Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and terminal device for generating a password prompt

A password prompting and generating device technology, applied in the field of data processing, can solve the problems of insecurity, trouble, and difficult to remember, and achieve the effect of taking into account security and memorability, and being convenient for users

Active Publication Date: 2017-02-15
XIAOMI INC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the user needs to manually enter the password string when setting the password, which is very cumbersome especially when setting it on the mobile terminal, and it is easy to enter mistakes; secondly, it is difficult for the user to think of multiple memorable passwords when entering the password. Difficult to remember; if it is easy to remember, it is not safe to use the same password for multiple products

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and terminal device for generating a password prompt
  • Method, device and terminal device for generating a password prompt
  • Method, device and terminal device for generating a password prompt

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0100] In Embodiment 1, the terminal sends a password generation instruction to the router. After receiving the password generation instruction sent by the terminal, the router collects the terminal's operation record, obtains a password prompt matching the terminal's operation record according to the operation record, and then sends the password prompt Send it to the terminal for display and use by the user. Wherein, the terminal may be a computer, a mobile phone, a PDA (Personal Digital Assistant, personal digital assistant) and the like. Such as image 3 Shown is the first preferred implementation of the method for generating a password prompt in the embodiment of the present invention, and the method includes the following steps:

[0101] Step 301, when the terminal detects that the cursor is located in the password input box, it sends a password generation instruction to the router.

[0102] Step 302, the router receives the password generation instruction sent by the t...

Embodiment 2

[0111] In the second embodiment, the terminal is a computer, and the terminal itself obtains the operation records of the terminal itself, and generates a password prompt matching the operation records of the terminal. Such as Figure 4 Shown is the second preferred implementation of the password prompt generation method in the embodiment of the present invention, this embodiment can be applied in such a scenario: a certain user's computer has logged in application A and application B within a preset time period , according to the login records, the number of times the computer logs in to application A is the most, and application A may be an application frequently used by the user, so the first keyword related to application A can be generated, for example, the password for logging in to application A can be used as a password prompt. The method includes the following steps:

[0112] Step 401 , when the computer detects that the cursor is located in the password input box, t...

Embodiment 3

[0122] In the third embodiment, the terminal is a mobile phone, and the terminal obtains the operation record of the terminal itself, and generates a password prompt matching the operation record of the terminal. Such as Figure 5 Shown is the third preferred implementation of the password prompt generation method in the embodiment of the present invention. This embodiment can be applied in such a scenario: a certain user's mobile phone has logged in to application A and application B within a preset time period. and browsing webpages, among which the number of webpage browsing is the largest, and they have logged in and browsed webpage A, webpage B, and webpage C respectively. According to the browsing records, the mobile phone has browsed the longest webpage in webpage A, and webpage A may be the webpage that the user frequently browses , the password for logging in to web page A can be used as a password prompt. The method includes the following steps:

[0123] Step 501, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a password hint generation method, a device and terminal equipment. The generation method comprises the following steps of receiving a password generation command; obtaining the operation record of a terminal used for sending the password generation command; according to the operation record of the terminal, generating the password hint matched with the operation record of the terminal. In the embodiment of the invention, according to the operation record of the terminal related to the self life of the user, the password hint matched with the operation record of the terminal is generated for the user to use, the safety and the memorability of the password are both considered, and the password does not need to be manually input by the user, thereby being more convenient, flexible and intelligent, and bringing convenience for the user.

Description

technical field [0001] The present invention relates to the technical field of data processing, in particular to a password prompt generation method, device and terminal equipment. Background technique [0002] A cipher is a technique used for obfuscation in the hope of turning normal (recognizable) information into something unrecognizable. Of course, for a small number of people, this unidentifiable information can be reprocessed and recovered. Password is a general term for "password" (password) in Chinese, which is a confidential character string used for identity verification to protect privacy that does not want to be seen by others and prevent unauthorized operations, so as to protect privacy and prevent unauthorized access. Purpose of authorized operation. Strictly speaking, the "password" entered when logging in to a website, email or bank withdrawal should only be called a "password" because it is not an "encrypted code" in the original sense, but it can also be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46H04L9/00
Inventor 夏勇峰屈恒张鹏飞
Owner XIAOMI INC