Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtual password security processing method and system

A technology of password security and processing method, which is applied in the field of virtual password security processing method and system, and can solve problems such as trial and error cracking passwords

Inactive Publication Date: 2019-07-05
广州技象科技有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this implementation method introduces another problem: trial and error to crack the password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual password security processing method and system
  • Virtual password security processing method and system
  • Virtual password security processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Such as figure 1 As shown, a virtual bit password security processing method comprises the following steps:

[0042] S1. Enter the x-digit dummy password;

[0043] S2. Receive the x-digit dummy password;

[0044] S3. Use the valid password of y digits as the substring, and perform character string matching in the received dummy password of x digits. If both the value of the substring and the position in the dummy password are successfully matched, the password authentication is successful and ends. Otherwise, Password authentication failed, end; where, x, y are both positive integers, y<x.

[0045] In the present invention, the position of the correct password string in the dummy password is fixed. Therefore, in the process of password authentication, not only the matching of the string value but also the matching of the position is required. Only when both are successfully matched can the password be authenticated. success. Therefore, in the process of password cra...

Embodiment 2

[0052] Such as figure 2 As shown, a virtual bit password security processing method comprises the following steps:

[0053] S1. Enter the x-digit dummy password;

[0054] S2. Receive the x-digit dummy password;

[0055] S3. Use the valid password of y digits as the substring, and perform character string matching in the received dummy password of x digits. If both the value of the substring and the position in the dummy password are successfully matched, the password authentication is successful and ends. Otherwise, Password authentication failed, end; where, x, y are both positive integers, y<x.

[0056]In the present invention, the position of the correct password string in the dummy password is fixed. Therefore, in the process of password authentication, not only the matching of the string value but also the matching of the position is required. Only when both are successfully matched can the password be authenticated. success. Therefore, in the process of password cra...

Embodiment 3

[0064] Such as image 3 As shown, a virtual bit password security processing system includes:

[0065] The input module is used to input the x-digit dummy password;

[0066] The receiving module is used to receive the x-digit dummy password;

[0067] The matching module is used to use the y-digit valid password as a substring to perform string matching in the received x-digit dummy password. If the value of the substring and the position in the dummy password all match successfully, the password authentication is successful, and the end , otherwise, the password authentication fails and ends; where, x and y are both positive integers, and y

[0068] In this embodiment, the position of the correct password string in the dummy password is fixed. Therefore, in the process of password authentication, not only the matching of the string value, but also the matching of the position is required. Authentication succeeded. Therefore, in the process of password cracking by trial ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual bit password security processing method. The method comprises the following steps: S1, inputting an x-bit virtual bit password; S2, receiving an x-bit virtual password; and S3, taking the y-bit effective password as a substring, carrying out character string matching in the received x-bit virtual password, and if the value of the substring and the position in thevirtual password are successfully matched, indicating that the password authentication is successful and ending, otherwise, indicating that the password authentication is failed and ending. The invention also discloses a virtual password security processing system. In the invention, the position of the correct password character string in the virtual bit password is fixed, so that in the passwordauthentication process, not only the character string value but also the position matching need to be carried out, and the password authentication is successful only if the character string value andthe position matching are successful. Therefore, in the trial and error cracking process of the password, the correct password needs to be found, the position of the correct password in the virtual password needs to be found, and the trial and error cracking difficulty is undoubtedly and greatly increased.

Description

technical field [0001] The invention belongs to the field of password authentication of intelligent locks, and in particular relates to a method and a system for safely processing virtual bit passwords. Background technique [0002] The dummy password is a commonly used function in the combination lock field, and the way to realize it is to hide the correct password in the input password string. The main function is to prevent the user from being peeped during the password input process. The dummy password increases the difficulty of peeping at the memory password because the number of digits of the input password is lengthened. It can effectively prevent the password from being leaked during the input process. [0003] At present, the implementation method of the virtual password of the combination lock product is: the correct password can appear in any position of the string of the input password, for example: the correct password is 1234567. Enter 123412345671234 for t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 马凤鸣
Owner 广州技象科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products