Security password setting and verification method

A verification method and password technology, applied in the field of password security, to prevent peeping and deciphering, easy to use, and wide range of applications

Active Publication Date: 2019-05-17
广东金融资产交易中心股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although these measures have a certain effect, they have not fundamentally solved the security problem of passwords.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security password setting and verification method
  • Security password setting and verification method
  • Security password setting and verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following examples are further explanations and supplements to the present invention, and do not constitute any limitation to the present invention.

[0023] like Figure 1 ~ Figure 3 As shown, in order to strengthen the security of existing passwords, the present invention provides a new secure password setting and verification method. The password uses interference codes and encryption principles to make the real basic password hidden and difficult to be stolen, thereby greatly enhancing the security of password input.

[0024] Specifically, the secure password setting and verification method of the present invention includes the following steps:

[0025] S1. The basic password is set by the user. The basic password is a character code set by the user for identity confirmation, that is, a real character code that needs to be verified in a conventional sense. The basic password is set by the user according to the password setting principle of the relevant system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safe password setting and verifying mode. The safe password setting and verifying mode is characterized by comprising the following steps: (A) basic passwords are set by a user and are composed of a plurality of orderly character codes; (B) an encryption principle is set, encryption operation is carried out on the basic passwords according to the encryption principle to form verifying passwords including valid character codes capable of being used for verifying the user identity and / or position information of the valid character codes, and encryption input prompts coincident with the encryption principle are given to the user; (C) composition of the input passwords is appointed, wherein the input passwords comprise valid codes needing character code value verifying and / or character code value position verifying and interference codes which are at least one bit in length and are used for hiding the positions of the valid codes; (D) when character code values of the valid codes in the passwords input by the user at present and / or the character code position information are / is coincident with information included by the verifying passwords, it is judged that the current passwords is correctly input by the user, and verification of the passwords is successful. By means of the safe password setting and verifying mode, the password inputting safety can be greatly improved, and the passwords are effectively prevented from being stolen and decoded.

Description

【Technical field】 [0001] The invention relates to the field of password security, in particular to a novel secure password setting and verification method. 【Background technique】 [0002] When people use phone cards, credit cards, bank cards, anti-theft doors and computer equipment in exposed places, they often need to input corresponding personal passwords on the input terminal so as to confirm the legality of the user's identity. However, when people input the password on the input terminal, the password is often easily peeped or deciphered by others. For example, for bank ATM terminals, lawbreakers often install cameras near bank ATM terminals to steal passwords. When users input passwords, lawbreakers can record the passwords entered by users through video screens. Another example is the anti-theft door that is provided with password input in the family, criminals can also steal the password by installing a camera. In addition, for the password of the anti-theft door, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 蒋艾
Owner 广东金融资产交易中心股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products