interconnection, client terminal is provided with display and keyboard and central processing unit, memory module at least.Generally, system of the present invention can realize that client terminal is a PC based on existing the Internet.The processor of client terminal is the central processing module that can carry out registration, landing program, its function is: send to server by network and apply for the registration of or the login page request, and will register or login page is presented on the display, and will register or land authorization information and be sent to server; And the keyboard or the button table of comparisons that above-mentioned registration or login page require user's input to comprise the registration of user name and password or land authorization information and show a picture format.And server end comprises the central processing module of carrying out the registration, landing responder, and its function is: the request of registration of acknowledged client terminal to apply or login page generates the table of comparisons of each button character and input code at random; Generate the soft keyboard of picture format or the table of comparisons of picture format according to the table of comparisons; Picture and registration or login page are sent to client terminal; The registration that client terminal is returned or land authorization information with reference to table of comparisons verification; Send registration or land success, register or land the page of failing or re-registering or landing to client terminal.
With reference to the operating process of Network Encryption System of the present invention shown in Figure 1, its process is roughly:
1, client terminal sends to described server by network and applies for the registration of or the login page request.
2, the server acknowledge client terminal is applied for the registration of or the request of login page, generates the table of comparisons of each button character and input code at random.The table of comparisons is stored in the memory, and memory can be internal memory, hard disk or flash memory etc.This contrast preferably is stored in internal memory with the session form for the two-dimentional table of comparisons, and in the specific implementation process, this session can the setting-up time limiting parameter.
The pairing input code of each button character is 1 to 8 in this table of comparisons, and input code adopts numeral, letter, symbol or three's combination.With reference to shown in Figure 2, first half display keyboard symbol, Lower Half shows random digit, the button contrast relationship of the table of comparisons can be corresponding 4 bit digital of 1 button, as Q correspondence 8594, W correspondence 2281 ...Certainly also can adopt corresponding 2 letters of a button shown in Figure 3 and digital combination, as the corresponding a1 of Q, the corresponding c3 of W ...Can also be one-to-one relationship shown in Figure 4, as the corresponding a of Q, the corresponding c of W ...On corresponding relation, the corresponding 2-5 position character combination of what a button, corresponding figure place is too much, is not easy to user's input.
3, server generates the soft keyboard of picture format or the table of comparisons of picture format according to the table of comparisons.
4, server sends to client terminal with described picture and registration or login page.
5, client terminal will be registered or login page shows on described display, registration or login page Show Picture form the keyboard or the button table of comparisons and require input to comprise the registration of username and password or land authorization information, as shown in Figure 2.Usually only require the user to input user name, password according to the table of comparisons when registration, other log-on message generally need not by the input code input, and user name also can't be supported Chinese simultaneously.
6, the user is according to after the keyboard of picture format or button table of comparisons typing registration or landing authorization information; Client terminal will be registered or land authorization information and be sent to server.After receiving login page shown in Figure 2, on " picture keyboard ", search password below random number corresponding word as the user, these numerals are inputed the password hurdle in order, submit to then.
7, server registration that client terminal is returned or land authorization information with reference to table of comparisons verification; The method of verification is after server is received the character string that client terminal transmits, from memory, find the corresponding table of comparisons (because the number of users difference of landing simultaneously, the quantity of the table of comparisons changes, therefore need the table of comparisons corresponding) with the client terminal that will land, decompose by figure place, in the table of comparisons, search corresponding character, then the information checking of comparison database.For example shown in Figure 3, the user imports the corresponding real user of user a1c3n5b0 by name QWER by name.And among Fig. 4, the password of user's input is acnbmnpi, and then true password is QWERTYUI.The corresponding relation of random keyboard is arbitrarily, and the button of corresponding input is also just different in each user's landfall process, and this malice that can effectively prevent keyboard is monitored.After this, on demand corresponding characters deposit in database (during registration) or with database in data contrast (during login), promptly contrast the original licensed information checking.If corresponding character and data-base recording are inconsistent, then to return the error message prompting and land failure, " picture keyboard " login page that perhaps generates new corresponding relation is returned client terminal, requires the user to land again.When user name or password were consistent with data-base recording, server returned the page that lands success and removes the corresponding table of comparisons information of this client terminal in the memory.
In addition, shown the 1-7 step operation that server customer in response terminal request is preferably carried out among Fig. 1, having comprised: generate the letter and the random number table of comparisons after receiving the client terminal initial request, and the table of comparisons is kept in the internal memory with the session form; Generate picture keyboard according to the table of comparisons; Picture keyboard is embedded login page and returns to the user together.Also comprise: client terminal becomes letter to digital translation according to the table of comparisons after returning logon information; With the logon information contrast in these letters and the database; Unanimity is then returned and is landed successful information, and discharges internal memory (emptying the table of comparisons); If inconsistent, then generate the new random number table of comparisons, the operation when repeating the client terminal initial request.
Certain above-mentioned picture also can directly adopt the picture of table of comparisons form, and random number can be the combination of numeral, letter or number and letter during application, only need allow the user know that the button corresponding relation gets final product.In addition, the table of comparisons of native system generation at present only is applicable to English, numeral, puts aside other language such as Chinese, Korean.Transmit the picture that information is arranged on the net, can prevent that the malice computer from reading useful information automatically.Where necessary, to the image ciphering methods such as figure piece collection watermark of transmission, guarantee the fail safe of picture in transmission, procedure for displaying.
The above; only be the preferable embodiment of the present invention; but protection scope of the present invention is not limited thereto; anyly be familiar with those skilled in the art in the technical scope that the present invention discloses; be equal to replacement or change according to technical scheme of the present invention and inventive concept thereof, all should be encompassed within protection scope of the present invention.

Claims (5)

1. method of operation based on the Network Encryption System of picture keyboard, described system comprises the server and the client terminal of the network interconnection, described client terminal comprises display and keyboard; It is characterized in that, comprise the steps:
(S1) described client terminal sends to described server by network and applies for the registration of or the login page request;
(S2) described server acknowledge client terminal is applied for the registration of or the request of login page, generates the table of comparisons of each button character and input code at random, and the table of comparisons is stored in the memory;
(S3) described server generates the soft keyboard of picture format or the table of comparisons of picture format according to the table of comparisons;
(S4) described server sends to client terminal with the picture in (S3) and registration or login page;
(S5) described client terminal will be registered or login page shows on described display; Described registration or login page show the keyboard or the button table of comparisons of described picture format and require input to comprise the registration of username and password or land authorization information;
(S6) user is according to after the keyboard of picture format or button table of comparisons typing registration or landing authorization information; Described client terminal will be registered or land authorization information and be sent to described server;
(S7) described server registration that client terminal is returned or land authorization information with reference to described table of comparisons verification; The step of verification comprises: after server is received the character string that client terminal transmits, decompose by figure place, search corresponding character in the described table of comparisons, then landing contrast original licensed information checking under the situation.
(S8) according to check results, the page that server sends success or failure page or lands again to client terminal, and delete the described table of comparisons in the described memory.
2. method of operation according to claim 1 is characterized in that, the pairing input code of each button character is 1 to 8 in the described table of comparisons, and described input code is numeral, letter, symbol or three's combination.
3. method of operation according to claim 2 is characterized in that, the pairing input code of each button character is the 2-5 position in the described table of comparisons.
4. according to the arbitrary described method of operation of claim 1-3, it is characterized in that described memory is internal memory or hard disk or flash memory.
5. Network Encryption System based on picture keyboard comprises the server and the client terminal of the network interconnection, and described client terminal comprises display and keyboard; It is characterized in that,
Described client terminal also comprises a registration, lands central processing module, send application for registration or login page request by network to described server, and will register or login page is presented on the described display, and will register or land authorization information and be sent to server; The keyboard or the button table of comparisons that described registration or login page require input to comprise the registration of username and password or land authorization information and show a picture format;
Described server comprises a registration, lands the response central processing module, and the request of acknowledged client terminal to apply registration or login page generates the table of comparisons of each button character and input code at random; Generate the soft keyboard of picture format or the table of comparisons of picture format according to the table of comparisons; Described picture and registration or login page are sent to client terminal; The registration that client terminal is returned or land authorization information with reference to described table of comparisons verification; Send registration or land success, register or land the page of failing or re-registering or landing to client terminal.
CN 200610046226 2006-03-29 2006-03-29 Network encryption system based on picture keyboard and operating method thereof Pending CN1825796A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200610046226 CN1825796A (en) 2006-03-29 2006-03-29 Network encryption system based on picture keyboard and operating method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200610046226 CN1825796A (en) 2006-03-29 2006-03-29 Network encryption system based on picture keyboard and operating method thereof

Publications (1)

Publication Number Publication Date
CN1825796A true CN1825796A (en) 2006-08-30

Family

ID=36936262

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200610046226 Pending CN1825796A (en) 2006-03-29 2006-03-29 Network encryption system based on picture keyboard and operating method thereof

Country Status (1)

Country Link
CN (1) CN1825796A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008077326A1 (en) * 2006-12-26 2008-07-03 Tencent Technology (Shenzhen) Company Limited A character inputting method and system thereof
CN100495416C (en) * 2006-09-01 2009-06-03 厦门好旺角信息技术开发有限公司 Password input method and device for improving password security
CN101388059B (en) * 2007-09-14 2010-06-02 英业达股份有限公司 Screen keyboard input system and method for preventing Trojan horse program
CN102567680A (en) * 2011-12-31 2012-07-11 华为终端有限公司 Unlocking method and device
US8484480B2 (en) 2008-07-08 2013-07-09 Alibaby Group Holding Limited Transmitting information using virtual input layout
CN103327034A (en) * 2013-07-18 2013-09-25 百度在线网络技术(北京)有限公司 Safe login method, system and device
CN103368728A (en) * 2013-07-18 2013-10-23 百度在线网络技术(北京)有限公司 Safe logging-in method, system and device
CN103529951A (en) * 2012-07-05 2014-01-22 腾讯科技(深圳)有限公司 Character input method and system
CN104410602A (en) * 2014-10-11 2015-03-11 深圳市家富通汇科技有限公司 Method for realizing random password keyboard based on secure element
CN104618359A (en) * 2015-01-22 2015-05-13 成都西山居世游科技有限公司 Method and system for reinforcing user login process security
CN105468957A (en) * 2016-01-08 2016-04-06 中国电子科技集团公司第三十研究所 Safety keyboard for network transaction
CN106169037A (en) * 2016-06-30 2016-11-30 宇龙计算机通信科技(深圳)有限公司 Method, device and the terminal unlocked
CN106909858A (en) * 2015-12-23 2017-06-30 阿里巴巴集团控股有限公司 Cipher-code input method and device
CN101840469B (en) * 2008-12-31 2017-10-13 英特尔公司 Drawing image and the method and system of association user input in safe storage domain
CN114329415A (en) * 2021-12-28 2022-04-12 腾云悦智科技(深圳)有限责任公司 A Mobile Web Login Password Encryption Method Based on Random Image Scheme

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100495416C (en) * 2006-09-01 2009-06-03 厦门好旺角信息技术开发有限公司 Password input method and device for improving password security
WO2008077326A1 (en) * 2006-12-26 2008-07-03 Tencent Technology (Shenzhen) Company Limited A character inputting method and system thereof
CN101388059B (en) * 2007-09-14 2010-06-02 英业达股份有限公司 Screen keyboard input system and method for preventing Trojan horse program
US8484480B2 (en) 2008-07-08 2013-07-09 Alibaby Group Holding Limited Transmitting information using virtual input layout
CN101840469B (en) * 2008-12-31 2017-10-13 英特尔公司 Drawing image and the method and system of association user input in safe storage domain
CN102567680B (en) * 2011-12-31 2015-01-21 华为终端有限公司 Unlocking method and device
CN102567680A (en) * 2011-12-31 2012-07-11 华为终端有限公司 Unlocking method and device
CN103529951A (en) * 2012-07-05 2014-01-22 腾讯科技(深圳)有限公司 Character input method and system
CN103529951B (en) * 2012-07-05 2017-09-15 腾讯科技(深圳)有限公司 Characters input method and system
CN103368728A (en) * 2013-07-18 2013-10-23 百度在线网络技术(北京)有限公司 Safe logging-in method, system and device
CN103327034A (en) * 2013-07-18 2013-09-25 百度在线网络技术(北京)有限公司 Safe login method, system and device
CN104410602A (en) * 2014-10-11 2015-03-11 深圳市家富通汇科技有限公司 Method for realizing random password keyboard based on secure element
CN104618359A (en) * 2015-01-22 2015-05-13 成都西山居世游科技有限公司 Method and system for reinforcing user login process security
CN106909858A (en) * 2015-12-23 2017-06-30 阿里巴巴集团控股有限公司 Cipher-code input method and device
CN105468957A (en) * 2016-01-08 2016-04-06 中国电子科技集团公司第三十研究所 Safety keyboard for network transaction
CN105468957B (en) * 2016-01-08 2019-04-05 中国电子科技集团公司第三十研究所 A kind of safety keyboard for network trading
CN106169037A (en) * 2016-06-30 2016-11-30 宇龙计算机通信科技(深圳)有限公司 Method, device and the terminal unlocked
CN114329415A (en) * 2021-12-28 2022-04-12 腾云悦智科技(深圳)有限责任公司 A Mobile Web Login Password Encryption Method Based on Random Image Scheme

Similar Documents

Publication Publication Date Title
CN1825796A (en) Network encryption system based on picture keyboard and operating method thereof
CN110493202B (en) Login token generation and verification method and device and server
US11089011B2 (en) Algorithm hardening in background context and external from the browser to prevent malicious intervention with the browser
KR100808434B1 (en) Method and system for monitoring user interaction with a computer
EP2519906B1 (en) Method and system for user authentication
US8495358B2 (en) Software based multi-channel polymorphic data obfuscation
CN101272237B (en) Method and system for automatically generating and filling login information
AU2012253411B2 (en) System and method for web-based security authentication
US20080288776A1 (en) Security method using virtual keyboard
CN101051904A (en) Method for landing by account number cipher for protecting network application sequence
CN101064602A (en) Cipher inputting method and system
CN105162773B (en) A kind of convenient login method of Web system based on mobile terminal
CN105743905B (en) A kind of method that realizing secure log, unit and system
CN101291227A (en) Password inputting method, device and system
CN101924734A (en) Identity authentication method and authentication device based on Web form
CN114499859A (en) Password verification method, device, device and storage medium
CN1226688C (en) Automatic random disposable code rasing network business safety vertification method
CN102238150A (en) Form registration method and server
KR20070109775A (en) Authentication security method using randomly mapped variable password
CN101453335B (en) User information secured inputting method, and customer terminal
Gunaseeli et al. Graphical passwords implies on tolerance password, image choice, and puzzle login security
US20240256702A1 (en) Encryption orchestration of sensitive information
TWI670618B (en) Login system implemented along with a mobile device without password and method thereof
Anifowose et al. Enhanced Security in Authentication for Web Applications using Anti-Form Grabbing Technique with Email Verification
Bazeer Ahamed et al. Image Captcha Blended with OTP for Secured Authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20060830