Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

57 results about "Default password" patented technology

Where a device needs a username and/or password to log in, a default password is usually provided that allows the device to be accessed during its initial setup, or after resetting to factory defaults.

Method for quickly spreading registration among broad community of users in network system

InactiveCN101697538AAvoid randomnessImprove login success rateTransmissionNetworked systemUser identifier
The invention discloses a method for quickly spreading registration among a broad community of users in a network system, which comprises that: registered users of the network system select a recommended mode and transmit recommended information to contact persons; after receiving the information, the contact persons download and install the system; the system automatically takes information receiving IDs of the contact persons as accounts and allocates default passwords; and the contact persons can log in the system instantly when clicking OK. In the method, the quick spreading of registration is realized through trust determined among the users and the contact persons in address lists of the users and the registration steps are simple; the IDs of the users receiving the information are automatically taken as the login IDs, which avoids the registration randomness of the users and improves the success ratio of the login of the users; when recommending the contact persons, the registered users can select a partially-recommending mode and a fully-recommending mode and also can select whether the users and the recommended contact persons are friends or not, and then the contact persons accept the recommendation according to the mode and can see a friend list after the login, thus the contact persons are avoided from adding the friends one by one; and when the IDs of the users are changed, histories of the old IDs can be synchronized to new IDs, thus user viscosity is improved.
Owner:SHENZHEN TEMOBI SCI &TECH

Mobile phone with enciphered short message, conversation recording and telephone directory menu

A mobile telephone with encrypted menu of short message and message registration and telephone book, in which the system module is composed of a ULYSSE17UBGA circuit connected with a KSA3240VTA memory, comprises a keyboard for input setting-safety detecting-protecting, a setting program for inputting default password when it doesn't need to encrypt, a program for inputting menu options of the short message and message registration and telephone book when need to encrypt, a program for inputting updating or not updating the password, an inputting confirming program when not need to update, a program for inputting a new password and confirming the new password when need to update the password, a program for inputting requested password for entering the menu of setting and confirming the password.
Owner:HAIER GRP CORP +1

Encryption method and system based on white box

The invention discloses an encryption method and system based on a white box. The method comprises the following steps: S100, an application terminal acquires characters input by a user, and implements encryption combination on the characters and white box seeds in accordance with a preset character encryption algorithm and a preset acquisition sequence to obtain a combined password; S200, the application terminal implements encryption operation on the combined password according to a preset password encryption algorithm to obtain an encrypted ciphertext; and S300, a server decrypts the encrypted ciphertext to obtain a user default password. According to the encryption method and system disclosed by the invention, the characters input by the user can be obtained by clicking or touching a software simulation keyboard through a mouse, a white box cryptography is applied to a password keyboard of the application terminal to enable that the characters input by the user are firstly separately encrypted and then integrally encrypted, so that the way of obtaining the password through brute force can be better prevented.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Systems and methods for dynamically adjusting a password attempt threshold

A system for dynamically adjusting a default password attempt threshold is provided. The system includes a server for storing the digital account, and a dynamic password computing device for controlling access to the server. The dynamic password computing device is configured to receive an access request from a user using a first user device for accessing the digital account wherein the access request includes first user device data elements and an account ID, retrieve a historical account profile of the user that includes user device data elements for one or more user devices used by the user to access the digital account, compare the first user device elements from the access request to the historical account profile of the user, determine a likelihood that the user submitting the access request is a legitimate account holder, and adjust the default password attempt threshold stored within the memory based on the determination.
Owner:MASTERCARD INT INC

Method, device and system for resetting password of network monitoring equipment, server and network monitoring equipment

The invention discloses a method, device and system for resetting a password of network monitoring equipment, a server and network monitoring equipment. The method for resetting the password of the network monitoring equipment comprises the steps of: according to encrypted contents, generating a first feature code; sending the first feature code to the server; receiving a password resetting command from the server and a reset password from a client, wherein after the server receives the first feature code, the first feature code is encrypted by adopting a first secret key to obtain the password resetting command, and the password resetting command is returned; and decrypting the password resetting command by adopting a second secret key, and resetting the password of the network monitoring equipment by utilizing the reset password, wherein the first secret key and the second secret key are a pair of secret keys in an asymmetric cryptographic algorithm. By the method, device and system for resetting the password of the network monitoring equipment, the server and the network monitoring equipment which are disclosed by the invention, the problem of low security in the process of recovering a default password and resetting the password in the prior art is solved, so that an effect of improving security of the network monitoring equipment is achieved.
Owner:HANGZHOU HIKVISION DIGITAL TECH

Account protection method and device

The invention provides an account protection method. The method comprises the steps that an account restriction request which is sent by the login client of a first account for a second account is received, wherein the first account is a trust account associated with the second account; the account restriction request carries a default password for restricting the second account; the default password is verified; after the default password is verified, the second account is restricted to protect the second account. According to the invention, when the account of a user is abnormal, the current account can be quickly restricted by the trust account of the third party; and the security of the account can be enhanced.
Owner:ADVANCED NEW TECH CO LTD

Network access authentication method and system based on quantum key

The application discloses a network access authentication method based on a quantum key. The method includes the following steps: enabling a management platform to receive a user password sent by a terminal; determining whether the user password is consistent with a default password, wherein the default password is a password generated according to a quantum key that is obtained by the managementplatform and a password distribution node by using a QKD protocol; and if yes, allowing the terminal to access the network. According to the technical scheme provided by the application, the default password is generated according to the quantum key that is obtained by the management platform and the password distribution node by using the QKD protocol, since the quantum key has absolute securityand cannot be duplicated, the default password generated according to the quantum key can also have absolute security, and the security of network access authentication can be greatly improved. The application also provides a network access authentication system based on the quantum key, a server and a computer readable storage medium, which have the above beneficial effects.
Owner:KEHUA DATA CO LTD

Asymmetric-algorithm-based certificate medium online-formatting and unlocking methods

The invention discloses an asymmetric-algorithm-based certificate medium online-formatting method and an asymmetric-algorithm-based certificate medium online-locking method. The formatting method comprises the following steps that a medium management interface generates a one-time random code R1 and a medium sequence number KSN, a server acquires a corresponding management password SOPIN1 of a medium according to the KSN, performs encryption and signature, and transmits a result to a client, and the client verifies and decrypts the result to finish formatting. The unlocking method comprises the following steps that the medium management interface acquires a signed certificate sequence number SN and the medium sequence number KSN, and generates a one-time random code R3; the server acquires the management password SOPIN1 by using the KSN, encrypts and signs received data, and transmits the data to the client; the medium management interface performs signature verification and decryption, compares a decryption result, and resets a user password to be a default password if the one-time random code R3 is the same as the decryption result. According to the methods, the password security of the certificate medium can be ensured in large-scale public key infrastructures.
Owner:KOAL SOFTWARE CO LTD

Lock

The invention discloses a lock. The lock comprises a control mainboard, a motherboard, a son-board, a fingerprint recognition module, a driving component and a locking head. The control mainboard stores a default password and fingerprint information. The son-board is rotationally arranged on the motherboard. When a second induction component on the son-board is matched with one of first inductioncomponents on the motherboard, the control mainboard can receive password numbers corresponding to the first induction component and compares the password numbers with the default password, and can receive a fingerprint recognized by the fingerprint recognition module and compares the fingerprint with the fingerprint information. The control mainboard can control the driving component to drive thelocking head to move so that the lock can be switched between an unlocked state and a locked state. The control mainboard is configured to control the son-board to be switched to a rotating state from a locked state when the received fingerprint is matched with the fingerprint information and to control the driving component to drive the locking head to move when the multiple input password numbers are matched with the default password so that the lock can be switched to the unlocked state. The lock provided by the invention is low in manufacturing cost and high in intelligence level and meets current market requirements.
Owner:BYD SEMICON CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products