Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Towed authentication device

An authentication device and drag-and-drop technology, applied in digital data authentication, computer security devices, instruments, etc., can solve the problems of password financial loss, inconvenient use of virtual keyboard, inability to resist skimming attacks, etc., and achieve the effect of improving security

Inactive Publication Date: 2012-03-21
杨丰源
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The known traditional user login system has several basic requirements, that is, the user must have and know his account number and password, and the login process must be completed in a safe environment; the traditional login method is to use the keyboard to enter the password to log in (including Enter PIN), or use the virtual keyboard generated on the screen (including network ATM virtual number keys and touch screen), use touch or mouse to log in, but these keyboard typing methods cannot resist skimming Attack, that is, when an attacker (a person who intends to steal the account password) implants a monitoring program or installs a camera to record on the user end (including ATM or personal computer), the user's password is completely unprotected Snooped by attackers, these leaked passwords often result in financial damage
[0004] Also, the current trend is towards touch screens (such as mobile phones, PDAs, computer screens, etc.), some of which have smaller screens and are inconvenient to use virtual keyboards; Allows users to log in more securely even when exposed to insecure environments, and replaces drag and drop without using a virtual keyboard

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Towed authentication device
  • Towed authentication device
  • Towed authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Please refer to Figures 1, 2, 3-1, 3-2, 4-1, 4-2 and Figures 5-1 to 5-6, which are respectively the three-dimensional schematic diagram of the present invention and the basic structure diagram of the present invention , A schematic diagram of the digital password setting of the present invention, a schematic diagram of the pattern password setting of the present invention, and a schematic diagram of the authentication state of the present invention. As shown in the figure: the present invention is a tow-type authentication device, which at least includes an electronic device 1, a setting mechanism 2 and a certification mechanism 3.

[0038] The aforementioned electronic device 1 includes a processing unit 11, and a display unit 12, an operating unit 13 and a power unit 14 respectively connected to the processing unit 11. The electronic device 1 further includes a housing 15 and the processing unit 11. The display unit 12, the operating unit 13 and the power unit 14 are com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a towed authentication device which comprises an electronic apparatus, a setting mechanism and an authentication mechanism, wherein the electronic apparatus comprises a processing unit, a display unit, an operating unit and an electric power unit; the setting mechanism is connected with the processing unit, and comprises a first password selecting unit and a second password selecting unit for selecting related characters and patterns; and the authentication mechanism is connected with the processing unit, and comprises a plurality of alternatively displayed first password authentication parts and second password authentication parts, wherein each first password authentication part defines a polygonal region according to the password set in the first password selecting unit, and enables the polygonal region to be matched with each second password authentication part for authentication in a towed manner. Thus, the security of a user while logging in can be improved really, and logging attack and dictionary attack can be withstood effectively, thereby achieving the effects of reducing the risk that the password is stolen, and increasing the reliability.

Description

Technical field [0001] The invention relates to an authentication device, in particular to a drag type authentication device. Background technique [0002] At present, the security of authentication login is becoming more and more important. For example, ATM and online banking use PIN number to log in, and use traditional account passwords when logging in to various operating systems, and select the login system with pictures that appear today, or use writing or writing on the touch screen. Log in by drawing a picture. [0003] The known traditional user login system has several basic requirements, that is, the user must have and know his account and password, and the login process must be completed in a secure environment; the traditional login method is to use the keyboard to enter the password to log in (including Enter PIN), or use the virtual keyboard (including network ATM virtual number keys and touch screen) generated on the screen to log in by touch or mouse click, but th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/44
Inventor 杨丰源
Owner 杨丰源
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products