Method and system for modifying password of encryption lock

An encryption lock and password technology, applied in the field of encryption locks, can solve the problem that the initial password of the encryption lock is not controlled by the manufacturer

Active Publication Date: 2013-01-30
FEITIAN TECHNOLOGIES
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method and system for modifying the encryption lock password in order to solve the defect that the modification of the initial password of the encryption lock is not controlled by the manufacturer in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for modifying password of encryption lock
  • Method and system for modifying password of encryption lock
  • Method and system for modifying password of encryption lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0161] Embodiment 1 of the present invention provides a method for modifying the encryption lock password, such as figure 1 shown, including:

[0162] Step A: When the host receives the user's trigger information, it judges whether there is an authorization lock and an operation lock connected to it, and if yes, execute step B, otherwise end.

[0163] Step B: The host sends the modification information to the authorization lock;

[0164] The modification information in this embodiment is a new password or serial number.

[0165] In this embodiment, between step A and step B, it may also include:

[0166] Step a1: the host obtains a password list from the authorization lock, and outputs it;

[0167] Step a2: The host waits for the selection information input by the user, and judges whether the selection information is received within the preset time, if yes, continue, otherwise output an error message, and end;

[0168] The selection information in this embodiment includes ...

Embodiment 2

[0204] Embodiment 2 of the present invention provides a method for modifying the encryption lock password, such as figure 2 shown, including:

[0205] Step 100: When the host computer receives the trigger information from the user, it judges whether there is an authorization lock and an operation lock connected to it, if yes, execute step 101, otherwise end;

[0206] In this embodiment, the host distinguishes the operation lock and the authorization lock through different interfaces; when the operation lock and the authorization lock are the same type of lock, it can also be distinguished by other identifications, such as user ID, UID, specific data files in the lock or specific executable programs, etc.;

[0207] Specifically, the trigger information is generated when the user starts the tool software;

[0208] Step 101: the host sends an acquisition command to the operation lock;

[0209] Step 102: When the operation lock receives the acquisition instruction, send the in...

Embodiment 3

[0270] Embodiment 3 of the present invention provides a method for modifying the encryption lock password. In this embodiment, an authorized lock can only modify the initial password of a type of operation lock once, such as image 3 As shown, the method of the present embodiment includes:

[0271] Step 200: When the host receives the trigger information from the user, it judges whether there is an authorization lock and an operation lock connected to it, if yes, execute step 201, otherwise end;

[0272] In this embodiment, the host distinguishes the operation lock and the authorization lock through different interfaces; when the operation lock and the authorization lock are the same type of lock, the host can also distinguish through other identifications, such as user ID, UID, specific data files or Specific executable programs, etc.;

[0273] Specifically, the trigger information is generated when the user starts the tool software;

[0274] Step 201: the host sends a firs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for modifying a password of an encryption lock. The method comprises the steps that: when the user trigger information is received, a host judges whether an authorized lock and an operation lock are connected with the host, if so, the host transmits the modification information to the authorized lock, otherwise, the operation is ended; the authorized lock receives the modification information and obtains a new password; the authorized lock processes the new password and transmits the processing result and the new password to the host; the host generates a verification instruction according to the processing result and the new password and transmits the verification instruction to the operation lock; the operation lock analyzes and verifies the received verification instruction, if verification instruction is verified to be qualified, the internally stored password is replaced by the analyzed new password, the modification success information returns to the host, and the operation is ended; otherwise the failure information returns to the host, and the operation is ended. According to the technical scheme, an agent or a developer can modify the password of the operation lock by utilizing the authorized lock, namely the password is modified under the control of a manufacturer, malicious modification is avoided, and the modification process is safe and controllable.

Description

technical field [0001] The invention relates to the field of dongles, in particular to a method and system for modifying passwords of dongles. Background technique [0002] The encryption lock is an encryption product that combines software and hardware inserted into the computer. It works by connecting to the host through a communication interface (USB interface or parallel interface, etc.). The encryption lock uses the encryption algorithm stored inside to encrypt the data in the host. The user can view the encrypted data only after decrypting the encrypted data with the corresponding encryption lock, which improves the security of user data. [0003] The general encryption lock will set an initial password when it leaves the factory. The agent or developer can change the initial password to a password approved by himself, but the modification process is not controlled by the manufacturer. In order to prevent the agent or developer from changing the initial password malic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products