Password management method and password management device

A password management and password technology, which is applied in the computer field, can solve problems such as difficult to guarantee information security and privacy protection requirements, and achieve the effect of meeting information security and privacy protection requirements

Inactive Publication Date: 2016-01-27
ZTE CORP
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a password management method and device to solve the problem that the information security and privacy protection requirements in different application scenarios are difficult to guarantee in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password management method and password management device
  • Password management method and password management device
  • Password management method and password management device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0022] Such as figure 1 As shown, the embodiment of the present invention provides a password management method, including:

[0023] S11. Receive an unlocking password input by a user, where the unlocking password is any one of at least two unlocking passwords corresponding to the user, wherein each of the unlocking passwords corresponds to a different user authority;

[0024] S12. Provide corresponding user rights to the user according to the input unlock password.

[0025] In the password management method provided by the embodiments of the present invention, a user may have at least two unlocking passwords, and each unlocking password corresponds to a different user authority. The user permissions corresponding...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password management method and a password management device. The password management method and the password management device relate to the technical field of computers and mobile communication and are used for settling high difficulty for ensuring high information safety and high privacy protection requirement in different application scenes in prior art. The password management method comprises the steps of receiving an unlocking password which is input by a user, wherein the unlocking password is a random one selected from at least two unlocking passwords which correspond with the user, wherein the unlocking passwords correspond with different user authorities; and providing a corresponding user authority according to the input unlocking password. The password management method and the password management device can be used in various systems and applications in which password verification logging-on is required.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a password management method and device. Background technique [0002] Cryptography is a technique widely used in computer security. In an operating system, a user usually logs in with a user name and a password. For example, in the Windows operating system, when the system is started, the user enters the system by inputting a user name and a password. Different users can have different permissions, and different users can customize their own private desktops. After the system is locked, to enter the system again, if you do not need to switch users, you only need to enter the password. Many applications also use password technology to protect user privacy and data security, such as gesture lock, application lock and so on on Android phones. [0003] The cryptographic techniques used in existing systems have the following common characteristics: in a multi-user operating sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 钟卫东程圣宇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products