Information system user password generation method

A user password and information system technology, applied in the field of password generation in computer information system management, can solve problems such as password calculation, achieve flexible implementation methods, and save server and database resources

Inactive Publication Date: 2011-10-19
KUNMING ENG & RES INST OF NONFERROUS METALLURGY
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, since the hash algorithm is an open standard, once the calculation met

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information system user password generation method
  • Information system user password generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Example 1: Zhang Sang is a new employee of company A, and the information center of company A needs to assign Zhang Sang the user account and password of the two systems of office and finance. For the convenience of employees, all systems in the company can use a unified user name to log in for an employee, but the passwords of each system are different, and the initial password assigned to Zhang Sang is also different.

[0041] At present, the user name "zs" has been assigned to Zhang Sang, and the system needs to assign an initial password to Zhang San.

[0042] The distribution process is as follows: (1) First, the system uses the user name zs and the corresponding password 123 of the office system to generate two information digests DG1 and DG2 through the SHA224 algorithm, forming two 224bit (28 byte) byte arrays, the contents are as follows.

[0043] DG1

zs

737375AC94A60C0701B33555A48A9A7A7D15CBE88F7CD41AC770F8A6

DG2

123

26D6A8AD97C7...

Embodiment 2

[0060] Example 2: In addition to the office system, the financial system also needs to assign a password to Zhang Sang. The user name is still zs, but the system key corresponding to the financial system is 1234, which generates a five-digit pure digital password.

[0061] The results of each step are as follows: (1) First, the input calculation is performed, and the information digests DG1 and DG2 of "zs" and "1234" are calculated through the SHA384 algorithm, forming two 384bit (48 byte) byte arrays as listed in the following table.

[0062] DG1

[0063] (2) From the first unit of the array to the last unit of DG1 and DG2, XOR operations are performed on the bytes corresponding to DG1 and DG2 byte by byte, and a new byte array DG3 is formed as a result.

[0064] DG3

[0065] (3) Take the content DA of the first byte of DG3, convert it to 218 in decimal, and get the value of D1 as 2 after calculating the remainder with 3.

[0066] (4) The relationship betw...

Embodiment 3

[0072] Implementation example 3: Li Si, a new employee of company A, has been assigned a user name of ls, and needs to be assigned an unchangeable, alphanumeric, 7-digit password in the internal examination system, and the system password is abcd.

[0073] (1) First perform input calculations, calculate the information digests DG1 and DG2 of "ls" and "abcd" through the SHA512 algorithm, and form two 512bit (64 byte) byte arrays as listed in the following table.

[0074] DG1

BFA09D34CF95F35BC6BE51AFC67DD211C114EBD4F74AD27BE3B76B5C08EBCCF00A07B65C1FA93C65A0CB5120F1DE23D4127CFFB11A88E705CBAD7D1565582A8C

DG2

B09B6BA7452D6FD247F05658F3EDA1B372875D1FF8B6FACB1EBFB9D089CB336220852576E02608BE01AF0BA4353EE014374B74C7B480E9C0B96264605AF77FDB

[0075] (2) From the first unit of the array to the last unit of DG1 and DG2, XOR operations are performed on the bytes corresponding to DG1 and DG2 byte by byte, and a new byte array DG3 is formed as a result.

[0076...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an information system user password generation method, which belongs to the technical field of computer coding, and particularly relates to a password generation method applied in the information system management of a computer. The method comprises the step of carrying out several-time hashing to input information to obtain a corresponding password. The method has the advantages that the safety of algorithm is sufficient, and the password does not need to be stored in a database, so that the resources of a server and a database can be saved, and the implementation mode is flexible and simple.

Description

technical field [0001] The invention belongs to the technical field of computer coding, in particular to a password generation method applied to computer information system management. Background technique [0002] Computer information systems, including office, mail, Internet forums, shopping websites, etc. used in enterprises usually need to assign login names and passwords to registered users. The system allows the user to enter a password when registering, and can also assign an initial password to the user, which can be modified after the user logs in for the first time. Some systems also assign an unchangeable password to the user. For example, in the examination system, the user can only use the given password to log in, and you are not allowed to modify it yourself. [0003] Usually, in order to facilitate management, the information system assigns exactly the same initial password to all users, or adopts a method in which the user name and password are exactly the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/57
Inventor 沈超
Owner KUNMING ENG & RES INST OF NONFERROUS METALLURGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products