Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Non-current terminal password input method

A password input and terminal technology, which is applied in the field of password input methods, can solve the problems that deposit co-owners cannot supervise and manage funds, cannot provide real-time monitoring means, and cannot provide efficient real-time monitoring means, etc.

Pending Publication Date: 2018-07-24
黄策
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 3) The business that needs to be monitored by others cannot provide an efficient real-time monitoring method
Due to the inability to provide an effective real-time monitoring method, the theft cases in which the cashier guards himself and the fraud cases in which the chairman of the board of directors entrusts remittances emerge in endlessly
[0007] 4) Among the bank deposits, a considerable part is the deposit jointly owned by the account holder and others, such as the deposit jointly owned by the husband and wife as stipulated by the national law; the deposit jointly owned by the account holder and others, and these deposits are the current bank deposits. As far as the management regulations are concerned, it only belongs to the account holder, and the actual co-owner of the deposit cannot implement effective supervision and management of the fund

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-current terminal password input method
  • Non-current terminal password input method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The content of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments of the description:

[0023] figure 1 It is a schematic diagram of an existing password input method. No matter what the application is, the process is to submit a task request on this terminal and enter the confirmation password. For the use environment exposed to the Internet where hacking viruses are flying everywhere and various phishing websites are hard to guard against, this password input method has great security risks.

[0024] figure 2 It is a schematic diagram of the password input method of the present invention.

[0025] The technical solution of the present invention is as follows: the confirmation password input of the submitted task needs to be completed on at least one different terminal. The program has the following basic input methods:

[0026] Input

This terminal

different terminal 1

differ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a brand-new password input method. The method is technically characterized in that a conventional single terminal password input mode for submitting a task and inputting a confirmation password in a same terminal is subversively changed to a mode for submitting the task in one terminal (hereinafter referred to as a current terminal) and inputting the confirmation password needed to be input in at least one non-current terminal (hereinafter referred to as other terminals). The method has the advantages that 1) a business confirmation password can be fully protected for effectively preventing attack of password stealing viruses and phishing sites; and 2) an efficient and low-cost cross-time-space real-time supervision management method is provided for business handling needed to be supervised by multiple persons.

Description

technical field [0001] The invention relates to a password input method under Internet application. Background technique [0002] Today the Internet has been deeply integrated into every aspect of people's daily life. Internet-based applications, no matter what their application objects or application scenarios are, are inseparable from two basic operations, task submission and password confirmation input, and these two basic operations are currently completed on one terminal. [0003] The current password input method for business confirmation has the following drawbacks: [0004] 1) Viruses for the purpose of stealing business confirmation passwords are flying all over the sky, and confirmation passwords are in danger all the time. [0005] 2) Phishing websites are rampant, and netizens will be tricked if they are not careful. [0006] 3) Businesses that need to be monitored by others cannot provide an efficient real-time monitoring method. This is typical for corporat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/56G07F19/00H04L29/06
CPCG06F21/45G06F21/566G07F19/211H04L63/1441H04L63/1483
Inventor 黄策
Owner 黄策
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products