SYSTEM AND METHOD FOR GENERATING A DISGUISED PASSWORD BASED ON A REAL PASSWORD
First Claim
1. A system for generating a disguised password, the system comprising:
- a password disguising unit stored in a storage device; and
at least one processor operable to execute the password disguising unit, the password disguising unit comprising;
a key value encrypting module operable to preset a real password received from an input device, select one or more characters from the real password as a verification code, and generate an encryption code corresponding to the verification code according to an encryption algorithm;
a verification code identifying module operable to generate a character string based on the encryption code when the real password is input from the input device, display a verification box on a display screen to receive an input key from the input device, and determine whether the input key matches the encryption code of the character string; and
a disguised password generating module operable to generate a disguised password by replacing the verification code with the encryption code in the real password if the input key matches the encryption code of the character string.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for generating a disguised password are provided. The method presets a real password via an input device, selects one or more characters from the real password as a verification code. The method further generates an encryption code corresponding to the verification code according to an encryption algorithm, generates a character string based on the encryption code, and displays a verification box on a display screen to receive an input key from the input device. In addition, the method determines whether the input key matches the encryption code of the character string, and generates a disguised password by replacing the verification code with the encryption code in the real password if the input key matches the encryption code of the character string.
37 Citations
13 Claims
-
1. A system for generating a disguised password, the system comprising:
-
a password disguising unit stored in a storage device; and at least one processor operable to execute the password disguising unit, the password disguising unit comprising; a key value encrypting module operable to preset a real password received from an input device, select one or more characters from the real password as a verification code, and generate an encryption code corresponding to the verification code according to an encryption algorithm; a verification code identifying module operable to generate a character string based on the encryption code when the real password is input from the input device, display a verification box on a display screen to receive an input key from the input device, and determine whether the input key matches the encryption code of the character string; and a disguised password generating module operable to generate a disguised password by replacing the verification code with the encryption code in the real password if the input key matches the encryption code of the character string. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for generating a disguised password, the method comprising:
-
presetting a real password received from an input device; selecting one or more characters from the real password as a verification code; setting an encryption code corresponding to the verification code according to an encryption algorithm; generating a character string based on the encryption code when the real password is input from the input device; displaying a verification box on a display screen to receive an input key from the input device; determining whether the input key matches the encryption code of the character string; and generating a disguised password by replacing the verification code with the encryption code in the real password if the input key matches the encryption code of the character string. - View Dependent Claims (7, 8, 9)
-
-
10. A storage medium having stored thereon instructions that, when executed by a processor of a computing device, cause the computing device to perform a method for generating a disguised password, the method comprising:
-
presetting a real password received from an input device; selecting one or more characters from the real password as a verification code; setting an encryption code corresponding to the verification code according to an encryption algorithm; generating a character string based on the encryption code; displaying a verification box on a display screen to receive an input key from the input device; determining whether the input key matches the encryption code of the character string; and generating a disguised password by replacing the verification code with the encryption code in the real password if the input key matches the encryption code of the character string. - View Dependent Claims (11, 12, 13)
-
Specification