System and method for generating a disguised password based on a real password
First Claim
1. A system for generating a disguised password, the system comprising:
- a password disguising unit stored in a storage device; and
at least one computer processor that executes the password disguising unit, the password disguising unit comprising;
a key value encrypting module that presets a real password received from an input device, selects one or more characters from the real password as a verification code, and generates an encryption code corresponding to the verification code according to an encryption algorithm;
a verification code identifying module that generates a character string including the encryption code when the real password is input from the input device, displays a verification box on a display screen to receive an input key from the input device, and determines whether the input key matches the encryption code of the character string; and
a disguised password generating module that generates a disguised password by replacing the verification code with the encryption code in the real password if the input key matches the encryption code of the character string, wherein the disguised password comprises unselected characters of the real password and the encryption code.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for generating a disguised password are provided. The method presets a real password via an input device, selects one or more characters from the real password as a verification code. The method further generates an encryption code corresponding to the verification code according to an encryption algorithm, generates a character string based on the encryption code, and displays a verification box on a display screen to receive an input key from the input device. In addition, the method determines whether the input key matches the encryption code of the character string, and generates a disguised password by replacing the verification code with the encryption code in the real password if the input key matches the encryption code of the character string.
19 Citations
13 Claims
-
1. A system for generating a disguised password, the system comprising:
-
a password disguising unit stored in a storage device; and at least one computer processor that executes the password disguising unit, the password disguising unit comprising; a key value encrypting module that presets a real password received from an input device, selects one or more characters from the real password as a verification code, and generates an encryption code corresponding to the verification code according to an encryption algorithm; a verification code identifying module that generates a character string including the encryption code when the real password is input from the input device, displays a verification box on a display screen to receive an input key from the input device, and determines whether the input key matches the encryption code of the character string; and a disguised password generating module that generates a disguised password by replacing the verification code with the encryption code in the real password if the input key matches the encryption code of the character string, wherein the disguised password comprises unselected characters of the real password and the encryption code. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for generating a disguised password, the method comprising:
-
presetting a real password received from an input device; selecting one or more characters from the real password as a verification code; setting an encryption code corresponding to the verification code according to an encryption algorithm; generating a character string including the encryption code when the real password is input from the input device; displaying a verification box on a display screen to receive an input key from the input device; determining whether the input key matches the encryption code of the character string; and generating a disguised password by replacing the verification code with the encryption code in the real password if the input key matches the encryption code of the character string, wherein the disguised password comprises unselected characters of the real password and the encryption code. - View Dependent Claims (7, 8, 9)
-
-
10. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed by a processor of a computing device, cause the computing device to perform a method for generating a disguised password, the method comprising:
-
presetting a real password received from an input device; selecting one or more characters from the real password as a verification code; setting an encryption code corresponding to the verification code according to an encryption algorithm; generating a character string including the encryption code; displaying a verification box on a display screen to receive an input key from the input device; determining whether the input key matches the encryption code of the character string; and generating a disguised password by replacing the verification code with the encryption code in the real password if the input key matches the encryption code of the character string, wherein the disguised password comprises unselected characters of the real password and the encryption code. - View Dependent Claims (11, 12, 13)
-
Specification