Password hidden method and device and password retrieval method and device

A password concealment and password technology, applied in the field of information security, can solve the problems of inability to retrieve passwords, leakage of security information, affecting users' use, etc., to improve security, facilitate memory, and reduce the possibility of password leakage.

Inactive Publication Date: 2013-04-24
网秦无限(北京)科技有限公司
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, this password retrieval method is easy to be used by familiar people, resulting in the leakage of security information
Moreover, sometimes the user himself may forget the answer to the prompt question set by himself, resulting in the final failure to retrieve the password, seriously affecting the user's use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password hidden method and device and password retrieval method and device
  • Password hidden method and device and password retrieval method and device
  • Password hidden method and device and password retrieval method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and unnecessary details and functions for the present invention will be omitted during the description to avoid confusing the understanding of the present invention. Hereinafter, the present invention is described in detail by taking the scenario where the present invention is applied to a wireless mobile communication system as an example. But the present invention is not limited thereto, and the present invention can also be applied to a fixed communication system, a wired communication system, or any hybrid structure of a fixed communication system, a wired communication system, a wireless mobile communication system, and the like. As far as the mobile communication system is concerned, the present invention is not limited to specific mobile communication protocols, but may include but not limited to 2G, 3G, 4G, 5G networks, WCDMA, CDMA2000...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a password hidden method (100). The password hidden method (100) comprises the following steps: receiving password information inputted by a user and an image (S110); processing the image, and integrating the password information to data (S120) of the image in a method that the using method of the image is not influenced; and returning an image (S130) after the image is processed. The invention further provides a password retrieval method (200), a password hidden device (1000) and a password retrieval device (2000).

Description

technical field [0001] The present invention relates to the field of information security, and more specifically, to a password concealment method, a password retrieval method, a password concealment device and a password retrieval device. Background technique [0002] At present, many applications require a user to set a password, for example, chat software, e-mail, and the like. Usually, these applications also allow the user to set the operation of retrieving the password after forgetting the password, for example, set to answer the prompt question, and after the answer is correct, the password will be directly sent to the email address specified in advance; or, after the answer is correct, directly send the reset password links etc. [0003] However, this way of retrieving passwords is easy to be exploited by familiar people, resulting in leakage of security information. Moreover, sometimes the user himself may forget the answer to the prompt question set by himself, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L29/06H04L63/083H04L63/04
Inventor 杰弗里·特伦斯·凯斯里朱利安·卢埃林·赛弗里德·伊文思程平
Owner 网秦无限(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products