Unlock instant, AI-driven research and patent intelligence for your innovation.

Provision of at least one password

A cipher and sub-cipher technology, applied in digital data authentication, computer security devices, transmission systems, etc., can solve problems such as reducing security, and achieve the effect of reducing the possibility

Inactive Publication Date: 2018-02-16
SIEMENS AG
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the pattern can be guessed by swiping back on the display, the security of the preference for more comfortable authentication is reduced in this case

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Provision of at least one password
  • Provision of at least one password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In the first embodiment (see figure 1 ), the invention is described on the basis of an apparatus in the form of a workstation computer COM. Users work with workstation computers. To do this, the user must first log in or authenticate at the workstation computer. To do this, the user enters his password PM=P4="a!8m" (quotes do not belong to the password, but are included in the description for better readability of the password). The password consists of symbols - such as numbers, letters and special symbols connected to each other. The entry, checking and further provision of the password for authentication is controlled by the program PRG, which is installed, for example, on a workstation computer and executed there.

[0035] After entering a password, the program checks whether said password is a valid password. For this, the password is looked up in the list LIS, which is stored in memory. If the password is found in the list, the program changes the state of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to methods and devices for providing at least one password for a change in state of a device from a first operational state into a second operational state by means of inputtingthe password. A number of characters of the password are set in accordance with the duration of the first operating state of the device.

Description

technical field [0001] The invention relates to a method and a device for providing at least one password for putting a device from a first operating state into a second operating state. Background technique [0002] Nowadays, the entry of a password to unlock a device such as a milling robot, an x-ray system or a smart meter—also called authentication or login—is usually carried out in accordance with standards. [0003] The additional costs for higher-quality authentication mechanisms, such as chip cards, are often forgone especially in environments where basic security passes through the physical security of spaces—for example industrial facilities, power plants, doctors' areas in hospitals protection is provided. On the other hand, the password must correspond to certain minimum requirements, so that in the event of an unidentified intrusion (Eindringen) the protection against unauthorized authentication during the “login” is still present. [0004] Minimum requirement...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/31H04L9/32
CPCG06F21/46G06F21/45G06F21/31H04L9/3226G06F21/604
Inventor K.卢卡斯E.佐默
Owner SIEMENS AG