Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-theft method based on dynamic construction of virtual password

An anti-theft method and password technology, applied to instruments, time registers, individual input port/output port registers, etc., can solve problems such as hacking, achieve improved security, and achieve discontinuous effects

Inactive Publication Date: 2021-03-16
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of scheme usually makes the real password have continuity in the input process. Since the real password is continuous, it is very easy to be broken by other people.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-theft method based on dynamic construction of virtual password
  • Anti-theft method based on dynamic construction of virtual password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Please refer to figure 1 , figure 1 It is a schematic flow chart of an anti-theft method based on dynamically constructing a dummy password according to Embodiment 1 of the present invention, and the method includes the following steps:

[0032] In step S11, after the terminal system is turned on, the user is prompted to input a password.

[0033] Step S12, the terminal system randomly generates a dummy index code according to the length of the original password.

[0034] The dummy position of the dummy index code can be in any position of the real password number, and the dummy index code can be expressed in formats such as 1X2XX3456, 123XX4X56X, and X12345X6, where X is the dummy position, and 1 to 6 are the real password positions.

[0035] As a preference, wildcards are used for the phantom position to agree that the phantom is any character, and the wildcard is not limited to X, and legal users can obtain the wildcard from the relevant description information; he...

Embodiment 2

[0048] Please refer to figure 2 , figure 2 It is a schematic flow chart of the anti-theft method based on dynamically constructing a virtual password in Embodiment 2 of the present invention. The method is implemented in an intelligent door lock system, as follows:

[0049] Step S21, when the user activates the smart door lock to unlock, the smart door lock system calculates the virtual index code;

[0050] Step S22, the smart door lock system prompts the virtual position guide code information on the screen, and instructs the user to input the virtual position password and the real password according to the virtual position guide code information;

[0051] Step S23, the user inputs a virtual password and a real password;

[0052] Step S24, the smart door lock system verifies the dummy password, if the dummy password verification fails, increase the complexity of the dummy password, recalculate the dummy password, and prompt the user to input the password again;

[0053] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of password keyboard password input, and particularly relates to an anti-theft method based on dynamic construction of a virtual password. The anti-theft method comprises the steps that after a terminal system is started, a user is prompted to input a password; the terminal system randomly generates a virtual guide code according to the length of the original password, wherein the virtual position of the virtual guide code is selected at any position of the real password number; the terminal system indicates the virtual guide code to the user; the user inputs a virtual password and a real password which meet the requirements by referring to the indication of the virtual guide code; the terminal system verifies the virtual password according to the virtual guide code; and after the terminal system verifies the virtual password, the input real password is extracted, and verification is conducted. According to the invention, the user is guidedto carry out the virtual password operation through the dynamically generated virtual guide code, so that the discontinuity of the real password is realized, and the security of the password is improved.

Description

technical field [0001] The invention belongs to the technical field of password keyboard password input, in particular to an anti-theft method based on dynamically constructing a dummy password. Background technique [0002] In view of the fact that when the user enters the password in the long-term fixed device, it is easy to form certain traces, and it is very easy to be cracked by other personnel, so a dummy password is proposed. For example, when the user enters a fixed password on the fingerprint door lock for a long time, there will be corresponding traces on the fixed position of the fingerprint lock keyboard, which is easy to be cracked. In order to solve this problem, a dummy password is formed. By interspersing certain interference input at different positions of the password, the uniformity of the input keyboard is increased, and other personnel are prevented from deciphering the password used by the user through the degree of use or wear of the keyboard. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/00309G07C2009/0042G07C2009/00531
Inventor 郭卫斌谭帅牛国富马骥王平雷宇龙
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products