Password authentication method and system

A password verification and password technology, which is applied in the field of communication, can solve problems such as physical keyboard input passwords are easy to be stolen, affect user information security and property security, and steal user passwords.

Inactive Publication Date: 2014-11-12
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The password entered by the physical keyboard is very easy to be stolen. There are many Trojan horse programs that will monitor the user's keyboard input and send the characters entered by the keyboard to the hacker's server, thereby stealing the user's password
Soft keyboard input is a better way to deal with the above Trojan horse programs. Since the soft keyboard does not produce the key operations of the physical keyboard, it is difficult for the Trojan horse program to obtain the user's input data.
Although the soft keyboard prevents this kind of Trojan hacking to a certain extent, some Trojan programs can still obtain the password entered by the user through the position of the mouse or touch point and the layout of the soft keyboard, resulting in the leakage of user password data, resulting in irreparable damage. loss, which seriously affects the user's information security and property security
[0004] In summary, there are obviously inconveniences and defects in the actual use of the existing technology, so it is necessary to improve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password authentication method and system
  • Password authentication method and system
  • Password authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0064]figure 1 It is a schematic structural diagram of the password verification device of the present invention, and the password verification device 100 can be applied to a server or a communication terminal. The server may be an ordinary server or a cloud server with powerful computing capability, and the communication terminal may be a mobile phone, a PDA (Personal Digital Assistant, personal digital assistant), a tablet computer, and the like. The password verification device 100 includes at least a password receiving module 10 and a password verification module 20, wherein:

[0065] The pass...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applied to the technical field of communication and provides a password authentication method. The method comprises the following steps of receiving a password, namely receiving at least one password character and at least one interference character, which are input by a user according to a preset rule, and establishing a password character string by using the password character and the interference character; authenticating the password, namely performing password authentication on the password character string according to the preset rule. Correspondingly, the invention also provides a password authentication device. Therefore, the invalid interference character is added for interference in the process of inputting and authenticating the password, the password of the user can be effectively prevented from being stolen by a rogue program, and the information safety and the property safety of the user are fully guaranteed.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a password verification method and system. Background technique [0002] With the rapid development of network technology, users often need to enter various passwords when using the network, including important information such as ordinary account passwords and financial account passwords. Once these passwords are stolen, it will cause irreparable losses to users. However, because the current network environment is very insecure, especially malicious programs such as Trojan horses are flooding, almost every user has the experience of having their password stolen, so improving network password security has become a very urgent need for users. [0003] Currently, users usually enter passwords through physical keyboards or soft keyboards. The password entered by the physical keyboard is very easy to be stolen. There are many Trojan horse programs that will monitor t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/46
CPCG06F21/31
Inventor 裴健学
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products