Method of using super password to decipher

A technology of super password and user password, applied in the field of decryption using super password, can solve problems such as damage to user interests, user inconvenience, and cumbersome process, and achieve the effect of maintaining interests, increasing security, and improving security.

Active Publication Date: 2008-03-12
LENOVO (BEIJING) LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, in the second method, because the super password is in the hands of the supplier rather than the user himself, there is a potential safety hazard, and the user must send the mobile storage device to the supplier for maintenance, which is a cumbersome process and brings great inconvenience to the user. Great inconvenience has come, and the interests of users have been damaged
[0012] It can be seen from the above description that, in the prior art, both method 1 and method 2 use the super password preset by the supplier to decrypt when using the super password, but no matter whether the set super password is stored in Neither in the hands of the user nor in the hands of the supplier can maintain the interests of both the supplier and the user at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of using super password to decipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0036] Fig. 1 is a flowchart of an embodiment of the present invention. Referring to Fig. 1, the present invention utilizes super password to decrypt the process that encrypts the data that is stored in mobile storage device, specifically comprises the following steps:

[0037] Step 101: the first user connects the first mobile storage device to the first computer, and inputs a backup key instruction to the first computer.

[0038] Step 102: After receiving the backup key instruction input by the first user, the first computer prompts the first user to input a user password.

[0039] Step 103: After the first user enters a password, the first computer obtains the password, and judges whether the currently obtained password is the same as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed method to decipher with a super cipher comprises: the first computer receives user command for cipher and displays self cipher; the provider uses received user cipher and pre-set super cipher to obtain the first super cipher and return to user; the first computer uses received user first super cipher and pre-set algorithm same as the provider to obtain the second super cipher, and decides whether the two ciphers same, yes to decipher the data in mobile device. This invention brings convenience to both user and provider.

Description

technical field [0001] The invention relates to communication technology, in particular to a decryption method using a super password. Background technique [0002] At present, many mobile storage devices such as mobile hard disks, U disks, and MP3 players have encryption functions. After the user saves the data in the mobile storage device, if the user wishes to encrypt the stored data to prevent others from misappropriating it, the mobile storage device can be used (the mobile storage device described here and below refers to a device with The encryption function provided by mobile storage device with encryption function), input a user password set by oneself to the mobile storage device, after the mobile storage device obtains the user password, save the user password, and then use the key in itself and encrypt The algorithm encrypts the data saved by the user. In this way, in the follow-up process, if a user wishes to recover the data encrypted and saved in the mobile ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00
Inventor 王元成杨宇光马强
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products