Method, device and terminal device for generating a password prompt
A password prompting and generating device technology, applied in the field of data processing, can solve the problems of insecurity, trouble, and difficult to remember, and achieve the effect of taking into account security and memorability, and being convenient for users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0100] In Embodiment 1, the terminal sends a password generation instruction to the router. After receiving the password generation instruction sent by the terminal, the router collects the terminal's operation record, obtains a password prompt matching the terminal's operation record according to the operation record, and then sends the password prompt Send it to the terminal for display and use by the user. Wherein, the terminal may be a computer, a mobile phone, a PDA (Personal Digital Assistant, personal digital assistant) and the like. Such as image 3 Shown is the first preferred implementation of the method for generating a password prompt in the embodiment of the present invention, and the method includes the following steps:
[0101] Step 301, when the terminal detects that the cursor is located in the password input box, it sends a password generation instruction to the router.
[0102] Step 302, the router receives the password generation instruction sent by the t...
Embodiment 2
[0111] In the second embodiment, the terminal is a computer, and the terminal itself obtains the operation records of the terminal itself, and generates a password prompt matching the operation records of the terminal. Such as Figure 4 Shown is the second preferred implementation of the password prompt generation method in the embodiment of the present invention, this embodiment can be applied in such a scenario: a certain user's computer has logged in application A and application B within a preset time period , according to the login records, the number of times the computer logs in to application A is the most, and application A may be an application frequently used by the user, so the first keyword related to application A can be generated, for example, the password for logging in to application A can be used as a password prompt. The method includes the following steps:
[0112] Step 401 , when the computer detects that the cursor is located in the password input box, t...
Embodiment 3
[0122] In the third embodiment, the terminal is a mobile phone, and the terminal obtains the operation record of the terminal itself, and generates a password prompt matching the operation record of the terminal. Such as Figure 5 Shown is the third preferred implementation of the password prompt generation method in the embodiment of the present invention. This embodiment can be applied in such a scenario: a certain user's mobile phone has logged in to application A and application B within a preset time period. and browsing webpages, among which the number of webpage browsing is the largest, and they have logged in and browsed webpage A, webpage B, and webpage C respectively. According to the browsing records, the mobile phone has browsed the longest webpage in webpage A, and webpage A may be the webpage that the user frequently browses , the password for logging in to web page A can be used as a password prompt. The method includes the following steps:
[0123] Step 501, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


