Method for dynamically setting password by setting graphic per se in grid digital array

A digital array and graphics technology, applied in digital data authentication, electronic digital data processing, computer security devices, etc., can solve problems such as account password leakage, password leakage, invasion, etc., to protect password security, prevent sudden attacks, and prevent strong effect

Inactive Publication Date: 2011-08-10
王颢
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, various password protection measures at this stage still have defects and loopholes of one kind or another. In addition, users themselves have insufficient awareness of account password security, and even have no protection measures or protection capabilities. loss
The main defects and loopholes in various password protection measures at present are: due to the widespread existence of a single, fixed password setting, the password will be leaked, and the computer virus software such as "Trojan horse" and "phishing" ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for dynamically setting password by setting graphic per se in grid digital array
  • Method for dynamically setting password by setting graphic per se in grid digital array
  • Method for dynamically setting password by setting graphic per se in grid digital array

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] 1. The user applies for registration of an account through the client of the computer server as usual, and the client gives the user's account or account number after confirmation, such as: YNKM123;

[0040] 2. The user clicks the "Graphic Password" option on the client terminal, and the grid is displayed in a grid array with blank spaces and a horizontal and vertical coordinates of 10×10 (such as figure 2 ), the user defines a triangle in the grid array diagram, the triangle is composed of six reference points and three lines connecting the reference points, and the hypotenuse of the triangle faces left, such as image 3 , select the upper acute corner point ① of the triangle as the anchor point of the triangle, start from the anchor point ①, and determine the arrangement order of the reference points to the lower left, right, and upward, as ①~⑥, such as Figure 4 , the initial position coordinates of the positioning point are: abscissa 3, ordinate 8, and at the same ...

Embodiment 2

[0043] When a user uses a network account, the following login verification is performed:

[0044] A. The user clicks the "graphic password" option on the client terminal, and the horizontal and vertical coordinate grid number array with numbers in the grid is displayed, such as Figure 5 , the abscissa 3 and ordinate 8 of the anchor point ① of the triangle set by the user according to Example 1, in Figure 4 Copy out the triangle;

[0045] B. In the abscissa and ordinate grid number array of A above, the user obtains the number 4 in the corresponding grid according to the abscissa 9 and ordinate 3 of the counting point a, and the counting order is determined from ① to ⑥ in sequence Number 4 to ④ in the triangle, then the position ④ in the triangle is the ordinate point, and the ordinate point is the number 2 in the grid where the position ④ is located is the next new ordinate of the triangle anchor point ①, and the ordinate point is the next new ordinate of the triangle anch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for dynamically setting a password by setting a graphic per se in a grid digital array. The method comprises the following steps of: setting the graphic, a counting point and a password point per se in the grid array with abscissas and ordinates, setting a positioning point and reference point arrangement sequence per se in the graphic, simultaneously performing password counting in any one of the eight directions of the grid digital array, transmitting a counted password into a computer server and storing the password as a graphic password; and moving the self-set graphic into the grid digital array with the abscissas and the ordinates, obtaining an abscissa and ordinate point and the password point in the moved graphic according to the self-set counting point, and obtaining the password every time the graphic is moved until meeting the requirement of a network on password digits to dynamically finish password login by the easily-remembered graphic capable of preventing the password from being detected. By the method for dynamically obtaining the password and finishing the login, even though the graphic is the same, the same password cannot be obtained due to different graphic positioning points, different counting points and different password points. Therefore, the password security of a user can be greatly and effectively protected, and sudden attacks from bogusware such as Trojan and the like, and different kinds of snooping and harassing attacks in front of automatic teller machines are prevented; and the method is easy to remember and operate, and highly preventive.

Description

technical field [0001] The invention relates to a method for setting a password, in particular to a method for dynamically setting a password by using a grid number array to set a graph by itself. Background technique [0002] With the popularity of computer networks and bank cards, people are required to set their own passwords when using accounts to protect property safety. However, various password protection measures at this stage still have defects and loopholes of one kind or another. In addition, users themselves have insufficient awareness of account password security, and even have no protection measures or protection capabilities. loss. The main defects and loopholes in various password protection measures at present are: due to the ubiquity of a single, fixed password setting, one will cause password leakage, and the other will be invaded by computer virus software such as "Trojan horse" and "phishing". Although there are protection measures for passwords using ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06F21/00G06F21/36
Inventor 王颢
Owner 王颢
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products