Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for entering password

A password input and password technology, applied in the field of information security, can solve problems such as the proliferation of hacking Trojan programs, user data leakage, and user loss, and achieve the effect of preventing Trojan horse program theft and ensuring information security.

Active Publication Date: 2014-08-06
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the current network environment is very insecure, especially Trojan horse programs are very rampant, there are many Trojan horse programs that will monitor the user's keyboard input, and send the characters entered by the keyboard to the hacker's server, thereby stealing the user's password
The soft keyboard does not generate the key operation of the physical keyboard. Although it can prevent such Trojans from stealing accounts to a certain extent, some Trojans can still obtain the password entered by the user through the position of the mouse or the touch point and the layout of the soft keyboard, causing users The potential risk of data leakage is very large
[0004] Once the password is stolen, it will cause irreparable losses to the user. For example, if the bank card password is stolen, the money in the account may be transferred by someone, resulting in property loss. Therefore, network password security has become a very urgent need for everyone.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for entering password
  • Method and system for entering password
  • Method and system for entering password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention provides a password input method and a password input system thereof. In order to make the purpose, technical solution and effect of the present invention clearer and clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] see figure 1 , which is a flow chart of the method for inputting a password in the present invention. The method for inputting password provided by the present invention comprises:

[0037] S100. When the user inputs a password, prompt the user to input a password in a wrong order; S200. Adjust the order of the out-of-order passwords input by the user, and perform password verification.

[0038] In step S100, when the user needs to input a password to log in to the account (for example, when the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for entering a password. The method includes the steps of (1) reminding that a user enters a password with a muddled order when the user enters the password, and (2) adjusting the order of the password, with the muddled order, entered by the user, and carrying out password authentication. According to the method and system for entering the password, when entering the password, the user is reminded that the password with the muddled order is entered through the system, then the order of the password, with the muddled order, input by the user is adjusted, and password authentication is carried out; due to the fact that the order of the password entered by the user is muddled, Trojan horse programs can not obtain the correct password, the password of the user is effectively prevented from being stolen by the Trojan horse programs, and the information safety of the user is guaranteed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a password input method and a password input system thereof. Background technique [0002] Network technology has brought various conveniences to people, such as: users conduct online banking shopping, online banking transfer, account inquiry, sending and receiving emails, chatting, etc. through the Internet, and people can complete various tasks without leaving home. [0003] Because the current network environment is very insecure, especially Trojan horse programs for account theft are very rampant. At present, there are many Trojan horse programs that can monitor the user's keyboard input and send the characters entered by the keyboard to the hacker's server, thereby stealing the user's password. The soft keyboard does not generate the key operation of the physical keyboard. Although it can prevent such Trojans from stealing accounts to a certain extent, some Troj...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/46G06F21/31
CPCG06F21/31G06F21/46
Inventor 裴健学
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD