Method and system for protecting interface access security by combining visual array path with hidden operational character
A technology for accessing resources and users, applied in instruments, digital data authentication, electronic digital data processing, etc., can solve problems such as security vulnerabilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] The present invention provides improved security for accessing the system through token or password entry using a method implemented through the execution of program instructions. This technique is suitable for replacing traditional password and PIN entry in computer systems or dedicated terminals such as ATMs. In a computer system, the present invention can be adopted in the operating system of a general-purpose computing system, and can also be embedded in a dedicated application program, or provided through a web interface downloaded from a server, for example, through an extensible markup language (XML) program or java script program. The present invention is generally used to secure access to resources such as system login access, financial information and transaction capabilities at an ATM or login access to other secure resources such as applications or databases.
[0055] Instead of just accepting the input of a password or token and optionally manipulating the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 