Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and equipment for identifying passwords

An identification method and password technology, which is applied in the computer field, can solve problems such as password input errors and low confidentiality, and achieve the effect of improving confidentiality, solving low confidentiality, and password settings that are simple but complex

Active Publication Date: 2017-01-11
ALIBABA GRP HLDG LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] One purpose of this application is to provide a password identification method and equipment, which can solve the problems of password input errors and low confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for identifying passwords
  • Method and equipment for identifying passwords
  • Method and equipment for identifying passwords

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The application will be described in further detail below in conjunction with the accompanying drawings.

[0064] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0065] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0066] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and equipment for identifying passwords. The method comprises the following steps of identifying to obtain key codes corresponding to the input of each digit of password, wherein the key codes comprise a first key code or a second key code. The method has the advantages that when all identified digits of password correspond to the preset combination of first key code and / or second key code, the input correctness of the password is judged, so as to solve the problem of false input because multiple press keys corresponding to the key codes are set on the screens, especially smaller screens, the area of each press key is smaller, the user difficultly identifies, and the other press keys are falsely touched; in addition, if the press keys are not set on the screen, the confidentiality of the password is improved, and the problem of low confidentiality of conventional digit and / or aliphatic passwords is solved.

Description

Technical field [0001] The present application relates to the field of computers, and in particular to a password identification method and device. Background technology [0002] Existing password input methods mostly use a selection of letters and / or keys. For small screen devices, due to the small screen area and too many keys for selection displayed on the screen, the user has to input the password. It is necessary to keep an eye on the screen to distinguish numbers or letters and then press the keys corresponding to a smaller area, and it is easy to accidentally touch other keys, causing input errors. In addition, such passwords are easy to describe and tell others, which will cause the problem of password leakage and confidentiality. Sex is not high. Contents of the invention [0003] One purpose of this application is to provide a password identification method and device that can solve the problems of password input errors and low confidentiality. [0004] Accordi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 陈磊
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products