Unlock instant, AI-driven research and patent intelligence for your innovation.

securely generate and store passwords in computer systems

A computer system, computer technology, applied in the field of cryptographic security

Inactive Publication Date: 2017-07-14
SIEMENS AG
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This generally increases the risk that these passwords may be obtained by anyone accessing executable software or configuration files containing such passwords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • securely generate and store passwords in computer systems
  • securely generate and store passwords in computer systems
  • securely generate and store passwords in computer systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] It is an object of the present invention to provide methods and systems for enhanced protection of cryptographic and other secret symmetric keys, private keys or authentication data. Passwords can be stored in software such as figure 1 shown. In this case, the password may be encrypted as a string stored as part of a file, software application, or other software program. Passwords can also be stored in configuration files, such as figure 2 shown.

[0030] Passwords stored in this manner are vulnerable to serious threats. An attacker can access, copy and analyze software executables or configuration files stored on local media. This can happen due to internal attacks, access to backup copies of software or configuration files stored elsewhere, or gaps in access controls protecting software or configuration files.

[0031] An attacker can access, copy, and analyze software executables or configuration files stored on remote media (for example, in distributed computi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and systems for protecting passwords are disclosed. According to one aspect of the invention, a processor selects a set of local configuration data. This may include one or more strings associated with local configuration data. The processor concatenates the set of local configuration data, and calculates a hash value of the concatenated data. The processor generates an encrypted string by encrypting the password using the hash value as a key. The processor then encodes the encrypted string into a string in the software program. When the first computer system requires a password to access the second computer system, the steps are reversed, the password is obtained, and the first computer system accesses the second computer system.

Description

[0001] related case statement [0002] This application claims priority and benefit to US Provisional Patent Application Serial No. 61 / 652,235, filed August 13, 2012, which is hereby incorporated by reference in its entirety. technical field [0003] The present invention relates to the field of computer system security, and more particularly to the security of passwords in computer systems. Background technique [0004] Protecting passwords and other information is important to keeping your computer secure. Passwords are a key defense against harmful intrusions into computer systems. Losing passwords (often through hacking), and the resulting loss of security information, is often catastrophic, as important and highly sensitive data can be lost. [0005] The problem of password security exists even when computer systems interact. In these cases, the first computer system accessing the second computer system must also access the second computer system via a password. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/30G06F21/62
CPCG06F21/30G06F21/44H04L9/0819H04L9/3242H04L2209/24
Inventor R.F.格雷夫曼
Owner SIEMENS AG