CN101286249A - Anti-riot method utilizing double code for alarming - Google Patents
Anti-riot method utilizing double code for alarming Download PDFInfo
- Publication number
- CN101286249A CN101286249A CNA2007100541962A CN200710054196A CN101286249A CN 101286249 A CN101286249 A CN 101286249A CN A2007100541962 A CNA2007100541962 A CN A2007100541962A CN 200710054196 A CN200710054196 A CN 200710054196A CN 101286249 A CN101286249 A CN 101286249A
- Authority
- CN
- China
- Prior art keywords
- password
- normal
- warning
- police
- illegal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses an anti-riot method adopting double-password for warning. The method includes the steps: the passwords are inputted; two groups of passwords with the same digit but different numbers are stored in a code input part of a credit card or an operation system, wherein, one group of the passwords is the normal use password which is communicated with a password testing system of a databank and the other group is a warning hidden-password which is communicated with both the databank password testing system and a warning system. The invention has the advantages: 1. the safety system can be firstly informed that the password used by criminals is acquired illegally; 2. the hidden-warning function can lead the police to secretly monitor the action of criminals.
Description
Technical field
The present invention relates to a kind of anti-riot method of utilizing the double density sign indicating number to report to the police.
Background technology:
Present cryptographic system comprises bank card, and the password that cryptographic systems such as securities account obtain back door does not have the alert function of internal quotation; Just can directly obtain cash or similar rights and interests as long as obtain associated cryptographic.This also makes some crime one's shares of expenses for a joint undertaking, repeatedly succeeds as kidnapping person, causes unnecessary loss to the holder.Simultaneously can not win the best time again and control the crime one's share of expenses for a joint undertaking.
Summary of the invention
The purpose of this invention is to provide a kind of anti-riot method of utilizing the double density sign indicating number to report to the police.
Technical scheme of the present invention is: this cryptographic system is a double density sign indicating number internal quotation alarm system, just card or password input are except a normal password that uses, a dark password also will be arranged, normal password all is identical figure place with dark password, identical textural association, but they are two complete different passwords, all use normal password during normal the use, system thought that all legal holder is using this password when system accepted this password in any case, in this time, the effect that this normal password is done to play is the same with the effect that the conventional cipher system plays.When saying password under being coerced, legal holden can say dark password, like this, when illegal holder uses this password, security system at first can compare input password and normal password, if it is incorrect, then compare with dark password, if equal dark password, then system can think that this is illegally to access to your password again.Like this, system can report to the police under the illegal unwitting situation of user.But simultaneously, for illegal user, sensory images is normal by the same, also can obtain relevant rights and interests, and the alertness that can benumb illegal user can win more time for police strength on the other hand so on the one hand.
Advantage of the present invention:
1, make security system learn that in the very first time password user obtains by back door.
2, the alert function of internal quotation makes the police to monitor the crime one's share of expenses for a joint undertaking under the unwitting situation of crime one's share of expenses for a joint undertaking.
3, because the crime one's share of expenses for a joint undertaking does not know whether the password that oneself obtains is real password, give a kind of powerful psychology fright effect of crime one's share of expenses for a joint undertaking, effectively prevent the generation of kidnapping case.
Description of drawings
Fig. 1 is an operating process block scheme of the present invention.
Embodiment
A kind of anti-riot method of utilizing the double density sign indicating number to report to the police may further comprise the steps:
(1) password input; In that the password input of credit card or operating system storage bit number is identical but two groups of passwords that password is different, one group is the normal password that uses, another group is warning private mark, the password of normal use docks with the password validation system (prior art) in the database, and warning private mark is docked with password validation system and warning system (prior art) in the database;
(2) operating process; All use normal password during normal the use, when accepting this password, security control recognition system in any case thinks all that legal holder is using this password, in this time, the effect that this normal password is done to play is the same with the effect that the conventional cipher system plays; When being coerced, legal holden can say dark password, at this moment, when illegal holder uses this password, the security control recognition system at first can compare input password and normal password, if it is incorrect, then compare with dark password, if equal dark password, then system can think that this is illegally to access to your password again; Like this, system can report to the police under the illegal unwitting situation of user; But simultaneously, for illegal user, sensory images is normal by the same, also can obtain relevant rights and interests, and the alertness that can benumb illegal user can win more time for police strength on the other hand so on the one hand.
Two identical fields are arranged in the system database, are used for depositing normal password and dark password password checking place system program realization: as shown in Figure 1:
Defining variable C
C=imports password
The normal password then of if C=
Normally pass through
else
The dark password then of if C=
Imitation is normally passed through
It is alert that system carries out internal quotation
end?if
Password (maximum three times) is re-entered in requirement
end?if。
Claims (1)
1, a kind of anti-riot method of utilizing the double density sign indicating number to report to the police may further comprise the steps:
(1) password input; In that the password input of credit card or operating system storage bit number is identical but two groups of passwords that password is different, one group is the normal password that uses, another group is warning private mark, the password of normal use docks with the password validation system in the database, and warning private mark is docked with password validation system and warning system in the database;
(2) operating process; All use normal password during normal the use, when accepting this password, security control recognition system in any case thinks all that legal holder is using this password, in this time, the effect that this normal password is done to play is the same with the effect that the conventional cipher system plays; When being coerced, legal holden can say dark password, at this moment, when illegal holder uses this password, the security control recognition system at first can compare input password and normal password, if it is incorrect, then compare with dark password, if equal dark password, then system can think that this is illegally to access to your password again; Like this, system can report to the police under the illegal unwitting situation of user; But simultaneously, for illegal user, sensory images is normal by the same, also can obtain relevant rights and interests, and the alertness that can benumb illegal user can win more time for police strength on the other hand so on the one hand.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100541962A CN101286249A (en) | 2007-04-09 | 2007-04-09 | Anti-riot method utilizing double code for alarming |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100541962A CN101286249A (en) | 2007-04-09 | 2007-04-09 | Anti-riot method utilizing double code for alarming |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101286249A true CN101286249A (en) | 2008-10-15 |
Family
ID=40058438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007100541962A Pending CN101286249A (en) | 2007-04-09 | 2007-04-09 | Anti-riot method utilizing double code for alarming |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101286249A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102393983A (en) * | 2011-11-03 | 2012-03-28 | 捷德(中国)信息科技有限公司 | Method for supporting alarm PIN (personal identification number), banking terminal, IC (integrated circuit) card and server |
CN105160214A (en) * | 2015-06-19 | 2015-12-16 | 收付宝科技有限公司 | Multi-password electronic signature account protection system and multi-password electronic signature account protection method |
CN106156572A (en) * | 2015-02-24 | 2016-11-23 | 映智科技股份有限公司 | Fingerprint coding method and fingerprint authentication method and system |
-
2007
- 2007-04-09 CN CNA2007100541962A patent/CN101286249A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102393983A (en) * | 2011-11-03 | 2012-03-28 | 捷德(中国)信息科技有限公司 | Method for supporting alarm PIN (personal identification number), banking terminal, IC (integrated circuit) card and server |
CN106156572A (en) * | 2015-02-24 | 2016-11-23 | 映智科技股份有限公司 | Fingerprint coding method and fingerprint authentication method and system |
CN105160214A (en) * | 2015-06-19 | 2015-12-16 | 收付宝科技有限公司 | Multi-password electronic signature account protection system and multi-password electronic signature account protection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9286461B2 (en) | Multiface document | |
US8275995B2 (en) | Identity authentication and secured access systems, components, and methods | |
US20190080060A1 (en) | User authentication method and authentication system using match with junk data | |
Wang et al. | A contextual framework for combating identity theft | |
EP3053079B1 (en) | System and a method for validating an identification token | |
US8539574B2 (en) | User authentication and access control system and method | |
WO2008021428A2 (en) | Portable magnetic stripe reader for criminality security applications | |
JP2009543176A (en) | Traceless biometric identification system and method | |
GB2600577A (en) | System providing self-service access to locked merchandise | |
CN104680670A (en) | Re-encryption/encryption technique solution for key control points during bank card operation on ATM (automatic teller machine) | |
US20170032231A1 (en) | Multiface document | |
CN113316782A (en) | Identity document verification | |
CN105279478A (en) | Fingerprint sequential composition password authentification system | |
CN106648583A (en) | Information processing method and terminal | |
CN101286249A (en) | Anti-riot method utilizing double code for alarming | |
CN106022037A (en) | Financial terminal authentication method and device | |
CN109522694A (en) | A kind of identification system based on computer network | |
WO2017123098A1 (en) | A method for verifying the identity of a person | |
CN108701183B (en) | User authentication method and system using whether junk data are consistent | |
CN111523141B (en) | Personal privacy protection-based identity identification and verification system | |
CN106453304A (en) | Method and system for setting password for account, and security verification method | |
WO2021234476A1 (en) | De-identified identity proofing methods and systems | |
CN105635077B (en) | A kind of imported password coding/decoding system and its recognition methods | |
Ozer | Rights chipped away: RFID and identification documents | |
KR101708328B1 (en) | Security system of image terminal based on things acknowledgement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20081015 |