Login information encryption method and device
A login information and password technology, applied in the field of virtual reality, can solve the problems of account and password leakage, not easy to popularize, leak, etc., to achieve the effect of convenient user operation and ensuring the security of account and password
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] In the following description, for purposes of illustration rather than limitation, specific details such as specific system architectures, interfaces, and techniques are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
[0040] figure 1 It is a schematic flowchart of a method for encrypting login information provided by an embodiment of the present invention. Such as figure 1 As shown, the method includes:
[0041] Step 110, when an operation triggering password input or account input is detected, the key characters in the virtual keyboard are arranged in random order.
[0042] When a user needs to input an ac...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com