Hiding method and system for Web security login password

A technology for login password and secure login, applied in transmission systems, electrical components, etc., can solve problems such as occupying computers, and achieve the effects of low learning cost, network security, and easy operation.

Active Publication Date: 2021-01-22
中孚安全技术有限公司 +3
View PDF20 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this mechanism is convenient for users to use, for some security systems, if the user chooses to remember the password, when the user leaves the computer, only a few simple steps are required to view the plaintext password. Undoubtedly, your system password will be exposed, and if the computer is illegally occupied by an illegal user, it is very convenient to steal the password.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hiding method and system for Web security login password
  • Hiding method and system for Web security login password
  • Hiding method and system for Web security login password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Such as figure 1 A method for hiding a Web security login password shown includes the following steps:

[0048] S1: Determine the positions of the input boxes of the user name and the password on the login page of the preset browser.

[0049] S2: Add a virtual component to the login interface according to the type of the preset browser and the positions of the input boxes of the user name and password.

[0050] S3: Scan the cursor position on the current page. When the cursor is focused on the input box of the user name and password, set the input box of the user name and password to the input state; when the cursor disappears, set the input box of the user name and password to disabled state.

[0051] S4: When the user finishes inputting the user name and login password and the input boxes of the user name and password are disabled, the virtual component activates a preset hiding mechanism to make the preset browser record the preset virtual password as the login pas...

Embodiment 2

[0054] Based on Embodiment 1, this embodiment provides a method for hiding a Web security login password. The browser used in this method is a class A browser, that is, IE browser, Firefox browser, or a browser with the same architecture. Such as figure 2 As shown, it specifically includes the following steps:

[0055] S11: Determine the positions of the input boxes of the user name and the password on the login page of the type A browser.

[0056] S12: Add a virtual username input box and a first virtual password input box above the username and password input boxes, and add a second virtual password input box below the username and password input boxes.

[0057] S13: Write a random user name in the virtual user name input box as the virtual user name, and write a random password in the first virtual password input box and the second virtual password input box as the virtual password.

[0058] S14: Scan the cursor position on the current page, when the cursor is focused on t...

Embodiment 3

[0064] Based on embodiment one, present embodiment provides a kind of hiding method of Web security login password, and the browser that this method adopts is B class browser, i.e. I Google browser, or the browser identical with its structure. Such as image 3 As shown, it specifically includes the following steps:

[0065] S21: Determine the positions of the input boxes of the user name and the password on the login page of the type B browser.

[0066] S22: Add a virtual button in the input box of the user name and password.

[0067] S23: Scan the cursor position on the current page, when the cursor is focused on the input box of the user name and password, set the input box of the user name and password to the input state; when the cursor disappears, set the input box of the user name and password to disabled state.

[0068] S24: When the user completes the input of the user name and login password and the input boxes of the user name and password are disabled, the login ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to the hiding method and system for the Web security login password, on the basis that browser design is not damaged, password hiding is achieved, virtual passwords and hidden real passwordscan be exposed for projects with high requirements for security and secrecy levels through the hiding method and system, the learning cost is low, operation is easy, and a guarantee is provided for security of the passwords.

Description

technical field [0001] The invention relates to the technical field of network security, and more specifically relates to a method and system for hiding a Web security login password. Background technique [0002] With the development of network technology, the Internet has penetrated into the minds of the majority of network users, deeply affecting the life, work and leisure of the majority of network users. Generally, if a network user wants to access a web page of a certain website, he needs to log in to the server of the website first. [0003] When we visit some websites, after the login is successful, there will usually be a prompt whether to remember the password. If you choose to remember the password, you can log in directly according to the record without re-entering next time. Although this mechanism is convenient for users to use, for some confidential systems, if the user chooses to remember the password, when the user leaves the computer, only a few simple ste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0421H04L63/10H04L63/083H04L67/02
Inventor 闫艳郝长征
Owner 中孚安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products