User password soft safety protection method based on behavior identification

A user password and security protection technology, which is applied in the field of user password soft security protection mechanism based on behavior recognition, can solve problems such as personal information leakage, property loss, loss, etc., achieve good application prospects and improve the effect of protection

Active Publication Date: 2017-03-15
NANJING UNIV OF INFORMATION SCI & TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the device is lost, personal information is likely to be leaked, causing security risks of property loss or loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User password soft safety protection method based on behavior identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings. figure 1 It is a flowchart of the present invention.

[0014] A. User's preset:

[0015] Step (1). The user sets the trigger button, or it can be set as a custom password string, which is set according to personal habits. The setting of the password is similar to the setting of the general password, for example, it can be "#", "123abc" and so on.

[0016] Step (2). The user sets the personal soft keyboard. The setting content includes the information of each key, among which Chinese characters, numbers, English and some common symbols can be set as key information, and the personal soft keyboard is customized.

[0017] Step (3). The user sets a specific return button on the soft keyboard. Wherein, the specific return key is generally a specific key, and it is not recommended to have multiple keys simultaneously serving as the specific retur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user password soft safety protection method based on behavior identification. A soft safety mechanism is added based on the prior art and provides triple protections including keyboard protection, personal keyboard password protection and password input time delay protection. The password seeking difficulty is increased by the optionality of a trigger keyboard and personal customization of a soft keyboard. The password combination diversity is increased for password protection of the personal soft keyboard by adopting a user-customized setting mode, and password input time delay is judged for password input time delay protection according to a password input time delay threshold value set by a user. The method has the very good utilization value on the aspect of personal information protection.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a user password soft security protection mechanism based on behavior identification. Background technique [0002] Since information technology and network technology have been widely used, people's awareness of personal information protection has gradually strengthened, and password identification technology has also emerged as the times require. Electronic devices identify owners and non-owners through simple and specific digital passwords, thereby protecting the owner's personal information. However, simple digital passwords are relatively easy to be cracked. Therefore, users often protect personal information by setting lengthy passwords or multiple passwords. memory. Therefore, the research on cryptography needs to be carried out continuously, and the form and content of cryptography are also continuously expanded. Researchers protect personal inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/316
Inventor 钟水明陆晓翔鞠兴旺杨萍严璐绮李雪李萌杨欣妍
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products