Method of irrugalar password configuration and verification
First Claim
Patent Images
1. A method for configuring irregular password, employed by a user to set a series of password to logon an operation system, comprising the following steps:
- inputting one irregular character set grouped by a series of texts, numbers, symbols or one combination grouped by a series of various characters into a system;
generating a series of password after inputting one irregular character set displaying on screen of a display device;
wherein the series of password includes at least a register code and at least a combination unit to being a series of irregular password which respectively includes at least a character which is a text, a number, or a symbol;
wherein the combination unit comprises one random character;
whereby the operation system verifies an input whether includes the register code and further to verify the input whether is an irregular password.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of irregular password configuration and verification, comprising one irregular character series with a series of texts, numbers or symbols inputted into a system to generate a series of password displaying onscreen of a display device. The series of password comprises at least one register code and at least one random combination unit with a text and a number, or a symbol, wherein the register code is concealed in the random combination unit.
99 Citations
18 Claims
-
1. A method for configuring irregular password, employed by a user to set a series of password to logon an operation system, comprising the following steps:
-
inputting one irregular character set grouped by a series of texts, numbers, symbols or one combination grouped by a series of various characters into a system; generating a series of password after inputting one irregular character set displaying on screen of a display device; wherein the series of password includes at least a register code and at least a combination unit to being a series of irregular password which respectively includes at least a character which is a text, a number, or a symbol; wherein the combination unit comprises one random character;
whereby the operation system verifies an input whether includes the register code and further to verify the input whether is an irregular password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of verifying irregular password, comprising the following steps:
-
(1) Verifying an input with at least one combination unit whether including at least a register code by examination of an operation system, wherein the combination unit comprises at least a random character which is a text, a number, or a symbol; (2) Verifying the register code whether exists within the input;
if the register code exists, the input is authenticated as one series of valid password;
whereas, if the register code does not exist, the input is authenticated as one series of invalid password. - View Dependent Claims (14)
-
-
15. A method of verifying irregular password, comprising the following steps:
-
(1) Verifying an input with at least one combination unit whether including at least one series of register codes by examination of an operation system, wherein the series of register codes comprises at least an initial code and an ending code, and wherein the combination unit comprises at least one random character which either is a text, a number, a symbol or one combination grouped by various characters; (2) Verifying whether the ending code exists within the input if the initial code exists within the input;
whereas, the input is authenticated as an invalid password if the initial code does not exist within the input;(3) Authenticating the input as a series of valid password if the ending code exists within the input by the examination of the operation system;
whereas, the input is authenticated as a series of invalid password if the ending code does not exist within the input. - View Dependent Claims (16, 17, 18)
-
Specification