Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure shared password manager and method for generating and updating password, extracting password and deleting password thereof

A shared and manager technology, applied in the field of encryption and decryption technology and network communication, can solve problems such as low security, password leakage, large computing resources, etc., and achieve the effect of improving security

Pending Publication Date: 2022-06-03
BENGBU COLLEGE
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to increase the difficulty of brute force cracking, the algorithm for generating passwords consumes a lot of computing resources and also needs to rely on a common master password
For convenience, the user's master password setting is relatively simple. Once the master password is leaked, the password of each account can be known by cracking the encryption algorithm. Therefore, although it is more convenient to use, the security is still not high.
In addition, since the encryption algorithm of each password manager is fixed, when different users use the same password manager, the only difference is through the difference of the master password. When multiple users use the master password to distinguish, password storage and Extraction is prone to interference. Once users who use the same password manager know the master password of other users, it is easy to leak the password.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure shared password manager and method for generating and updating password, extracting password and deleting password thereof
  • Secure shared password manager and method for generating and updating password, extracting password and deleting password thereof
  • Secure shared password manager and method for generating and updating password, extracting password and deleting password thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] see figure 1 , the present invention provides a kind of technical scheme:

[0050] A secure shared password manager, comprising a touch terminal and a data processing platform, wherein:

[0051] The touch terminal and the data processing platform are connected through a communication device, and the communication device is used to establish communication between the touch terminal and the data processing platform, allowing the two to exchange data. The communication device can be a data connection line or a network. If the communication device is a data connection line, a communication port may be embedded in the touch terminal and the data processing platform, and the communication device connects the touch terminal and the communication port of the data processing platform; The communication device may also be a network module for constructing a network, a network device may be embedded in the touch terminal and the data processing platform, and the touch terminal an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure shared password manager and a method for generating and updating a password, extracting the password and deleting the password thereof.The secure shared password manager comprises a touch terminal and a data processing platform, and the touch terminal and the data processing platform are connected through communication equipment. Basic functions of password generation, extraction, deletion and the like are completed through operation of digital fingerprint information, service information and password rules, after encryption is conducted through the encryption technology, even if an attacker obtains the rule or the service information of the password, the password information in a password manager cannot be recognized, and the password management efficiency is improved. And different users can be distinguished by using biological fingerprints, so that different password information can be constructed on the same service requirement, passwords can be stored and extracted according to personal service requirements by using a fingerprint identification technology and simple operation, and the digital fingerprint information of each user is greatly different. Therefore, a plurality of users can share the same password manager.

Description

technical field [0001] The invention relates to the fields of encryption and decryption technology and network communication technology, in particular to a secure shared password manager and methods for generating and updating passwords, extracting passwords and deleting passwords. Background technique [0002] The rapid development of information technologies such as the Internet, the Internet of Things, and cloud computing is changing the way of life of human beings. In order to protect sensitive personal information, the issue of password security has received continuous attention. With the exponential growth of various applications and services, more and more accounts and passwords are held by people. Although high-strength passwords can improve security, high-strength passwords require complex settings, including numbers, letters, Symbols and other information, in order to remember and match these passwords, people must adopt different strategies, resulting in a reducti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0866H04L9/0863H04L9/0643
Inventor 杨松涛潘佳卉黄凯宁郭城杨海孙薇薇魏彤
Owner BENGBU COLLEGE