Check patentability & draft patents in minutes with Patsnap Eureka AI!

A method for creating and using multi-level matrix password

A matrix and password technology, applied in the physical field, can solve problems such as the inability to meet password security requirements, and achieve the effect of saving storage space and improving security performance.

Active Publication Date: 2019-12-06
HANDAN COLLEGE
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these theories still cannot meet the security requirements of today's network for passwords. The present invention can generate strong passwords with compact length by introducing an additional dimension for input in passwords.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for creating and using multi-level matrix password
  • A method for creating and using multi-level matrix password
  • A method for creating and using multi-level matrix password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the embodiments of the present application. Obviously, the described embodiments are part of the present application Examples, not all examples. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0027] The individual character or dot positions of prior art ciphers are called field positions, or simply positions. For example, if the prior art password is "RIP889QJG", the character "R" is in field position 1, the character "I" is in field position 2, the character "8" is in position 4, and so on.

[0028] Construct a matrix for password input. A matrix is ​​an n-dimensiona...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verifiable, safe and efficient multistage matrix password. A matrix for password input is included, the matrix is of an n-dimensional structure of a field position; characters may occupy any one of the field locations in any order through the navigation matrix during password entry, each nth level is configured with one or more field positions; each of the one or more (n-1) th-level field locations may have an nth-level field location, different nth levels are associated with different (n-1) th level field positions; different nth levels can have the same or differentnumbers of field positions; different characters are navigated to different positions and locked by the navigation matrix at different levels, an improved double-space key management and navigation system is provided, and the key distribution scheme remarkably saves the storage space, reduces the calculation overhead and improves the calculation speed of the key.

Description

technical field [0001] The present invention relates to the field of physics, especially information transfer technology, in particular to a method for creating and using a strong password, more specifically, a method for creating and using a multi-level matrix password. Background technique [0002] In recent years, with the rapid development of new-generation information technologies such as cloud computing and the Internet of Things, various mobile terminals have been widely used. At the same time, cyberspace security has become a matter of great concern to today's society. A large amount of manpower and material resources are required to ensure the security of the networks of the military, government, and companies. In order to effectively ensure the confidentiality, integrity and certainty of information, the most commonly used technology is to use ciphers to store and transmit messages. Cryptography technology has also developed from the initial service in the military...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/0869
Inventor 焦洪强闫芳园石亚超王璐梁硕王保民
Owner HANDAN COLLEGE
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More