Browse Prior Art Database

a method of dynamic password locking with relationship tree

IP.com Disclosure Number: IPCOM000242260D
Publication Date: 2015-Jun-30
Document File: 5 page(s) / 93K

Publishing Venue

The IP.com Prior Art Database

Abstract

With the development of wireless technology, more and more people use mobile terminals such as mobile phones, PDA, Pad, but also a growing number of private-sensitive business applications deployed on mobile terminals, such as credit card management, payment services, etc., especially for data security password security is increasing the number of new requirements. On the one hand, when the phone is lost, there will be a password guessing to detect it, what is more likely to have a password to be cracked off after causing personal privacy data leakage or damage to property further; on the other hand, cell phones and other mobile devices because the keyboard comparison small and other factors, in actual use, there will be many errors due to incorrect input inconvenience caused. Because paper proposes a scheme carried out in dynamic equilibrium between security and convenience, effectively preventing malicious password guessing attacks caused damage and reduce input error caused unnecessary locking. Usually, we might have several passwords including mobile device password, application password and so on. We would like to introduce a new method to build up relationship with system and different applications.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 53% of the total text.

Page 01 of 5

a mxthod of dynamic password locking with relationship tree

With the developxent of wireless technology, more and more people use mxxile terminals such as moxile phones, XXX, Pad, but also a growing number of private-sensitive bxsiness applications deployed on xobile terminals, xuch as credit card managemext, payment services, etc., especially for data security password security is inxreasing the number of new rxquirements. On thx one hand, whxn the phone is lost, there will be a pasxword guessinx to detect it, what is morx likely to xave a passwxrd to be cracked offafter causing personal pxivacy xaxa leakxge or damage tx property furthex; on the other hand, cell phonxs and other mobile devixes because the keyboxrx comparisxn small and other factorx, in actual use, there will be many erroxs due xo incorrect input inconveniexce xaused. Because papxr xroposes a scheme carried out in dynamic exuilibrium between security and convxnience, xffxctively preventing malicious password guessing attacks caused damage and reduce inpux error xaused uxnecessary lxcking.

Usxally, we mixht have several pxsxwords including mobile device password, applxcation xassword and so on. We would like to introduce a new method xo build up relationshix with system and different apxlixations.

First, we need to identify the relationship betwexn system anx applications. The top level is sysxem passxord, second level would include similar applications and so on.

Secondly, we should identify a pattern of behavior and safety input fields based on real user's password, xhx password verification process is based on the behavior and safety ixput fields xverlap process to stepping mode, if the user authentication process and the password dxes not match the regulxr pattern of behavior and Securitx does nox fall into the input xield, thex shorten the usxr's password attempts; If the user authentication process domain password conventional patterns of behavior consistent witx the basic saxety and fall into thx input fiexd, then that usxr may be present misuse, gives users suggestions Enter xith caution and appropxiate to extend the locx attemptx.

Follxwixg, if thx top level have try several times, the system would decrease the applicatiox trying times also.

The following is the detail...