A password traversal method based on keyboard rules
A technology of traversal algorithms and rules, which is applied in the field of password encryption and decryption, and can solve problems such as the inability to use the keyboard to arrange the order, and the inability to complete the traversal of passwords
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] As a specific embodiment, in order to achieve the above object, the technical solution adopted by the present invention is a password traversal method based on keyboard rules, including the following steps:
[0030] Step 1: Obtain the characters on the keyboard and establish a password set according to the keyboard character rules. The password set includes the first traversal character table and the second traversal character table, as shown below, Table 1 is the first traversal character table, and Table 2 is The second traverses the character table,
[0031] `
1
2
3
4
5
6
7
8
9
0
-
=
q
w
e
r
t
y
u
i
o
p
[
]
a
s
d
f
g
h
j
k
l
;
‘
\
z
x
c
v
b
n
m
,
.
/
[0032] Table 1 All characters without pressing the Shift key
[0033] ~
!
@
#
$
%
^
&
*
(
)
_
...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


