Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Random concealed inquiry type cipher authentication technique

A password technology and password technology, applied in the direction of user identity/authority verification, etc., can solve the problem of inability to protect the security of user accounts, and achieve the effect of lifting the fixation

Inactive Publication Date: 2008-05-21
廖睿
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the design of computer software and hardware systems and the open architecture of the Internet, various malicious programs and Trojan horse programs used for monitoring and theft, phishing websites that have similar domain names and identical appearances to official websites, defraud account passwords, and use cameras Criminal acts such as candid photography or artificial plagiarism of other people's input process make the traditional identity and password authentication mechanism unable to protect the security of user accounts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random concealed inquiry type cipher authentication technique
  • Random concealed inquiry type cipher authentication technique
  • Random concealed inquiry type cipher authentication technique

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The implementation of this technology only needs to upgrade the code of the authentication part of the existing password system, and the original user data part does not need to be modified. Due to the diversity in the selection of development tools and programming languages ​​for implementing this technology in an independent system or in an Internet system, it is impossible to list them one by one. Here, C language is used as an example to illustrate:

[0049] Core data structure:

[0050] 1. The structure array (character information table) used to store the effective password character set of the password:

[0051] structure

[0052] {

[0053] TCHAR character; / / store a valid character

[0054] HBITMAP hBitmap; / / Store the image handle corresponding to the character, the format is a bitmap.

[0055]}CharInfo[36]; / / 36 is the default effective number of characters, 0~9, A~Z. Can be expanded upon request.

[0056] 2. Due to people's thinking habits, in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a random hidden-inquiry password authentication technique, which is adopted in single computer and network, finance and theftproof system and other systems requiring accounts and passwords to validate the identity. The invention aims at overcoming the defects of the traditional password technique. The invention is a novel password authentication technique, aiming to solve the problems that the monitor program, the malicious program, the trojan program steal accounts and passwords, the fishing net cheats accounts and passwords and the process of inputting accounts and passwords are shot and peeped. By distributing a plurality of characters randomly on the key, the password on the given location is input according to the current random distribution locations of the front 5 characters (set by the requirement) in the primary password; the passwords of inquiry and input are different every time and the effects of random hidden inquiry, theftproof and anti-fishing are enabled. The physiological characteristics of human eyes are adopted; the characters on the keys are covered momentarily and shift randomly by the high sensitive colors and figures and shooting, peeping and monitoring screen are proofed. The invention has the advantage that no additional cards, certificates or electronic media are needed.

Description

Technical field [0001] This technology is a brand-new technology to protect legal user information security in wired or wireless Internet systems, independent network systems, financial systems, insurance systems, and application fields that require identity verification. This technology aims to establish a solution that allows account and password information to exist only in the minds of servers and users, and eliminates the possibility of account leakage during the input process. Background technique [0002] With the development of networking and informatization, using computers and mobile phones to send and receive emails, chat, online games, and operate online banking and stocks through the Internet has become popular. Various network service providers and financial institutions also encourage users to conduct self-service operations through the network platform in order to alleviate the work pressure and queuing phenomenon at the counter. The current identity authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 廖睿
Owner 廖睿
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products