Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A non-storage password management algorithm

A password management and non-storage technology, which is applied in the direction of encryption devices with shift registers/memory, etc., to reduce the risk of password deciphering, reduce the risk, and reduce the risk of leakage

Active Publication Date: 2017-06-06
CHENGDU XISHANJU INTERACTIVE ENTERTAINMENT TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In other words, although a hacker cannot obtain a specific user's password, he can know who is using a specific password, and there is still a great risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A non-storage password management algorithm
  • A non-storage password management algorithm
  • A non-storage password management algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The "seasoning" of salt is a random number added when hashing (hash algorithm) the password. The basic idea is this: when a user provides a password for the first time (usually when registering), the system automatically sprinkles some "seasoning" into this password, and then hashes it. When the user logs in, the system sprinkles the same "seasoning" on the code provided by the user, then hashes it, and compares the hashed values ​​to determine whether the password is correct. Because the salt value is randomly generated by the system, even if two users use the same password, their hash values ​​are different, and the chance of hackers finding out the password is greatly reduced (the password and the hash value generated by themselves must be the same The same user, this probability is very low). The technical solution of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but the protected conte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a non-storage password management algorithm, which includes the following steps: S1: when the user registers, the background server records the user's encryption key, domain name, password format and generates a salt value for the user; S2: user key + domain name + Password format + salt value for md5 encryption; S3: shift the encrypted value and intercept it in 3 segments; S4: custom character dictionary, number dictionary and symbol dictionary; S5: intercept S3 according to the number of digits of the password required by the user The obtained encrypted string is matched with the dictionary defined in S4 to obtain the password; S6: When the user logs in again, log in to the password generation website, enter the key, domain name and password format, and the background server repeats S1-S5 to obtain the password. The entire password encryption algorithm of the present invention is irreversible and can reduce the risk of password being cracked. Users only need to memorize one KEY to manage countless passwords, which is convenient to use and has low risk.

Description

technical field [0001] The invention relates to a password management algorithm, in particular to a non-storage password management algorithm. Background technique [0002] How to manage our more and more passwords is an issue that Internet users pay more and more attention to. Everyone may have the feeling that they don’t like to remember too many passwords, so most websites or applications use the same password. For example Taobao, Jingdong, QQ and so on. Many people have no awareness of password security, and all websites have the same password. If one password is used for all applications and any one is stolen, the hacker can not only enter the mailbox, but also enter instant chat systems such as QQ, MSN, and even Taobao, JD.com, Alipay, and WeChat. These information will be obtained, thereby gaining more This is why there are so many cases of using QQ to defraud relatives and friends, causing many irreparable losses to users. [0003] Therefore, for account security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 熊方磊
Owner CHENGDU XISHANJU INTERACTIVE ENTERTAINMENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products