A logging-on process cipher protection method by means of background synchronization

A password-protected, background technology, applied in the computer field, can solve the problems of PIN code physical card issuance costs and high cost, not widely used, losses, etc., to prevent important information from leaking and avoid loopholes

Inactive Publication Date: 2008-07-09
黄承雄
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 3. Memory scanning and interception: After the Trojan horse virus runs, it detects the process of all programs in the system through Hook technology, and monitors the calls of related APIs. keyboard, mouse, copy, paste and other events, or directly read the unencrypted account password of the process, or intercept other API function call events, this Trojan horse has a strong concealment, and there is currently no very effective prevention method
[0010] 4. Phishing: Phishing attacks, malicious websites disguised as homepages of well-known companies, using domain name similarity and IE browser address spoofing loopholes to trick netizens into entering account numbers and passwords, and planting Trojan horse viruses through malicious scripts to lure more users Visiting this website causes infection, and cyber crooks use these fake websites to steal account numbers and passwords of login users, which brings huge losses to relevant departments and industries, makes people question the safety of online transactions, and seriously hinders electronic transactions. Development of the business industry
[0012] 1. Anti-virus software: For known

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A logging-on process cipher protection method by means of background synchronization
  • A logging-on process cipher protection method by means of background synchronization
  • A logging-on process cipher protection method by means of background synchronization

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0041] Password protection for applications, client software and webpages, applicable to online games, instant messaging clients, other local applications, various webpages, etc. It is necessary to collect and confirm the account number, password and submission box information in advance, such as figure 1 For the working principle process of the present invention Figure 1 , whose flow:

[0042] 1. Add account password, encrypted and saved in the software, such as image 3 Schematic diagram of the user interface of the "account password management" of the present invention;

[0043] 2. Collect characteristic information such as the account number, password input box, and submit button position value in the application program, client software, or web page that need to be logged in, and add and save it as an automatic login protection item record, such as Figure 4 It is a schematic diagram of the user interface of the "automatic login protection" of the present invention;

...

example 2

[0049] Password protection for webpage login, applicable to website pages such as e-mail, e-commerce, online banking, forum passwords, personal blogs, etc. The information in the account and password submission box can be determined through the feature field in the webpage, such as figure 2 For the working principle process of the present invention Figure II , its flow:

[0050] 1. Add account password, encrypted and saved in the software, such as image 3 Schematic diagram of the user interface of the "account password management" of the present invention;

[0051] 2. Add the name and URL address of the webpage that needs to be logged in, and save it as a custom login protection project record, such as Figure 5 It is a schematic diagram of the user interface of the "custom login protection" of the present invention;

[0052] 3. Select the corresponding account password to associate with the web page name and URL address in the "Custom Login Protection" project record, s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the computer field, in particular to a password protection method which utilizes a background synchronization method to complete the login process. The method comprises the following steps: an account password is encrypted and saved in a local file via a computer software; the software automatically captures and locks application procedures, client software or web pages, which need to login, at the background of an operation system, then decrypts and sends the account password under a protection state, confirms, submits and simultaneously completes the login process; then the account password information in a memory is cleaned up, thereby protecting each detail in the processes of transporting and submitting the password on a local computer. The invention effectively prevents the harmful procedure from stealing the account password of a user; the user does not need to enter the account password at each time, and the filling and login process is completed automatically by the software; in addition, the invention has the advantages of safety, rapidity and good protection effects on instant messaging, network games, e-business, internet banking, forum blogs, client software and various login applications.

Description

technical field [0001] The invention provides a password protection method for completing a login process by using a background synchronization method, which belongs to the technical field of computers. Background technique [0002] With the popularization of Internet applications, virtualization of real life is the main feature and trend at present. The protection of information security, personal privacy, and virtual property is particularly important. The most common protection method is passwords, but passwords provide us with the necessary security. At the same time, it also brings a lot of trouble. If the password is stolen, our important information and personal privacy may be leaked, and virtual property, business secrets, and deposit funds may be stolen. [0003] At present, the theft of network passwords is becoming more and more serious. According to statistics, most of them are attacked by harmful programs such as Trojan horses, viruses, and hackers. There are ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00H04L29/06H04L9/32G06F21/71
Inventor 黄承雄
Owner 黄承雄
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products