Method for enacting and acknowledging irregularity code

A setting method and irregular technology, applied in digital data authentication, user identity/authority verification, instruments, etc., can solve problems such as usage restrictions

Inactive Publication Date: 2008-10-01
WISTRON CORP +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned dynamic password needs to be used with the user's portable device and chip-type card, and its use is relatively limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enacting and acknowledging irregularity code
  • Method for enacting and acknowledging irregularity code
  • Method for enacting and acknowledging irregularity code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] see figure 1 shown. The method for setting irregular passwords of the present invention is used for a user to set a password string to log in to electronic devices such as servers provided by computers, financial card cash machines, Internet sites, or hosts of wireless communication networks. The operator of the device. The method for setting irregular passwords of the present invention includes inputting an irregular character set composed of a string of characters, numbers or symbols into a host, such as a computer host, a portable communication device, etc., to generate a password string, and display In a display unit such as a liquid crystal display; the password string includes a login code and at least one component unit 51-58. The login code and the constituent elements 51-58 each include at least one character. The character is one or both of a letter, number, or symbol. The entry code may further include a start code 1, an intermediate code 2 and an end cod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for setting anomalous password and a confirmation method. An anomalous character set composed of a string of character, number or symbol, is input into a host computer, generates a password serial list and is displayed on a display; the password serial list includes at least one login code and at least one random combination unit composed of character, number or symbol, the login code is hid in the random combination unit and is not easy being stealing.

Description

technical field [0001] The invention relates to a method for setting and confirming passwords (Passwords) for confirming user identities, in particular to a method for setting and confirming passwords for users to log in to a system on the Internet. Background technique [0002] Many people have to remember many different passwords to log in corresponding operating systems using various passwords. The rules for setting passwords are becoming more and more complicated. Simple passwords composed of "1234" or "abcd" are no longer accepted by many operating systems. It becomes very annoying to set a password according to the password setting rules, for example, to set a password that complies with IBM's CMVC system, it will almost make people crazy. The same application password on the Internet usually must contain words, numbers and specific symbols, and the password cannot use continuous numbers or words, wherein the number must be between words, etc. [0003] Furthermore, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/00G06F21/31
Inventor 陈厚成
Owner WISTRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products