Method for verifying password code in fuzzy mode and code verifying equipment

A fuzzy and cryptographic technology, applied in the direction of digital data authentication, etc., can solve the problems of weak operation experience, poor interactivity, and low security, and achieve the effect of enhancing fuzziness and being easy to implement and use

Active Publication Date: 2014-11-19
SMART ELECTRONICS IND DONG GUAN +1
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] First of all, because this method adopts the method of dynamically assigning a group of candidate character sets into multiple candidate subsets, and then fixedly displaying these candidate subsets for selection, its interactivity is poor and the operating experience is relatively weak;
[0007] Secondly, in terms of security, the candidate characters displayed on the screen can still be easily peeped or transcribed. In theory, stealers can memorize the user's multiple operations on the same password by rote, and then use the method of elimination to guess the password. less secure
[0008] Therefore, from the perspective of application, password verification should have a good human-computer interaction effect, and from the perspective of security, it is necessary to pay attention to both the ambiguity of plaintext expression and the ease of operation. Simplified expression and operation are a pair of contradictions, but there is still room for breakthroughs in the combination of the two

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying password code in fuzzy mode and code verifying equipment
  • Method for verifying password code in fuzzy mode and code verifying equipment
  • Method for verifying password code in fuzzy mode and code verifying equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0038] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used in the present invention may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or combinations the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention mainly relates to a method for verifying a password code in a fuzzy mode. The method includes the following steps that (1) a plurality of candidate information units are displayed in a hashed mode, information units of the password code serve as the candidate information units, and the distance between graphic user interfaces where every two adjacent candidate information units are located at any moment is not larger than a default maximum value; (2) setting of the relative position relation of a target selection area and the candidate information units is accepted, so that the number of the candidate information units covered by the target selection area can reach two or more, and the candidate information units covered by the target selection area are determined to be a selected information unit set; (3) the information units of the password code are compared with the selected information unit set, and when the selected information unit set comprises an information unit of a preset code, it is determined that a user selects the correct information unit in the preset code. The code verifying design achieved in the method integrates fuzzification of plaintext expression with feasibility of user operations and has the advantages of being safe and reliable.

Description

technical field [0001] The invention relates to an electronic safety protection technology, in particular to a method for fuzzing and verifying passwords and a password verification device for executing the method. Background technique [0002] With the continuous improvement of people's living standards and security awareness, password verification devices and corresponding verification methods are widely used in various fields of life. In a typical situation, at least one mobile terminal such as a mobile phone and a tablet computer is currently available, namely There are a large number of applications of verification methods, which are actually the specific realization of verification devices. In a mobile terminal, a display screen based on touch feedback is usually provided, and the easiest way is for example the well-known slide unlock, face unlock, nine-grid draw line unlock, and the like. All these methods have inherent deficiencies. Among them, sliding unlocking is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34
CPCG06F21/36G06F21/46G06F21/34
Inventor 郑犁
Owner SMART ELECTRONICS IND DONG GUAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products