Cipher protection system and method

A password protection and password technology, applied in the computer field, can solve problems such as cumbersome operation steps and inconvenient use, and achieve the effects of ensuring information security, simplifying operations, and increasing the difficulty of decryption

Active Publication Date: 2010-06-09
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The operation steps are cumbersome and inconvenient to use
However, in the present information age, password protection functions must be used when using a computer, such as entering the operating system of a personal computer, using a personal instant messaging tool, using a personal mail terminal, etc., making the disadvantages of the existing password input method more and more serious. protrude

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher protection system and method
  • Cipher protection system and method
  • Cipher protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to understand the present invention better, at first briefly introduce existing serial mouse:

[0017] 1. The serial mouse uses four wires in the DB9 connector:

[0018] 2 (RXD: for the positive power supply of the mouse);

[0019] 3 (TXD: used to send data);

[0020] 4 (DTR: for positive power supply, reset and mouse detection);

[0021] 7 (RTS: optional, for positive power supply)

[0022] 2. Simple communication protocol of serial mouse

[0023] (1) The serial data format of the mouse

[0024] The commonly used Microsoft mouse has two buttons, which are supported by most operating systems. The data format it sends is: baud rate 1200bps, stop bit 1.0, valid data per byte 7 bits, each byte Frame 3 bytes. There are also mice from other companies, such as Logitech, that use mice with 3 buttons (some with a scroll wheel). Logitech has extended the protocol of the Microsoft mouse, using a baud rate of 1200bps, a stop bit of 1.0 bits, 8 bits of valid data pe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password protection system, which comprises the following parts: an user boundary UI display unit, a saving unit with the password information and a comparison unit, whereinthe password protection system includes a mouse operation dealing modular for sensing the mouse operation information in the password input frame of the UI display unit, analyzing the operation information and getting and outputting the mouse press key type information, the comparison unit is used to compare the output information of the mouse operation dealing modular with the saving password information in the saving unit, if the same, the right password signal is outputted, or the wrong password signal is outputted. The invention discloses a password protection method. The invention simplifies the landing operation, which safeguards the safety of the user' s information.

Description

technical field [0001] The invention relates to computer technology, in particular to a password protection system and method based on mouse operation. Background technique [0002] Nowadays, everyone relies more and more on the mouse when using a computer. Whether it is surfing the Internet or using various software, they all hope to use the mouse to complete the required operations. For example, in the existing password input methods, the password input box must be clicked with a mouse first, and then the password is input through the keyboard. The user is usually accustomed to holding the mouse with the right hand, and also needs the right hand to operate when inputting a numeric password (on the right side of the keyboard) or a mixed alphanumeric password. Like this, every time the user inputs a password, all need to click the mouse first, then let go of the mouse and use the keyboard to input the password, and then return to the mouse to continue the operation. The op...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/033G06F3/048G06F21/00G06F3/0481G06F21/36
Inventor 淦莉萍龚伟
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products