Supercharge Your Innovation With Domain-Expert AI Agents!

Password generation method and user terminals

A user terminal and password technology, applied in the field of communication, can solve problems such as security risks, and achieve the effect of reducing operation steps and requiring high password settings.

Inactive Publication Date: 2017-12-01
HUAWEI DEVICE CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although it brings some convenience to users, there are potential security risks in this kind of plaintext password storage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password generation method and user terminals
  • Password generation method and user terminals
  • Password generation method and user terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041]The password generation method and user terminal provided by the embodiments of the present invention can be applied to the scene of generating passwords required by various websites or application programs. For example, the password generation device determines the Target service object, and output the second display interface including a plurality of texts to be selected and a text input dialog box, each service object in the plurality of service object...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a password generation method and user terminals. The method includes the following steps: determining a target service object according to a selection instruction input for a first display interface including multiple service objects, and outputting a second display interface including multiple pieces of to-be-selected text and a text input dialog, wherein each of the multiple service objects needs an account and a password for login; asynchronously acquiring password rules of the target service object; determining the to-be-selected text of a target according to a control instruction input for the second display interface; and generating a target password according to the password rules and the to-be-selected text of the target if a password generation instruction is received, and outputting the target password. According to the embodiment of the invention, manually inputting the password rules of the service object by a user is not needed, and operation steps of the user are reduced; and the password generated on the basis of the text selected by the user is not saved in plaintext, and the generated password is enabled to satisfy password setting requirements of the service object and also have higher security.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a password generation method and a user terminal in the technical field of network security. Background technique [0002] In the information age, the explosive development of the Internet has brought people into a new living space and brought great convenience to people. Users can watch news, check information, send emails, and shop online through the Internet. However, due to the Internet's characteristics of high distribution, blurred boundaries, unclear levels, and dynamic evolution, the network environment has become complex. In this environment, the security of users' personal information has become particularly important. [0003] In order to improve the security of personal information in a complex network environment, when using certain websites or applications, users need to enter their account passwords to log in. Looking at the password rules of these w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/46
Inventor 迟雪梅
Owner HUAWEI DEVICE CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More