Password warehouse management system based on password characteristic

A warehouse management system and warehouse management technology, applied in the system field of the computer application technology field, can solve problems such as the same or similar literature reports that have not yet been found, and achieve practical scalability, fast management functions, and management functions are fast and effective.

Inactive Publication Date: 2009-09-16
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In further searches, no literature reports identical or similar to the subject of the present invention have been found

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password warehouse management system based on password characteristic
  • Password warehouse management system based on password characteristic
  • Password warehouse management system based on password characteristic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.

[0027] like figure 1 As shown, this embodiment includes: an information collection module, a password warehouse construction module and a password warehouse management module.

[0028] The information collection module is the basic module of the entire password warehouse management system, which can collect relevant information of specific users and establish an expandable password factor database according to the configuration, such as figure 2 shown. The password factor in the expandable password factor database is the basic unit of the password. It is based on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a password warehouse management system based on a password characteristic, belonging to the technical field of computer application. The system comprises an information acquisition module, a password warehouse structure module and a password warehouse management module; wherein, the information acquisition module acquires a password factor which is required by the password warehouse, the password warehouse structure module constructs a preset password document by the password factor which is provided by the information acquisition module and hierarchically and structurally memorizes a constructed preset password document, and the password warehouse management module provides management function to the constructed password warehouse. The preset password document is organizationally memorized according to password type, password organization and password length to form the password warehouse. The invention avoids exhaustive and unnecessary preset password documents, thereby obviously improving the decrypting efficiency of the encryptted key document in the process of computer forensics.

Description

technical field [0001] The invention relates to a system in the field of computer application technology, and is a password warehouse management system based on password features. Background technique [0002] With the application and popularization of computers, intelligence activities and illegal activities using computers and networks or using computers and networks as platforms are becoming more and more rampant. According to the estimates of the US Federal Bureau of Investigation, crimes using computers cause losses of at least US$300 billion to the society every year. How to effectively use modern scientific and technological means and computer technology to collect evidence for such intelligence activities and illegal activities has increasingly attracted the attention of relevant departments. Computer forensics and intelligence analysis are gradually developed under this background. Computer forensics and intelligence analysis refer to post-data processing from mass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/31
Inventor 邱卫东熊潇刘伯仲郑燕飞刘海旺
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products