User multi-code management system and method

A management system and multi-password technology, applied in the field of encryption and decryption, can solve the problems that the login name is not hidden and cannot be seen at will, so as to achieve the effect of ensuring the security of user information

Inactive Publication Date: 2013-04-17
TIANJIN SAMSUNG OPTO ELECTRONICS +1
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the above-mentioned method of accessing confidential information through a password in the prior art can hide the user's private information and the user's password at th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User multi-code management system and method
  • User multi-code management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0028] like figure 1 As shown, the present invention also relates to a user multi-password management system, including a display module, a control module, an input module and a storage module.

[0029] The display module is connected with the control module, and is used for displaying the user input password interface, and displaying the corresponding user interface according to the instruction sent by the control module. Since the user multi-password management system of the present invention can be used in user login systems such as computers, networks, and mobile terminals, the display module can be a computer or mobile terminal display, a touch screen or a liquid crystal display, or It's an LED display.

[0030] The control...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user multi-code management system. The user multi-code management system comprises a display module, a control module, a storage module and an input module. The invention also discloses a user multi-code management method. The user multi-code management method comprises the following steps of; (1) displaying a user input code interface; (2) acquiring user input information, and judging whether the input information is matched with a certain code prestored in a database or not; (3) filtering the database according to preset user access authority which corresponds to the code matched with the input information through a filter; and (4) displaying an individual interface which corresponds to the code matched with the input information. For the user multi-code management system disclosed by the invention, the login name and code corresponding mode in the prior art can be saved, only the user input code interface is displayed in the display module, and the user access authority is preset for each code, thereby entering the individual interface which corresponds to the code by only directly inputting the code in the logging process and further ensuring the user information safety.

Description

technical field [0001] The invention relates to the field of encryption and decryption, in particular to a user multi-password management system and method. Background technique [0002] At present, people increasingly use computers and computer networks to access various security resources, such as sensitive information or valuable information. In terms of accessing confidential information via intranets and the Internet, the use of visitor-level permissions to correspond to access to information of different confidentiality levels is increasingly being used, and passwords are used to limit access to authenticated users to determine their level of authority. become more and more important. Usually, users log in through their login names and corresponding passwords, and the password management organization manages the setting and use of user names and passwords. If the user is an unauthorized person who tries to illegally impersonate a legitimate user and submit wrong pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/62
Inventor 杨秀丽尹熙正曹再铉
Owner TIANJIN SAMSUNG OPTO ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products