Identity recognition method for computer system

A computer system and identification technology, applied in the computer field, can solve the problems of password security decline, loophole theft, etc., and achieve the effect of safe use permission requirements

Active Publication Date: 2014-07-09
CHENGDU CYBERKEY TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 3. For static passwords, there are also many loopholes that make it possible to be stolen
Even, even if the entire input process cannot be completely peeped, only one part is peeped, for example, if three digits of the six-digit password are peeped, the security of the password will drop sharply
In fact, peeking at passwords is an important security risk at present, and many criminal activities revolve around this issue
[0006] 4. It is easy to spread
To replace such a static password system, it is obviously possible only through the cooperation of Microsoft, computer manufacturers, and the majority of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition method for computer system
  • Identity recognition method for computer system
  • Identity recognition method for computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] see Figure 1~4 .

[0045] The present invention comprises the following steps:

[0046] 1) Formulate an exchange protocol for encrypted information, write user information into a handheld terminal with a predetermined encryption and decryption mechanism, bind the handheld terminal to the system, establish a mapping between user information and the system host, and transfer the necessary Relevant information is stored in the system host and handheld terminal at the same time;

[0047] 2) The system host publicizes the first encrypted information, which includes the identity information of the system host;

[0048] 3) The handheld terminal obtains the first encrypted information, decrypts it using a predetermined decryption mechanism, obtains the identity information of the system host, searches for the corresponding user information according to the identity information of the system host, and encrypts the user information to become the second encrypted information; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity recognition method for a computer system, relating to a computer technology. The method comprises the following steps: (1) user information is written into a handheld terminal in which preset encryption and decryption mechanisms are stored to bind the handheld terminal to a system, and mapping between user information and a system host is established and stored in the system host and the handheld terminal; (2) the system host publishes first encryption information which comprises identity information of the system host; (3) the handheld terminal acquires the first encryption information, decrypts by using the preset decryption mechanism to obtain the identity information of the system host, searches for corresponding user information according to the identity information of the system host, and encrypts the user information into second encryption information; and (4) the system host receives the second encryption information and decrypts the second encryption information to obtain a static password. According to the method, a user can get rid of the burden of password memorization, and authentication can be completed by only using the handheld terminal.

Description

technical field [0001] The present invention relates to computer technology. Background technique [0002] In the prior art, almost all places and fields involving static passwords are simply, repeatedly and openly used. This process brings great security risks, for example, peeping passwords, keyboards Record theft and more. At the same time, it also brings a lot of inconvenience to the user. For example, the user is required to memorize a lot of passwords that are difficult to remember. If the user chooses an irregular password character string, such as &^+H0J, the security is indeed improved, but it is difficult for the user to remember this password. Therefore many users often adopt simple and easy-to-remember static passwords with a short length and do not change for a long time, but this simple and easy-to-remember passwords are very unsafe. The more important flaws are: [0003] 1. The conflict between security and usability. In order to improve security, it is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 熊楚渝陈雨霖
Owner CHENGDU CYBERKEY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products