Login encryption method
An encryption method and password technology, applied in the information field, can solve the problems of personal information cracking, simple user name, etc., and achieve the effect of protecting user information, less memory content, and simple login.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0012] In order to make the public have a deeper understanding of the present invention, the implementation modes are now described in detail.
[0013] A login encryption method is characterized in that it comprises the following steps:
[0014] The first step: select the original information file: the user selects the file containing the information content to form the original information file, the original information file is a text file in txt format or a Microsoft office word file or a Microsoft office Excel file; the file contains a lot of information , the information content is random or ordered, the ordered one refers to the text of the novel in order, and the random one refers to the text of the novel in a disordered order;
[0015] The second step: place the file: put the original information file mentioned in the first step into the appropriate storage location of the mobile phone or computer or server, and set the file attribute to hidden;
[0016] Step 3: Set p...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com