Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security cloud password manager control system and method

A control method and manager technology, applied in the field of security authentication, can solve problems such as guessing attacks, unable to decrypt cloud password manager, unable to restore passwords, etc., to achieve the effect of improving security

Active Publication Date: 2020-09-25
收稻网络科技(义乌)有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage of this type of password manager is that password management is simple, but the disadvantage is that the master password selected by the user is often a weak password that is easy to remember. Encrypting the password manager with a weak master password is easy to implement offline dictionary guessing attacks, so attackers can use The cracked master password decrypts the cloud password manager and obtains the passwords of all accounts of the user
The third category is a multi-cloud-based password manager. This type of password manager uses secret sharing technology to disperse and store user accounts and passwords on multiple clouds. This method obviously improves security, but there is integrity and reliability. Sexual problem, when some secrets distributed to some clouds are modified, it will not be possible to recover the user's password
The cloud password manager should not use the user's main password to directly encrypt / decrypt, but should use a sufficiently strong password to encrypt / decrypt the cloud password manager; at the same time, in order to improve usability, the user only needs to memorize a general-strength master password to generate A strong key encrypts / decrypts the password manager, while an attacker cannot decrypt the cloud password manager even if the master password is cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security cloud password manager control system and method
  • Security cloud password manager control system and method
  • Security cloud password manager control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] Password manager-used to store user names and corresponding passwords of various accounts of the user. Since the user does not need to memorize these stored passwords, they can be passwords of any strength. Master password - the only password that the user needs to remember. The master password is a password of general strength and only needs to be able to resist online guessing attacks. Randomized master password - a random password generated by the user's mobile device through blind calculation and extension of the master password. Randomize the master password with sufficient strength.

[0078] Blind Pseudo-Random Function - is the safe computation of F by both parties (sender and receiver) kA protocol for (x), where k and x are the inputs of the sender and receiver, respectively, and the sender can learn nothing from this interaction, and the receiver can know F k (x).

[0079] Domain-based password-a random password obtained by hashing the strong password select...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of security authentication, and discloses a security cloud password manager control system and method. A password manager stores user names and passwords of user login websites and systems; the cloud stores a password manager; a mobile device and a client execute a massively pseudo-random protocol to generate a randomized main password for encrypting ordecrypting the password manager; a server authenticates a user name and a password of user login; a client user inputs a main password. According to the invention, the main password of the user is blindly calculated by using mobile equipment of the user, the user account is expanded into a randomized main password which is highly secure enough, and then a randomized main password encryption password manager stores the randomized main password into the cloud, so that an offline dictionary guessing attack can be prevented, meanwhile, each user account is bound with a website domain name, an attacker cannot execute a phishing attack, and the security and reliability of communication are effectively improved.

Description

technical field [0001] The invention belongs to the technical field of security authentication, and in particular relates to a security cloud password manager control system and control method. Background technique [0002] Currently, passwords are the most widely used identity authentication method. With the widespread popularization of the Internet, Internet companies that continue to grow and develop have emerged in recent years, and the number of software is also increasing day by day. This makes the burden of memorizing and managing people's daily passwords increasingly heavy as the number of software used increases. The common mode is that users choose a user name and password for each website or system, but due to the limitation of human memory, users tend to use simple passwords and reuse the same password between multiple systems, these phenomena lead to password authentication. safety is reduced. Attacks on passwords mainly include online and offline guessing at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/083H04L63/0838H04L63/10H04L63/0428H04L67/10
Inventor 郭亚军郭奕旻
Owner 收稻网络科技(义乌)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products