Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for verifying password

A technology for verifying passwords and passwords, applied in the field of verifying passwords, can solve problems such as inability to realize user anonymity, inability to resist offline password guessing attacks, etc., and achieve the effect of resisting user imitation attacks

Inactive Publication Date: 2014-10-29
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2012, Wang and Ma et al. analyzed the security of Shao and Chin's method, pointing out that their method cannot resist offline password guessing attacks, user imitation attacks, and cannot achieve user anonymity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] A method for verifying passwords, which is characterized in that the passwords are associated and graded and stored together. High-level passwords have the authority to view low-level passwords, and multiple low-level passwords can retrieve a higher-level password. The specific steps are as follows: :

[0016] ①Classify passwords, such as S, A, B, C, D (from high to low) five levels; when adding a new account, there will be a corresponding password level;

[0017] ② store password information;

[0018] ③High-level passwords have the authority to view low-level passwords;

[0019] ④ Multiple low-level passwords retrieve a higher-level password.

Embodiment 2

[0021] A method for verifying passwords, which is characterized in that the passwords are associated and graded and stored together. High-level passwords have the authority to view low-level passwords, and multiple low-level passwords can retrieve a higher-level password. The specific steps are as follows: :

[0022] ①Classify passwords, such as S, A, B, C, D (from high to low) five levels; when adding a new account, there will be a corresponding password level;

[0023] ②Store password information, password information includes instructions: description of the website (bank card) corresponding to the user name and password; user name: user name or bank card number when registering on the website, etc.; password: password corresponding to the user name, Stored after encryption; Remarks: other information;

[0024] ③High-level passwords have the authority to view low-level passwords;

[0025] ④ Multiple low-level passwords retrieve a higher-level password.

Embodiment 3

[0027] A method for verifying passwords, which is characterized in that the passwords are associated and graded and stored together. High-level passwords have the authority to view low-level passwords, and multiple low-level passwords can retrieve a higher-level password. The specific steps are as follows: :

[0028] ①Classify passwords, such as S, A, B, C, D (from high to low) five levels; when adding a new account, there will be a corresponding password level;

[0029] ②Store password information, password information includes instructions: description of the website (bank card) corresponding to the user name and password; user name: user name or bank card number when registering on the website, etc.; password: password corresponding to the user name, Stored after encryption; Remarks: other information;

[0030] ③High-level passwords have the authority to view low-level passwords. Users log in with high-level passwords, can query low-level user information, and can add, del...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for verifying a password, which belongs to the field of computer storage, wherein passwords are integrated together in an association and classification manner, and stored, the passwords with high levels have the authorities to view the passwords with low levels, and a plurality of the passwords with low levels are capable of finding one password with a higher level. The method comprises the following specific steps of: (1) classifying passwords, wherein when an account is newly added, a corresponding password level exists; (2) storing the information of the password; (3) providing authorities for the passwords with high levels to view the passwords with low levels; (4) finding one password with a higher level by a plurality of the passwords with low levels. According to the method disclosed by the invention, a user has backup passwords, and finds other passwords from a plurality of passwords, thus avoiding the loss and inconvenience due to password forgetting or other reasons.

Description

technical field [0001] The invention relates to a method for verifying passwords, which belongs to the field of computer system storage. Background technique [0002] For friends who often surf the Internet, the most troublesome thing is to remember the various account passwords registered and applied for in forums, communities, shopping malls, and alumni records. Some people record them densely in their notebooks, and some friends choose to install special recording software for relief, but the existing recording software all put the passwords to be recorded into a password box, and then use a super password To check all passwords, this method of checking all passwords using a super password requires the user to remember one more super password, and when the super password is lost or cracked, all passwords will be lost, causing huge losses. The multi-server environment means that under the background of the rapid development of Internet technology, a powerful online servic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 王春祥郭静
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products