Method and system for protecting safety of password

A security protection and password technology, applied in the field of information security, can solve the problem of long dictionary attack time, and achieve the effects of enhanced capabilities, increased time costs, and improved security.

Active Publication Date: 2011-05-04
BEIJING SENSESHIELD TECH
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Currently, the difficulty of a dictionary attack on a password mainly depends on the complexity of the password; the more complex the password, the longer the dictionary attack takes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting safety of password
  • Method and system for protecting safety of password
  • Method and system for protecting safety of password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the object, technical solution, and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0045] The present invention provides a method and system for realizing password security protection; performing n hash operations on the password used for verification set in the password setting stage to obtain the first password, so as to increase the complexity of the first password used for verification; In the password verification phase, the hash operation is also performed on the password to be verified provided by the client, but the hash operation is performed successively in an increasing number of times, and after each hash operation, the hash operation result is compared with the first A password is compared, and the hash operation result consistent with the first password can be obtained within the preset maximum number of times N, then th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for protecting safety of a password. The method comprises the following steps of: A, performing Hash operation for n times according to the password set at a password set stage to obtain a first password, wherein n is a natural number less than the maximum time N, and N is a natural number more than 1; B, performing Hash operation on the received password to be verified for m times to obtain a second password; C, when the second password and the first password are consistent, determining that the password to be verified is correct; when the second password and the first password are not consistent, judging whether m is less than or equal to the maximum time N; and if so, adding 1 to m and then performing the step B, otherwise, determining that the password to be verified is not correct. The invention provides a system for protecting the safety of the password. By using the method and the system, the password can resist the attacking of a dictionary and safety is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for realizing password security protection. Background technique [0002] In modern life, passwords are used more and more widely. For example, email passwords, login passwords for a website, online banking transaction passwords, file encryption passwords, and hardware device passwords all fall into the category of passwords. In the above-mentioned applications, the password is used to verify whether the identity of the user or user is legal, and then grant the corresponding operation authority to the legal user or user; for example: when the user or user wants to log in to a certain system or website, a certain When a system or website verifies that the password entered by the user or the user is correct, the system or website will confirm that the user or user is legal and grant it the corresponding authority; otherwise, it will confirm that the user or u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products