Unlock instant, AI-driven research and patent intelligence for your innovation.

Password management method

A password management and password technology, applied in the field of password management, can solve problems such as airtightness, and achieve the effect of high security and simple operation steps

Active Publication Date: 2013-02-27
SHENZHEN DECARD SMART CARD TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to improve the security of the transaction, people have to take some security measures to ensure the security of the transaction. The input of the password is one of them, but this is not just an impenetrable wall, through Trojan horse software and some hacker tool software Passwords can be easily stolen by capturing keystrokes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to further illustrate the technical means adopted by the present invention and its effects, the following describes in detail in conjunction with preferred embodiments of the present invention and accompanying drawings.

[0024] Such as figure 1 As shown, the present invention provides a password management method, which includes:

[0025] Step 1: The user enters the personal password to enable the safe mouse, and the system enters the password use state. The safe mouse is firstly protected by a personal password, that is to say, if the user wants to enable the safe mouse, he needs to enter the personal password, and then the system can enter the use state of the password, otherwise it can only be used as a normal mouse. At the same time, the personal password is a part of the key used when the user encrypts data, that is to say, the personal password is also used to generate the authentication key in the authentication process of the safety mouse.

[0026] S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a password management method, comprising the following steps: 1, a user inputs a private password to enable a safety mouse, then a system enters a password using mode; 2, the system certificates the safety mouse to confirm whether the safety mouse is approved by the system; 3, the safety mouse certificates the system user to confirm whether system user is legal; and 4, when the certification in step 2 and step 3 both pass, the safety mouse sends corresponding password information outwards in the form of ciphertext to provide for the use of the user, if the number of certification failure excesses a preset number of times continuously, the safety mouse locks by the self, thus the user can not be certificated once again. The password management method of the invention utilizes a mouse to operate to realize password management operation, has simple operation step and high safety, and can conveniently realize password login of various functional windows in the computer.

Description

technical field [0001] The present invention relates to a password management method, in particular to a password management method based on mouse operation. Background technique [0002] Computer is an indispensable electronic product in modern people's life, and mouse is almost one of the necessary input devices for current computer. In computer work, the computer often processes some important and confidential data, such as personal research reports, data of treasury accounts and related data in electronic banks, etc. In this regard, the computer has developed many kinds of security mechanisms to protect the data that needs to be kept secret from being stolen. [0003] Furthermore, with the prevalence of e-commerce in recent years, online trading has become a popular trading method, which also brings some trading risks. In order to improve the security of the transaction, people have to take some security measures to ensure the security of the transaction. The input of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/83
Inventor 孙永战
Owner SHENZHEN DECARD SMART CARD TECH