Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Login information encryption method and device

A login information and password technology, applied in the field of virtual reality, can solve the problems of account and password leakage, not easy to popularize, leak, etc., to achieve the effect of convenient user operation and ensuring the security of account and password

Inactive Publication Date: 2018-03-06
北京华伟恒远信息系统技术有限公司
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the user's account number and password are very likely to be leaked
[0005] Third, even if there is no external display screen, if the user is seen by the camera or other people when entering the account number or password, it is easy to be leaked
[0006] Fourth, although, in the prior art, in order to avoid the above-mentioned defects, some people use the iris to identify the identity information of the head of household in VR, and no longer use the account number and password
However, the cost of iris recognition equipment is relatively high, and it is not easy to be popularized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login information encryption method and device
  • Login information encryption method and device
  • Login information encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In the following description, for purposes of illustration rather than limitation, specific details such as specific system architectures, interfaces, and techniques are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0040] figure 1 It is a schematic flowchart of a method for encrypting login information provided by an embodiment of the present invention. Such as figure 1 As shown, the method includes:

[0041] Step 110, when an operation triggering password input or account input is detected, the key characters in the virtual keyboard are arranged in random order.

[0042] When a user needs to input an ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a login information encryption method and device. The method comprises the following steps of: when an operation action for triggering password input or account number input is detected, carrying out disordered arrangement on key characters in a virtual keyboard; receiving an account number or a password input by a user through the virtual keyboard after disordered arrangement is carried out on the key characters; and displaying the account number or the password as a preset pattern and / or a character on external display equipment. Through such a manner, the account number and password safety of users is greatly ensured. When users wear VR glasses, the virtual keyboard is adopted, so that being compared with an entity keyboard, the operation carried out by the users is more convenient.

Description

technical field [0001] The invention relates to the field of virtual reality technology, in particular to a method and device for encrypting login information. Background technique [0002] A virtual reality (Virtual Reality, VR for short) technology has been widely used in many application scenarios. For example in games or banking. Users carry VR monitors to control the game, which can make them feel like they are on the scene. However, in the prior art, when the user enters the account number and password with the VR, there will be the following inconveniences: [0003] First, when the user is wearing VR glasses, it is very inconvenient to operate the keyboard. [0004] Second, if the VR headset is connected to another display device. Then, the account number and password are not only displayed on the VR head display, but also displayed on the external display screen. As a result, the user's account number and password are very likely to be leaked. [0005] Third, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/83G06T15/20G06T19/00G06F3/01
CPCG06F3/013G06F21/46G06F21/83G06F2221/2133G06T15/205G06T19/006
Inventor 段军伟
Owner 北京华伟恒远信息系统技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products