1. Technical Field
The present disclosure relates to security systems, and more particularly to a security system and a method for granting access used by the security system.
2. Description of Related Art
A conventional password often includes numerical numbers and/or letters, such as, 0-9, and a-z/A-Z. However, input devices used for inputting password information are substantially similar, and locations of the numbers and the letters arranged in the input device are almost uniform and common. Accordingly, passwords can easily be figured out merely by observing how they are input.
The components of the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of a security system and a method for granting access. Moreover, in the drawings, like reference numerals designate corresponding parts throughout several views.
Referring to
The processor 10 executes/runs various software components in the storage 40 to perform various functions for the security system 1, and controls the operations of the security system 1.
The input unit 20 is configured to generate instructions in response to user inputs. In the embodiment, the input unit 20 includes at least one physical button. In an alternative embodiment, the input unit 20 can be a touch pad.
The display unit 30 is configured to output graphical data. The visual outputs may include text, graphic, video, and any combination thereof. The display unit 30 can be a touch sensitive display unit.
The storage 40 stores an operating system 41, a graphical application 42, an input application 43, a recording application 44, a password application 45, a comparing application 46, and a predetermined password 47 used for authenticating an inputted password.
The operating system 41 (e.g., LINUX®, UNIX®, WINDOWS®, or an embedded operating system 41 such as VxWorks®) includes various procedures, sets of instructions, software components and/or drivers for controlling and managing general system tasks (e.g., memory management, storage control, and power management, etc.) and facilitating communication between various hardware and software components.
The graphical application 42 includes various software components and/or set of instructions, which may be implemented by the processor 10 for rendering and displaying graphical user interfaces (GUI) on the display unit 30. It should be noted that the GUI can include any object that can be displayed, including, text, web pages, digital images, videos, animations and the like.
Referring also to
In an alternative embodiment, when the first image input field 3012 or the second image input filed 3014 is triggered, a plurality of thumbnail images of the first images or a plurality of thumbnail images of the second images is displayed on the interface 301 for the user to select one first image or one kind of second image.
The input application 43 includes various software components and/or set of instructions, which can be invoked/implemented by the processor 10 for receiving instructions from the input unit 20, and performing various functions for example moving the at least one selected second image to the selected first image according to the received instructions.
The recording application 44 includes various software components and/or set of instructions, which can be invoked/implemented by the processor 10 for recording at least one property in relation to the selected first image and the at least one selected second image. In the embodiment, the at least one property includes at least one position relationship between the selected first image and the at least one selected second image. That is, the recording application 44 is invoked/implemented to record which position the at least one second image stays on the selected first image. The recording application 44 can also be invoked/implemented to record a sequence of moving the at least one selected second image to the selected first image. The recording application 44 can further be invoked/implemented to record the storage name of the selected first image, the storage path of the selected first image, the storage name of the at least one selected second image, the storage path of the at least one selected second image, the number of the at least one selected second image, and so on.
The password application 45 includes various software components and/or set of instructions, which can be invoked/implemented by the processor 10 for generating an input password according to at least one of the at least one recorded property. In the embodiment, the password application 45 generates the input password according to the at least one position relationship between the selected first image and the at least one selected second image. In an alternative embodiment, the password application 45 is invoked/implemented to generate the input password according to the sequence of moving the at least one selected second image to the selected first image, or according to a combination of the at least one recorded position relationship and the recorded sequence, or according to a combination of the at least one recorded position relationship, the recorded sequence, the recorded storage name and the recorded storage path of the selected first image, the recorded storage name and the recorded storage path of the at least one selected second image, and the number of the at least one selected second image. In the embodiment, when a confirm instruction is received from the input unit 20, the password application 45 is invoked/implemented by the processor 10 to generate the input password.
Furthermore, the input password can be defined as a newly predetermined password to replace the previously predetermined password 47 stored in the storage 40.
The comparing application 46 includes various software components and/or set of instructions, which can be invoked/implemented by the processor 10 for comparing the input password with the predetermined password 47. When the input password matches the predetermined password 47, the security system 1 is unlocked. Otherwise, the security system 1 remains locked.
Referring to
In step S701, in operation, the processor 10 invokes/implements the graphical application 42 to display the security access interface 301 on the display unit 30. In the embodiment, the interface 301 includes the user name input field 3010, the first image input filed 3012, and the second image input field 3014.
In step S702, the processor 10 invokes/implements the input application 43 to receive user instructions from the input unit 20, thereby, inputting one user name, selecting one first image and one kind of second image, and moving the at least one selected second image to the selected first image.
In step S703, the processor 10 invokes/implements the recording application 44 to record at least one property in relation to the selected first image and the at least one selected second image. In the embodiment, the at least one property includes at least one position relationship between the selected first image and the at least one selected second images. The at least one property can also include a sequence of moving the at least one selected second image to the selected first image. The at least one property can further include the storage name of the selected first image, the storage path of the selected first image, the storage name of the at least one selected second image, the storage path of the at least one selected second image, and the number of the at least one selected second image.
In step S704, the processor 10 invokes/implements the input application 43 to determine whether a confirm instruction is received from the input unit 20.
In step S705, if the confirm instruction is received, the processor 10 invokes/implements the password application 45 to generate an input password according to at least one of the at least one recorded property. In the embodiment, the password application 45 generates the input password according to the at least one position relationship between the selected first image and the at least one selected second image. In an alternative embodiment, the password application 45 is invoked/implemented to generate the input password according to the sequence of moving the at least one selected second image to the selected first image, or according to a combination of the at least one recorded position relationship and the recorded sequence, or according to a combination of the at least one recorded position relationship, the recorded sequence, the recorded storage name and the recorded storage path of the selected first image, the recorded storage name and the recorded storage path of the at least one selected second image, and the number of the at least one selected second image.
In step S706, the processor 10 invokes/implements the comparing application 46 to determine whether the input password matches the predetermine password 47 in the storage 40.
In step S707, the processor 10 triggers the security system 1 to grant access/unlock operations (procedures) if the input password matches the predetermined password 47.
As described above, the user is granted access by selecting one first image and one kind of second image, and moving at least one selected second image to the selected first image in sequence, thereby, protecting the password more safely and efficiently as it cannot be easily determined by mere observation since fixed patterns of input options are not being displayed.
Although the present disclosure has been specifically described on the basis of the exemplary embodiment thereof, the disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the embodiment without departing from the scope and spirit of the disclosure.
| Number | Date | Country | Kind |
|---|---|---|---|
| 200910302673.1 | May 2009 | CN | national |