Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A super password generation and authentication method

A super password and user authentication technology, applied in user identity/authority verification, data exchange details, digital transmission system, etc., can solve the problems of high matching probability, intrusion, fast string matching speed, etc., to achieve convenient use and network security , safe to use

Active Publication Date: 2005-06-01
HUAWEI TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although in the current prior art, equipment suppliers can also directly use special characters in the super password, but basically use ASCII code
[0007] 3. The original super password is generally written by the equipment supplier when developing the product, and it cannot be changed by the user. It is easy to cause the password to be actually a "public" password, which instead provides a way to intrude
[0008] 4. The string matching speed is very fast, and the matching probability is very high, which cannot prevent the deciphering of professional tools

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A super password generation and authentication method
  • A super password generation and authentication method
  • A super password generation and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0021] Each network device has its own network MAC (Media Access Control) address, which is used to identify the device in the network. The MAC address is unique, and the MAC addresses of different devices are different. With this unique MAC address, a unique super password can be customized for the device. The method of realization is that the equipment supplier uses a super password generation software to encrypt the MAC address into a set of character strings to form a unique super password valid only for the device and provide it to the user. The super password generation program of the super password generation software can adopt the MD5 encryption algorithm (Message-Digest Algorithm 5, information-digest algorithm), and can also refer to the MD5 encryption algorithm for proper modification.

[0022] For example: improve the MD5 algori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses method of creating cipher in user's equipment and performing user confirmation. The method includes: 1) creating super cipher with the user's equipment based on the specific information of the user's equipment; and 2) conforming the user in the user's equipment with the super cipher. The super cipher thus created is hard to decipher, safe and convenient.

Description

technical field [0001] The invention relates to a method for generating and authenticating a super password, in particular to a method for generating and authenticating a super password valid only for specific equipment. Background technique [0002] At present, the network equipment provided by many network equipment suppliers in the market basically has restrictions on the user's operation authority, and the method to limit the use of authority is to set a password. Only those who have the device password can control and operate the network device. However, the password is easily forgotten or changed by other people with the same authority, so that the original password is unusable, so all devices have a super password, which can be used by anyone who has the right to use the corresponding network equipment. But it is required that the super password must be difficult to memorize and decipher. Once the normal password set by the device is lost, the normal password can st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/28H04L9/32H04L12/02
Inventor 王永刚吴继力
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products