Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security password input system and implementation method for intelligent terminal

An intelligent terminal and input system technology, applied in transmission systems, user identity/authority verification, digital data authentication, etc., can solve problems such as operability and security, inconvenience for users to enter passwords, and inconvenience for users to carry around. Achieve the effect of easy memory, high security password input and verification, and reduced size

Inactive Publication Date: 2016-02-17
QILU UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has problems in operability and safety
[0003] There are two aspects to the operability problem: (1) It is not convenient for users to carry with them when the keyboard design is large; (2) It is not convenient for users to input passwords when the keyboard design is small, and it is easy to cause password input errors
[0004] The security problem lies in: for the convenience of operation and memory of the user, the external device only provides a numeric keypad, allowing the user to set a password of 6-8 digits
The strength of this password is low, it is easy to be guessed by the adversary, or observed by the adversary when entering the password
And because users often use one password for multiple applications for the convenience of memory, this will cause security problems for other applications of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security password input system and implementation method for intelligent terminal
  • Security password input system and implementation method for intelligent terminal
  • Security password input system and implementation method for intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0033] Such as figure 1 As shown, the schematic diagram of the inventive security password input system for smart terminals is given, which includes smart terminals 1 (such as smart phones, IPADs, tablet computers and other smart mobile terminal devices with Internet access functions), external password input device 2, remote server 3 and communication line 4, and the external password input device 2 communicates with the intelligent terminal 1 in a wired or wireless form. In the case that the external password input device 2 and the smart terminal 1 adopt wired communication, it can be connected with the audio or USB interface of the smart terminal 2 through the communication line 4 . Smart terminal 1 communicates with remote server 3 through 3G or GPRS network. The smart terminal 1 is also used to run the application program of the external password...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent terminal oriented security password input system which comprises an intelligent terminal, an external password input unit and a remote server. The external password input unit is used for displaying and encrypting graphic information and directed line segment information. An implementation method includes a), enabling the external password input unit to be in communication connection with the intelligent terminal; b), configuring graphic parameters; c), selecting directed line segments; d), encrypting password configuration information; e), transmitting the password configuration information; f), acquiring the password configuration information; g), randomly generating a regular graph; h), encrypting the graphic information; i), transmitting the encrypted graphic information; j), decrypting the graphic information and the directed line segment information; k), enabling the remote server to perform judgment. The intelligent terminal oriented security password input system and the implementation method have the advantages that passwords are configured by the aid of the graph and the directed line segments jointly and accordingly are different from one another; the real passwords of users cannot be detected even if a keyboard recorder is mounted on the intelligent terminal; the intelligent terminal oriented security password input system and the implementation method have wide application space in the field of mobile application and particularly in the field of electronic commerce and electronic governments.

Description

technical field [0001] The present invention relates to an intelligent terminal-oriented security password input system and its implementation method, more specifically, to an intelligent terminal-oriented security password input system and implementation method in which the input password has high strength and is difficult for opponents to steal. Background technique [0002] With the popularization of smartphones, IPADs, tablet computers and other intelligent mobile terminal devices with Internet access functions, it has become a trend and general trend of the information society to use such devices to realize e-commerce transactions and e-government system login anytime and anywhere. However, because users often install a large number of application software on personal smart terminals, and the security of these application software cannot be guaranteed, some malicious application software will intercept the user's keystroke information, thereby capturing the user's transa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06G06F21/36
Inventor 赵华伟徐如志聂培尧李延改
Owner QILU UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products