Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Various selectivity cipher safety authentication system and method

A technology of password security and authentication method, applied in the security authentication system, has the ability to remind him that someone is trying to steal important input information, and can solve the problems of hindering the operator's convenience and habit, password being cheated, and security authentication technology is difficult to implement.

Inactive Publication Date: 2009-04-22
谢丹
View PDF0 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The sixth method not only hinders the convenience and habit of the operator, but also has no power to resist the attack of the video playback of the camera and the screen recording software built in the computer.
[0017] Since the deception objects of phishing websites are people who are not familiar with the system and careless people, the first two methods are not enough to make these people resist the deception of phishing websites
The third method is to know that you have been cheated after entering the account number and password, and the password has been cheated
However, this early warning mechanism is difficult to achieve in the existing security authentication technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Various selectivity cipher safety authentication system and method
  • Various selectivity cipher safety authentication system and method
  • Various selectivity cipher safety authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0099] Example 1: Application example of deviation table

[0100] Table 1 is a form of deviation table, and the middle black box is the display area, which can also be used as the input area of ​​the soft keyboard. The numbers in ○ indicate serial numbers. Arranged from the serial number ① in the upper left corner to the one in the lower right corner if more than Then return to ①Continue ( ), as the serial number of character 5 can be ⑥, wait.

[0101] Using the tool of deviation table can visually complete the operation between characters. For example define operator The operation is: character character = the absolute value of the difference between the serial numbers of two characters; character Number = the value after the character sequence number plus the number sequence number is used as the sequence number, the word or number here (if it exceeds the end of the table, it will cycle to the head of the table to continue); the number Number = the sum of th...

example 2

[0106] Example 2: JY transformation method: The implicit representation method and encryption algorithm commonly used in the present invention are illustrated in this collection. Example 2-1 The formal expression of the jy transformation method:

[0107] (1) Assume that effective random numbers YXSJ1 and YXSJ2 are selected from the prompt table. Suppose YXSJ1 is made up of characters yx1(1), yx1(2),...,yx1(i), and is abbreviated as yx1; yxsj2 is made up of characters yx2(1),...,yx2(j), and is abbreviated as yx1; yx consists of the characters yx(1), ..., yx(i).

[0108] (2) The content to be transformed is that jy is composed of characters jy(1), jy(2), ..., jy(k) (i, j, k are natural numbers).

[0109] (3) Definition is an operator, (jx(i)) represents the content under the corresponding coordinate (jx(i)) in the one-dimensional prompt table, (jx(i), jx(j)) represents the corresponding coordinate (jx(i)) in the two-dimensional prompt table i), jx(j)), and the rest can be d...

example 2-3

[0125] Example 2-3 Application Example Combining with Deviation Table

[0126] Table 2 is a typical reminder table, the black frame is the reminder area, the frame is the coordinates, the vertical 1 to 0 is the row coordinates, and the horizontal 1 to C of the first row is the column coordinates. Appropriate dividing lines and shading in the prompt area are convenient for users to find, and background images can also be placed. The framed data expression in the table is designed for this purpose. A safe way to use it is to prohibit the cursor from entering the prompt area to prevent leaking important prompt information positions. But you can use the prompt area as a soft keyboard for data input.

[0127] Let jy=7wssbm# (case insensitive)

[0128] yxsj1=67176152 (form of number 1 starting from (2, 5) in Table 2)

[0129] yxsj2=58099778 (form of number 2 starting from (2, 0) in Table 2)

[0130] operator The definition of is the same as Example 1, when using Table 3 for th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security authentication system, in particular to a security authentication system which can carry out stage treatment to the login password of a user and endows each stage password with specific functional meaning; simultaneously, the invention also relates to a set and a using method of the security authentication system. As the invention needs the user to carry out or guide the operation on site, more opportunities and time are provided for the users of the invention to get rid of the control or alarm when in a non-voluntary moment. A service end provides a personalized response code and a check code for each user; the users can firstly judge and then input the response code and the check code before inputting the passwords, thereby avoiding a fake service end.

Description

technical field [0001] The present invention relates to a security authentication system, in particular to a security authentication system which processes user login passwords in different levels and assigns specific functional meanings to the passwords at all levels; at the same time, it also relates to the setting and use methods of the security authentication system. It belongs to the field of information security technology. [0002] The present invention relates to a safe input method for digital input, especially a method for preventing insiders from stealing other people's identity recognition equipment, installing Trojan horses and other malicious means, or stealing and eavesdropping to steal important input information. And a way to alert him that someone is trying to steal important input information. Because most of the important information to be input is expressed in a password mode, it is called a password in the present invention's narration, but its essence i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 谢丹
Owner 谢丹
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products