Password dynamic enciphering inputmethod of public emipering mode

A dynamic encryption and input method technology, which is applied to the usage of multiple keys/algorithms, user identity/authority verification, etc., can solve problems such as poor practicability, inability to modify passwords, and inability to guarantee system user identification, etc.

Inactive Publication Date: 2005-03-23
常志文
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is, the dynamic password is a function of a fixed code and time (that is, a fixed algorithm), otherwise the system cannot guarantee the identification of the user. Once this function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password dynamic enciphering inputmethod of public emipering mode
  • Password dynamic enciphering inputmethod of public emipering mode
  • Password dynamic enciphering inputmethod of public emipering mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In the original system, the password is to directly input the real password, and the corresponding program method of the present invention can replace the interface and the module corresponding to the password input, and other parts can be unchanged, and can be run after compiling.

[0064] After the user enters the operation interface by swiping the card or in other ways, first enter such as figure 1 As shown in the selection interface 101-1, the user is required to select the level of difficulty, and the level uses three random numbers in the 10 numbers from 0 to 9 to represent three levels of the encryption security level respectively. The user must select a certain level. One level, if not selected, it can automatically enter the default encryption security level, such as primary, in a few seconds (such as three seconds).

[0065] When the user selects the primary or default security level as the encryption security standard, the user's input method is consistent with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An electronic random numeral generator generates three ciphered safe levels and a random unpredictable dynamic key to be input to the real password, a user selects primary, middle and high three different levels selected by user, an input unit transmits the request information to CPU which generates dynamic key according to the levels and ciphers all numerals and symbols used in the password to be displayed to the user together with the ciphered numerals and symbols in light of this key and their relationship, the user transmits the ciphered real password to the CPU by the input unit to be deciphered and sent out by an output unit. If the password is right, it is allowed to access, if not, it is refused, the memory unit is used for storing real password and corrected real password.

Description

technical field [0001] The invention relates to a password dynamic encryption input method in a public encryption mode, in particular to a method in which an electronic random number generator dynamically generates three encryption security levels and a random unpredictable dynamic key, and then dynamically encrypts the password before inputting it. Background technique [0002] Password, also known as password, is the most widely used method to verify the legality of user identity. Authorized users have an identification ID (user name, account number, or even a magnetic card) that is different from other users in the system and a secret password (PW or PIN) that only they know. If the user wants to log in to the system, he must enter his private information (such as user name, password, etc.), and the system will judge its legitimacy and implement access control. And the input of this kind of private information is open, even also can be monitored by the hacker on the Inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/16H04L9/32
Inventor 常志文
Owner 常志文
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products