Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Login encryption method

An encryption method and password technology, applied in the information field, can solve the problems of personal information cracking, simple user name, etc., and achieve the effect of protecting user information, less memory content, and simple login.

Inactive Publication Date: 2013-09-18
ZHENGZHOU UNIVERSITY OF AERONAUTICS
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is a pity that personal information is often cracked due to too simple user names and passwords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] In order to make the public have a deeper understanding of the present invention, the implementation modes are now described in detail.

[0013] A login encryption method is characterized in that it comprises the following steps:

[0014] The first step: select the original information file: the user selects the file containing the information content to form the original information file, the original information file is a text file in txt format or a Microsoft office word file or a Microsoft office Excel file; the file contains a lot of information , the information content is random or ordered, the ordered one refers to the text of the novel in order, and the random one refers to the text of the novel in a disordered order;

[0015] The second step: place the file: put the original information file mentioned in the first step into the appropriate storage location of the mobile phone or computer or server, and set the file attribute to hidden;

[0016] Step 3: Set p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information technology and particularly relates to a login encryption method. The method includes the steps of selecting an original information file, placing the file, setting a password, and allowing a user to log in. The login encryption method has the advantages that the problems that login is cracked easily and input information is difficult to memorize in the prior art are solved; less content needs to be memorized by users, and login is simpler and safer.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a login encryption method. Background technique [0002] As a method of authentication, login is widely used in communication, computer, information and other fields. At present, when people log in to an e-mail, they generally need to enter a user name and password, and if necessary, a verification code. Only when the three are consistent with the information stored in the system can they log in to enter the e-mail. Of course, the power-on password of the mobile phone, the power-on password of the computer, the password of wireless Internet access, the gateway password, etc., are generally composed of user names and passwords in the prior art. In order to be more secure, a verification code will also be introduced for protection. The purpose of this method is to protect the security of user information and increase the difficulty of cracking. However, it is a p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCG06F21/46H04L63/0428H04L63/083
Inventor 方亚琴蒋菊生
Owner ZHENGZHOU UNIVERSITY OF AERONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products