Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network encryption system based on picture keyboard and operating method thereof

An operation method and encryption system technology, which is applied in the direction of user identity/authority verification, etc., can solve the problems of inability to protect user names, passwords, low efficiency of user names and passwords, and are not generally accepted by people, so as to overcome easy theft and deciphering , reduce the burden, improve the effect of safety

Inactive Publication Date: 2006-08-30
刘大扬
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the efficiency of using the mouse to input user names and passwords is too low, this method is not generally accepted by people, and it is also impossible to protect user names and passwords during transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network encryption system based on picture keyboard and operating method thereof
  • Network encryption system based on picture keyboard and operating method thereof
  • Network encryption system based on picture keyboard and operating method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The network encryption system based on the picture keyboard of the present invention, in terms of physical structure, includes a network interconnected server and a client terminal, and the client terminal is at least provided with a display, a keyboard, a central processing unit, and a memory module. Usually, the system of the present invention can be realized based on the existing Internet, and the client terminal is a personal computer. The processor of the client terminal is a central processing module that can execute registration and login procedures. Its function is to send a request for registration or login page to the server through the network, display the registration or login page on the monitor, and convert the registration or login page to the server. The verification information is sent to the server; and the above-mentioned registration or login page requires the user to input registration or login verification information including user name and passwor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a system for realizing ciphered register or log of customer ends in the way of identity verification and a method, in which, the operation method includes: a customer end applies for register or log, a server responds it and generates a contrast list of each key character and an input code randomly and generates a contrast list of a soft keyboard or picture format then to send the picture, the register or log-on pages to the customer end, which displays it, a user logs on the register or the log verification information based on the keyboard picture or that of the contrast list to be transmitted to the server to check it in terms of the list.

Description

technical field [0001] The invention relates to a network system including interconnection of a server end and a client end, more specifically, relates to a system for realizing encrypted registration or login of a client end by an identity verification method, and a method for realizing identity encryption and verification in the system. Background technique [0002] A well-known authentication method in the field of software, especially network security, is the method of logging in using a user name and password. The one-to-one username / password storage and recall mechanism currently adopted by people. However, due to reasons such as too short passwords and weak anti-deciphering properties, user names and passwords are often stolen or deciphered by computers during online transmission. For example, if the password used is too short (simple numbers or letters with less than 8 digits), the computer can usually try out the correct user name and password in a short time by us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 刘大扬
Owner 刘大扬
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products