Various selectivity cipher safety authentication system and method
A technology of password security and authentication method, applied in the security authentication system, has the ability to remind him that someone is trying to steal important input information, and can solve the problems of hindering the operator's convenience and habit, password being cheated, and security authentication technology is difficult to implement.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0099] Example 1: Application example of deviation table
[0100] Table 1 is a form of deviation table, and the middle black box is the display area, which can also be used as the input area of the soft keyboard. The numbers in ○ indicate serial numbers. Arranged from the serial number ① in the upper left corner to the one in the lower right corner if more than Then return to ①Continue ( ), as the serial number of character 5 can be ⑥, wait.
[0101] Using the tool of deviation table can visually complete the operation between characters. For example define operator The operation is: character character = the absolute value of the difference between the serial numbers of two characters; character Number = the value after the character sequence number plus the number sequence number is used as the sequence number, the word or number here (if it exceeds the end of the table, it will cycle to the head of the table to continue); the number Number = the sum of th...
example 2
[0106] Example 2: JY transformation method: The implicit representation method and encryption algorithm commonly used in the present invention are illustrated in this collection. Example 2-1 The formal expression of the jy transformation method:
[0107] (1) Assume that effective random numbers YXSJ1 and YXSJ2 are selected from the prompt table. Suppose YXSJ1 is made up of characters yx1(1), yx1(2),...,yx1(i), and is abbreviated as yx1; yxsj2 is made up of characters yx2(1),...,yx2(j), and is abbreviated as yx1; yx consists of the characters yx(1), ..., yx(i).
[0108] (2) The content to be transformed is that jy is composed of characters jy(1), jy(2), ..., jy(k) (i, j, k are natural numbers).
[0109] (3) Definition is an operator, (jx(i)) represents the content under the corresponding coordinate (jx(i)) in the one-dimensional prompt table, (jx(i), jx(j)) represents the corresponding coordinate (jx(i)) in the two-dimensional prompt table i), jx(j)), and the rest can be d...
example 2-3
[0125] Example 2-3 Application Example Combining with Deviation Table
[0126] Table 2 is a typical reminder table, the black frame is the reminder area, the frame is the coordinates, the vertical 1 to 0 is the row coordinates, and the horizontal 1 to C of the first row is the column coordinates. Appropriate dividing lines and shading in the prompt area are convenient for users to find, and background images can also be placed. The framed data expression in the table is designed for this purpose. A safe way to use it is to prohibit the cursor from entering the prompt area to prevent leaking important prompt information positions. But you can use the prompt area as a soft keyboard for data input.
[0127] Let jy=7wssbm# (case insensitive)
[0128] yxsj1=67176152 (form of number 1 starting from (2, 5) in Table 2)
[0129] yxsj2=58099778 (form of number 2 starting from (2, 0) in Table 2)
[0130] operator The definition of is the same as Example 1, when using Table 3 for th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com