Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A password security management system and method

A management system and password security technology, applied in the direction of digital data authentication, etc., can solve problems such as uncontrollable technical security

Active Publication Date: 2020-10-23
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two problems with the above scheme. First, almost all Linux users and developers know that the password is stored in the / etc / shadow file. Even though the / etc / shadow file is protected by mandatory access control, there are still criminals. Bypass the mandatory access control by some means, access the / etc / shadow file, and steal the ciphertext of the password of the administrator account. Once the ciphertext of the administrator password is leaked, the hacker can crack the password of the administrator account through brute force or dictionary attack The plaintext of the password of the administrator account, the hacker can do whatever he wants after obtaining the plaintext of the password of the administrator account; secondly, the password encryption algorithm is an international encryption algorithm, which is uncontrollable in terms of technology and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A password security management system and method
  • A password security management system and method
  • A password security management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056]It should be noted that when a component is considered to be "connected" to another component, it may be directly connected to the other component or there may be an intervening component at the same time.

[0057] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a password security management system and method. The system comprises an access interface module, a password storage module and an encryption module. The password storage module comprises a first password file and a second password file. The first password file is used for storing a password of a common account, and the second password file is used for storing a password ofan administrator account. The access interface module is used for receiving an access request instruction of the application program and accessing the first password file or the second password fileaccording to the access request instruction. The encryption module is used for encrypting the password of the common account in the first password file and the password of the administrator account inthe second password file. According to the system and the method, the password of the administrator account is stored in the safer second password file, so that the password storage security of the administrator account is improved, and the security and autonomous controllability of password encryption are further improved by adopting the domestic password algorithm SM3.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a password security management system and method. Background technique [0002] At present, the account password storage technology of almost all Linux distributions uses shadow technology, that is, the account information is saved in the / etc / passwd file, and the account password is encrypted and stored in the / etc / shadow file. The encryption algorithm of the password uses International cryptographic algorithms such as MD5, SHA256 and SHA512. There are two problems with the above scheme. First, almost all Linux users and developers know that the password is stored in the / etc / shadow file. Even though the / etc / shadow file is protected by mandatory access control, there are still criminals. Bypass the mandatory access control by some means, access the / etc / shadow file, and steal the ciphertext of the password of the administrator account. Once the ciphertext of the admi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45G06F21/31
CPCG06F21/31G06F21/45
Inventor 廖正赟彭金辉卫志刚李鑫刘武忠宗澎
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products