Supercharge Your Innovation With Domain-Expert AI Agents!

Anti-peep password input method

A password input and anti-peeping technology, applied in the information field, can solve the problems of high implementation cost, restrictions, and increased investment in terminal equipment, and achieve the effect of reducing password leakage and reducing opportunities

Inactive Publication Date: 2010-02-24
谭立彦
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security of dynamic password technology is indeed improved compared with static passwords, but it increases the investment in terminal equipment, and the implementation cost is high. In addition, users need to use different terminal equipment in different applications, such as different banks have different tokens. , which will inevitably lead to users having a lot of small devices such as password cards or tokens, which are inconvenient to carry and difficult to manage
Moreover, although the dynamic password changes from time to time, it still needs to be input with a keyboard when using it. The means of stealing the static password can completely steal the dynamic password, so the dynamic password still has a chance of being stolen during the input process. Generally, it is valid within one minute. Stealing and using the dynamic password within this minute still poses a threat to the user's identity.
[0005] There is also a technology of entering passwords with eyes in foreign countries, which is input by watching the passwords with eyes, but the implementation cost is too high
[0006] Patent application 200910086723.7 proposes a method of password input and verification using a password symbol array with a movable position. In this method, the client device does not recognize the password, but sends the symbol array to the server, and the server recognizes and verifies the password. , this method needs to modify the client and server of the existing system at the same time, and is subject to certain restrictions in implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-peep password input method
  • Anti-peep password input method
  • Anti-peep password input method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] Such as figure 1 As shown, the present embodiment provides an anti-peeping password input method, the method comprising:

[0017] Step S101: displaying a symbol array, the symbol array is composed of a plurality of symbols;

[0018] Step S103: receiving a movement instruction input by the user, and changing the positions of the symbols in the symbol array according to the movement instruction;

[0019] Step S105: receiving a confirmation instruction input by the user, and confirming the symbol array after changing the position;

[0020] Step S107: Identify the password.

[0021] When the user starts to input the password in the above step S101, the password input device displays a symbol array on its display unit, the symbol array is composed of a plurality of symbols recognizable by human eyes, including the symbols constituting the user password. The symbols in the symbol array conform to the specified password symbol set, that is, the symbols displayed in the symb...

Embodiment 2

[0026] The method of this embodiment stipulates that in the symbol array confirmed in step S105, the password symbol is located at a specific position, and the specific position is preset by the user. For example, it is stipulated that the password symbol is located in the central cell of the symbol array, then in this embodiment, the password symbol needs to be moved to the center of the symbol array in step S103, that is figure 2 In the position of character ' 7 ', then click the input button 2027 to confirm the symbol array in step S105, and step S107 reads the password symbol from the central position of the confirmed symbol array according to the preset position regulation.

Embodiment 3

[0028] In yet another embodiment of the present invention, reference symbols and a preset relative positional relationship are used to assist input to avoid password disclosure caused by directly clicking on the password. The relative positional relationship refers to the position of the reference symbol and the password symbol in the symbol array. In terms of the relationship between display positions, intuitively, "diagonal relationship", "upper and lower adjacency", "left and right adjacency" and the like can be preferred. The system stipulates that in step S103, the user needs to select a reference symbol, and set the positions of the password symbol and the reference symbol to conform to the preset relative positional relationship. For example, the preset relative positional relationship is "the reference symbol is below the password symbol, and the two are adjacent up and down", then in figure 2 In the symbol array shown, if you want to enter the password '1', the execu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an anti-peep password input method, which comprises the steps of: displaying a symbolic array composed of a plurality of symbols; receiving a move instruction input by user andvarying the positions of the symbols in the symbolic array according to the move instruction; receiving a confirmation instruction input by user and confirming the symbolic array with the positions being varied; and identifying password. By utilizing the method provided by the invention, an operator sets the symbols in the symbolic array into a corrective array relation according to the prescription of a system during inputting the password, and as a lot of symbols are included in the symbolic array and a lot of groups of correctively-arrayed symbols probably exist, the bystander cannot judgein which group the password to be truly input is included; the operator has no need of 'touching' the password by selection approaches such as keyboard, mouse, finger and the like while inputting thepassword, thus reducing the possibility of revealing the password; and meanwhile, no modification can be applied to current application system during the implementation of the method, and the method can be implemented in an inputting manner on the level of the operating system.

Description

technical field [0001] The invention belongs to the field of information technology, in particular to a password input method applied to password input and identity verification. Background technique [0002] With the development of networking, informatization, and electronics in modern society, the use of information technology for office, transaction, shopping, entertainment and other applications presents a vigorous development trend, and information technology has penetrated into people's lives. Most information technology applications use preset passwords to verify user identities, and various viruses, Trojan horses, network sniffing, camera peeping and other means have brought great security problems to the traditional password input and verification methods, and have actually caused many problems. Large economic loss, which makes users have great concerns about password security when using information technology. It can be said that the security issues of password in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F3/048G06F21/00G06F21/83
Inventor (请求不公开姓名)
Owner 谭立彦
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More