Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

149 results about "Password strength" patented technology

Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.

Unified password prompt of a computer system

A computer system provides a unified password prompt for accepting a user power-on password or an administrator password. A password string entered by the system administrator at the unified password prompt is compared with a stored power-on password. If the user password string matches the stored power-on password, then access to system resources is granted. If the user password string does not match the stored power-on password, then the user password string is compared to a stored administrator password. If the user password string matches the stored administrative password, then access to system resources is granted. If the user password string does not match the stored administrative password, then the system administrator is given a predetermined number of times to enter a password string matching either the stored power-on password or the stored administrator password. If a password string matching either the stored power-on password or the stored administrator password is not provided in the predetermined number of times, access to system resources is denied. The unified password prompt does not require a system administrator to know a user's power-on password in order to access system resources. The unified password prompt also permits a system administrator to configure a plurality of computer systems by providing a single administrative password rather than a plurality of user power-on passwords.
Owner:HEWLETT PACKARD CO

Facilitating single sign-on by using authenticated code to access a password store

One embodiment of the present invention provides a system that facilitates accessing to a plurality of applications that require passwords. When the system receives a request for a password from an application running on a remote computer system, the system first authenticates the request to ensure that it originated from a trusted source. Next, the system uses an identifier for the application to look up the password for the application in a password store, which contains passwords associated with the plurality of applications. If the password exists in the password store, the system sends the password or a function of the password to the application on the remote computer system. Hence, the system creates the illusion that there is a single sign on to a large number of applications, whereas in reality the system automatically provides different passwords to the applications as they are requested. In one embodiment of the present invention, the request for the password includes computer code that when run on the local computer system requests the password on behalf of the application on the remote computer system. In a variation on this embodiment, the computer code is in the form of a JAVA™ applet that runs on a JAVA™ virtual machine on the local computer system. In one embodiment of the present invention, the JAVA™ applet is a signed JAVA™ applet, and authenticating the request involves authenticating the JAVA™ applet's certificate chain.
Owner:ORACLE INT CORP

Communication method and system based on quantum Ukey

The invention discloses a communication method and system based on the quantum Ukey, aiming to solve the potential safety hazards that the algorithm is not safe, the user password strength is not highenough, the user password plaintext input, secret key distribution and management are difficult, and the secret key cannot be automatically updated in the aspects of current identity authentication and security access cloud service application. The communication method based on the quantum Ukey comprises the following steps that when an access application service instruction is acquired, a user terminal determines a first quantum key by the quantum Ukey established the connection relation, and sending the corresponding authentication message to an authentication management platform for identity authentication; the authentication management platform obtains a second quantum key from the KMS according to the authentication message, and decrypting the encrypted information in the authentication message, if the decrypted information is consistent with the plaintext information in the authentication message, the identity authentication is determined to pass, and the passing information isreturned to the user terminal, so that the user terminal accesses the application server through the first quantum key.
Owner:QUANTUMCTEK GUANGDONG CO LTD

Password strength evaluation method based on personal information

The invention discloses a password strength evaluation method based on personal information. The method comprises the following steps that: when a user registers website service, collecting the influence factor field of personal information used for user password construction; independently carrying out classification on the influence factor field, and carrying out tagging processing on the influence factor field according to a practical transformation form; when the user inputs the password, according to an extracted and collected user information influence factor, calculating a coverage degree value which contains the personal information in the influence factor field in the password constructed by a current user, and combining the coverage value with a traditional heuristic method and pattern detection method to calculate a password strength value; and selecting a maximum threshold value which permits to contain the personal identification information in an acceptance password by a target website as an acceptance measurement index of the password strength. The invention puts forward the password strength evaluation method in which a personal identification information measurement factor is added. The method has the characteristics that the password strength value is instantly and effectively fed back, and an influence factor is plug and play and can be easily selected, and a user is assisted in selecting the password with a higher safety degree.
Owner:EAST CHINA NORMAL UNIV

Fingerprint dynamic password ID authentication device and the implementation method thereof

The invention aims to provide a fingerprint dynamic password ID authentication device and the implementation method thereof, which can effectively address the problems of equipment steal, insufficient cryptographic strength, inreversible generated dynamic passwords, lower security, great system consumption and the like in the ID authentication field. The equipment related to by the invention comprises a fingerprint chip, a fingerprint sensor, a dynamic password chip, a display, a storage medium, a power supply, a recharging interface and a control circuit; wherein, the control circuit is respectively connected with the fingerprint chip, fingerprint sensor, dynamic password chip, display, storage medium, power supply and recharging interface. The fingerprint dynamic password ID authentication device has the advantages that the fingerprint dynamic password ID authentication device can employ double authentications, namely authenticating a user's right to use a device through the user fingerprint and then authenticating the user's right to perform operations on a terminal through a dynamic password generated by the device, to ensure the user authentication device can be only used by the user himself and the authentication information is not stolen, thus sufficiently ensuring the security of the user account and rights.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Safety communication method suitable for remote control with limited capability at controlled end

The invention discloses a safety communication method suitable for remote control with a limited capability at a controlled end. The method comprises the following steps of: setting password sets at a control end and the controlled end and generating a password set according to an input initialization password by an irreversible method, wherein the password set comprises an index number and the password per se and encryption and decryption are performed by using the password corresponding to the recorded index number in a normal communication process; when the password is asynchronous, transmitting the index number by encrypting to perform password synchronization; and when a password set updating condition is met, negotiating about the update of the password set by transmitting a selected index number. A password set generating device for calculating the password set and communicating with the controlled end only when the password set is needed to be generated is arranged at the controlled end. Various attacks are resisted effectively by using a dynamic password and operation of real-time password calculation needed by the transmission of each data packet is avoided. Simultaneously, the password per se does not need to be transmitted on a communication link in password synchronizing and password set updating processes, so that simpleness and safety are realized.
Owner:SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products