Password management method, system and intelligent terminal

A password management and intelligent terminal technology, applied in the field of data security, can solve the problems of password leakage, poor confidentiality, poor convenience, etc., and achieve the effect of correcting the mapping relationship and improving the password management method

Active Publication Date: 2019-10-18
THUNDER SOFTWARE TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing password management software generally exists in the form of a password box, because in different situations, users will set different passwords, and too many passwords make it inconvenient for users to remember, often forget passwords, and inconvenient, in order to prevent users from forgetting The password is stored through the password management software, which is convenient for users to view
However, this method is equivalent to storing the password in the medium. In addition, the lockbox also requires the user to set the password, which is extremely inconvenient. If the user forgets the password of the lockbox, it will take time to retrieve the password, and if the password of the lockbox is leaked , the password stored by the user is in danger of being leaked, and most of the existing password management applications have the function of auto-filling. When the user opens the application that has been used, the password will be automatically filled, which saves the user the trouble of entering the password. However, although this function is convenient for users, when the user's mobile phone is lost, the saved password will face a huge risk of leakage
[0003] To sum up, the existing password management methods have poor confidentiality, poor security performance, and poor convenience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password management method, system and intelligent terminal
  • Password management method, system and intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] figure 1 Shown is the flow chart of the password management method of the present invention, which is applied to a smart terminal, and the smart terminal has a password-protected application, and the application has a predetermined password, which is characterized in that it includes the following steps:

[0032] Establishing a password database, at least one password data is stored in the password database, each of the applications corresponds to one password data, forming a corresponding mapping relationship;

[0033] Receiving a password input, if the password input information is different from the predetermined password of the password protection application, storing the password input information, and receiving the password input again;

[0034] When at least two consecutive input errors are detected, the stored password input information is compared with the password data, and if each of the stored password input information corresponds to a password data, a prom...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password management method. The password management method comprises the following steps of establishing a password database, wherein at least one piece of password data is stored in the password database, each application corresponds to one of the password data to form a corresponding mapping relationship; receiving password input, when password input information is different from a preset password of a password protection application, storing the password input information, and receiving the password input again; when at least two times of continuous false inputting are detected, comparing the stored password input information and the password data; when each stored password input information corresponds to one piece of password data, sending prompting information. The password management method has the advantages that the mapping relationship of the password and the corresponding application is pre-stored; when the password is falsely input for multiple times, the false inputting of a user is judged according to the input false password by the user; when the user falsely inputs the password, a correct password prompt is provided for the user, so as to facilitate the user to correctly input.

Description

technical field [0001] The present invention relates to the field of data security, in particular to a password management method, system and intelligent terminal. Background technique [0002] Existing password management software generally exists in the form of a password box, because in different situations, users will set different passwords, and too many passwords make it inconvenient for users to remember, often forget passwords, and inconvenient, in order to prevent users from forgetting The password is stored through the password management software, which is convenient for users to view. However, this method is equivalent to storing the password in the medium. In addition, the lockbox also requires the user to set the password, which is extremely inconvenient. If the user forgets the password of the lockbox, it will take time to retrieve the password, and if the password of the lockbox is leaked , the password stored by the user is in danger of being leaked, and mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
Inventor 张永鑫
Owner THUNDER SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products