Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

67 results about "Password synchronization" patented technology

Password synchronization is a process, usually supported by software such as password managers, through which a user maintains a single password across multiple IT systems. Provided that all the systems enforce mutually-compatible password standards (e.g. concerning minimum and maximum password length, supported characters, etc.), the user can choose a new password at any time and deploy the same password on his or her own login accounts across multiple, linked systems.

User behavior counting method for power scheduling automatic system based on log

The invention discloses a user behavior counting method for a power scheduling automatic system based on a log. The user behavior counting method comprises the following steps: triggering a synchronous procedure at a special moment or a time interval, visiting data in a database list of the power scheduling automatic system according to a time field, storing the data into a local log analysis table, connecting the local log analysis table to a work station of the power scheduling automatic system through a remote logging interface, comparing and analyzing a file edition and content according to a work station address, a user name, a password, a synchronous interval and the like to form an operation log; trimming and extracting the user operation log, returning the file operation log to the server through a ftp protocol, storing the file operation log to a local log analysis table, adopting a Lucene engine to establish full-text index for the database and the file log, performing keyword analysis through a Chinese word segmentation algorithm, and providing user operation behavior counting and application using condition analysis. The user behavior counting method has the advantages of realizing collecting, extracting, recording and analyzing of user operation log for electric scheduling automation.
Owner:STATE GRID CORP OF CHINA +1

Safety communication method suitable for remote control with limited capability at controlled end

The invention discloses a safety communication method suitable for remote control with a limited capability at a controlled end. The method comprises the following steps of: setting password sets at a control end and the controlled end and generating a password set according to an input initialization password by an irreversible method, wherein the password set comprises an index number and the password per se and encryption and decryption are performed by using the password corresponding to the recorded index number in a normal communication process; when the password is asynchronous, transmitting the index number by encrypting to perform password synchronization; and when a password set updating condition is met, negotiating about the update of the password set by transmitting a selected index number. A password set generating device for calculating the password set and communicating with the controlled end only when the password set is needed to be generated is arranged at the controlled end. Various attacks are resisted effectively by using a dynamic password and operation of real-time password calculation needed by the transmission of each data packet is avoided. Simultaneously, the password per se does not need to be transmitted on a communication link in password synchronizing and password set updating processes, so that simpleness and safety are realized.
Owner:SOUTH CHINA UNIV OF TECH

Method for reduced signon, using password synchronization instead of a credential database and scripts

A method for reducing the number of times that a user must type his own login ID or password into various systems that require authentication is disclosed. The method comprises the steps of: 1. A user signs into his workstation, using a standard login ID and current network password. 2. A plugin program, inserted into the workstation operating system's login subsystem, captures the user's login ID and password. 3. In environments where this is either not technically possible or where insertion of such a plugin program is infeasible, once the user has completed the initial workstation login, a secondary login prompt is displayed, asking the user to re-enter his current network password. 4. A second operating system plugin program is launched, which monitors all user interface activity—keystrokes and pointer events representing user input, processes that are executed, and windows and data fields activated on the workstation's display(s). 5. The monitor plugin compares the values entered by the user into data fields to the login ID and password captured in step 2 or 3. Where a new match is found, identifying characteristics of the data field, such as window ID, window title, field ID, field name, field position within the window and process ID, are stored in a data file, an operating system configuration database, or some other database. 6. The monitor plugin compares the data fields displayed on the workstation to a list of already known data fields in storage. If a data field is displayed that matches one whose characteristics have already been captured in storage, the login ID or password that were intercepted in step 2 or step 3 are automatically inserted into that data field, as appropriate. The present invention provides a method for reduced signon, whereby the number of separate instances where a user must provide his own login credentials is reduced, possibly to a single set of ID/password per workstation login session. This method improves the level of service offered by an IT organization to its users, as it saves time and effort for those users.
Owner:M TECH INFORMATION TECH

Examination paper secrecy system capable of synchronously controlling physical identification password and biological characteristic identification password and method thereof

InactiveCN105069340AIncrease the difficulty of being crackedIncrease the difficulty of crackingDigital data authenticationPasswordComputer science
The invention discloses an examination paper secrecy system capable of synchronously controlling a physical identification password and a biological characteristic identification password. The system is mainly composed of a physical identification password sampling module, a biological characteristic identification password sampling module, a synchronization identification processing module, a password data processing centre and a multi-mode dominant synchronization identification coded lock module. The system of the invention greatly increases the difficulty that the password is broken by using a united mode of physical recognition and biometric feature recognition, and a manner that one person simultaneously recognizes the password. Simultaneously, the system enables an illegal person who does not know and is not similar the operation program hard or not to open a secrecy cabinet by synchronizing the control program; then a leading synchronization recognition mode enable three leading passwords to disorder the original password after being matched with a reference code so as to improve the difficulty of breaking the password, and the password is carried by a user so as to used on site, so the password is hard to forge or to be stolen so as to enable the secret password of a examination paper secrecy cabinet to have stability and anti-falsification.
Owner:YULIN NORMAL UNIVERSITY

Interactive anti-counterfeiting authentication method and intelligent anti-counterfeiting label

The invention discloses an interactive anti-counterfeiting authentication method which comprises an anti-counterfeiting label, anti-counterfeiting authentication equipment and an anti-counterfeiting server, wherein the anti-counterfeiting label comprises a microprocessor unit which can execute an anti-counterfeiting authentication logic; and the anti-counterfeiting label and the anti-counterfeiting server conduct interactive authentication based on passwords and a one-way encryption algorithm with the help of the anti-counterfeiting authentication equipment, and synchronize and update the passwords simultaneously. An intelligent anti-counterfeiting label which is applicable to the interactive anti-counterfeiting authentication method comprises the microprocessor unit, and the intelligent anti-counterfeiting label includes an anti-counterfeiting logic and adopts an easily destroyed package, is connected with a cassette plug which meets the standard of a storage card interface, defined by the SD (Secure Digital) association, through a flexible connecting part, is connected with the anti-counterfeiting authentication equipment through the cassette plug, is powered by the anti-counterfeiting authentication equipment, and interacts with the anti-counterfeiting authentication equipment through an analog expanded memory card or SDIO (secure digital input / output) equipment. The interactive anti-counterfeiting authentication method is applicable to the anti-counterfeiting identification field, has a reasonable cost compared with an anti-counterfeiting subject matter with certain value, has the advantages of usability, accuracy and safety, and supports multiple authentications.
Owner:赵晓宇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products