Data processing method and password management system

A password management and data processing technology, applied in the electronic field, can solve the problems of leakage and low password security performance.

Active Publication Date: 2014-01-15
LENOVO (BEIJING) LTD
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The invention provides a data processing method and a password management system, which are used to solve the technical problems in the prior art that the security performance of the password is not high and there is a risk of leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and password management system
  • Data processing method and password management system
  • Data processing method and password management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] In the embodiment of the present application, a data processing method of how the password management system modifies the password in the server is described, the method is applied to a password management system, and at least one password including the first password is stored in the password management system, At least one password is used in combination with at least one account information corresponding to the at least one password to obtain the predetermined authority of at least one server, and the first password is used in conjunction with the corresponding first account information to obtain the predetermined authority of the first server, wherein at least one server Contains the first server.

[0088] In the password management system, there are passwords and corresponding account information for obtaining the predetermined authority of multiple servers. For example, in the embodiment of this application, the password management system has the password for obtai...

Embodiment 2

[0166] In the embodiment of this application, as Figure 4 As shown, a password management system is described. At least one password including a first password is stored in the password management system. The at least one password is used to combine at least one account information corresponding to the at least one password to obtain predetermined authority of at least one server. The first password is used in conjunction with the corresponding first account information to obtain the predetermined authority of the first server, wherein at least one server includes the first server, including:

[0167] An obtaining unit 401, configured to obtain information to be detected from a first server;

[0168] A judging unit 402, configured to judge whether the information to be detected meets the first condition information preset by the password management system, and obtain a judging result;

[0169] The modifying unit 403 is configured to modify the first password to a second pass...

Embodiment 3

[0184] In the embodiment of the present application, after the password management system modifies the password in the first server, it is a process of using the modified password to obtain a predetermined authority in the first server.

[0185] The method for obtaining the predetermined authority of the password management system has been introduced in Embodiment 1. Therefore, the embodiment of the present application does not repeat the method for obtaining the predetermined authority of the password management system. Therefore, when the password management system is in the working state, please see Figure 9 ,in, Figure 9 A data processing method is described in , and the method is applied to a password management system, including:

[0186] In step 901, it is detected on the operation interface of the password management system whether there is a link operation that triggers the acquisition of the predetermined authority of the first server.

[0187] Wherein, the opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processing method and a password management system. The data processing method is applied to the password management system. The password management system stores at least one password which contains a first password, the at least one password is used for being combined with the information of at least one account corresponding to the at least one password, the preset permission of at least one server is acquired, the first password is used for being combined with the information of the corresponding first account, and the preset permission of the first server is acquired, wherein the at least one server comprises a first server. The data processing method comprises the steps that information to be detected is obtained from the first server; whether the information to be detected meets the first condition information preset by the password management system is judged, and a judged result is acquired; when the judged result is yes, based on a password modification rule preset by the first server, the first password is modified into a second password, and the first password is different from the second password; the second password is stored in the password management system.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a data processing method and a password management system. Background technique [0002] When a user logs in to the server, for example, when logging in to QQ or Weibo, the login interface of QQ or Weibo will be opened first, and then the account information and password information required to log in to QQ or Weibo will be entered in the login interface, and then the QQ or Weibo server will Verify the account information and password information entered by the user. If the verification is passed, the corresponding operation interface of QQ or Weibo will be opened. [0003] Since the password is involved, the server will manage the password, and the password managed by the password management system in the prior art is to store the password in the server database in plain text, and there is a risk of leakage. [0004] Therefore, in order to avoid password leakage, the follow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 李俊张硕
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products