Provision of at least one password
A cipher and sub-cipher technology, applied in digital data authentication, computer security devices, transmission systems, etc., can solve problems such as reducing security, and achieve the effect of reducing the possibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] In the first embodiment (see figure 1 ), the invention is described on the basis of an apparatus in the form of a workstation computer COM. Users work with workstation computers. To do this, the user must first log in or authenticate at the workstation computer. To do this, the user enters his password PM=P4="a!8m" (quotes do not belong to the password, but are included in the description for better readability of the password). The password consists of symbols - such as numbers, letters and special symbols connected to each other. The entry, checking and further provision of the password for authentication is controlled by the program PRG, which is installed, for example, on a workstation computer and executed there.
[0035] After entering a password, the program checks whether said password is a valid password. For this, the password is looked up in the list LIS, which is stored in memory. If the password is found in the list, the program changes the state of th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

