Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

139 results about "Password cracking" patented technology

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force attack) is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password.

Radio communication device and user authentication method for use therewith

ActiveUS6928166B2Imposing any operating burdenLevel of security can changeMultiple keys/algorithms usageUser identity/authority verificationConfidentialityUser authentication
To allow flexible security level switching according communication situations, a password holding section holds a plurality of device authentication passwords, for example, a temporary password and a private password. The temporary password is valid only under a certain situation and the private password has a high level of confidentiality to increase the device security. A password management section allows the user to add a new password to the password holding section and delete an existing password therefrom. A password selecting section selects the most suitable password for current connection from among passwords in the password holding section according to a user event, information acquired by an external factor acquisition section, and information from a time control section. The selected password is output to a password checking section.
Owner:2BCOM LLC

Weak password verification and cracking method and device

The invention provides a weak password verification and cracking method and device; the method and device can realize central management and optimize a weak password dictionary, thus reducing weak password verification time, improving weak password discovering ability, and improving weak password cracking efficiency; the weak password verification method comprises the following steps: obtaining a use equipment UE password; if the obtained password is a cleartext password, determining whether the obtained password as a weak password or not according to a preset weak password definition; if the obtained password is a weak password and the password is not in the preset weak password dictionary, adding the password into the weak password dictionary.
Owner:中国移动通信集团广西有限公司

Data protection device and method, and storage controller

The invention discloses a data protection device, a data protection method and a storage controller and relates to the technical field of data protection. The device comprises an encryption unit and a decryption unit, wherein the encryption unit is used for receiving first data of a to-be-written storage module and first storage address information and encrypting the first data based on the first storage address information and characteristic information of a storage module; and the decryption unit is used for reading second data corresponding to second storage address information from the storage module and decrypting the second data based on the second storage address information and the characteristic information. According to the data protection device, the data protection method and the storage controller, write data and read data are encrypted and decrypted based on a storage address and the characteristic information of the storage module, the security of data in the storage module can be improved; after the storage module executes an erasure operation, the read data do not carry information of a decrypted module, the password cracking difficulty can be effectively increased, the content protection is realized; and the data protection device and the data protection method are high in reliability and wide in application range.
Owner:GREE ELECTRIC APPLIANCES INC

Elliptic curve anti-bypass attack method based on randomizing multiplication with symbol scalar

InactiveCN101197668AImprove securityImproving the ability to defend against power consumption attacksPublic key for secure communicationComputations using residue arithmeticPassword crackingSide channel attack
The invention belongs to the information security technical field and provides an elliptical curve bypass attack-proof method based on the randomization tape symbol scalar multiplication. The elliptical curve bypass attack-proof method based on the randomization tape symbol scalar multiplication of the invention comprises the following steps that: firstly, a key in binary system is represented to be a randomization tape symbol binary number; secondly, a finite state machine for realizing the randomization tape symbol scalar product is obtained basing on a randomization addition and subtraction chains of the elliptical curve scalar product; finally, the elliptical curve scalar production operation is completed basing on the finite state machine and the improvement of the ability of the elliptical curve cryptograph to resist the bypass attack is realized. The invention which improves the security of the realization of the method can be applicable to the fields such as the cryptograph theory, the password cracking, the security chip design and the smart card design.
Owner:SHANGHAI JIAO TONG UNIV

DNA coding based encryption system and encryption method

The invention belongs to the technical field of information security in communication transmission, and particularly relates to a DNA encryption system and an encryption method. The system comprises an encryption key, an information conversion portion, an information encryption portion, an information transmission portion, a decryption key and an information decryption portion, wherein the encryption key and the decryption key are primer sequences; and information encryption refers to that information is converted and coded and then corresponds to A, T, C, G bases in DNA in a one-to-one mode according to a predetermined rule. The encryption system and the encryption method provided by the invention can realize automatic operation of corresponding code conversion, encryption and decryption by depending on biological problem setting and biological technology development and by being matched with development of corresponding computer information technologies at the same time, have the characteristics of good compatibility with other encryption methods, high automation degree, simple key, high password cracking difficulty, safer information transmission and the like, has good application values, and can provide better reference for other new encryption systems at the same time.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

AES parallel implementation method based on OpenCL

The invention discloses an AES parallel implementation method based on OpenCL. According to the scheme, when an AES performs parallel running on an AMD GPU based on OpenCL, optimum performance can be achieved. The method includes the following steps that first, the number of plaintext / ciphertext and the number of round key groups are determined, and plaintext / ciphertext and round key data are prepared; second, an executing mode of the AES is determined, and preparation is made for writing of a KiReadyThread; third, the KiReadyThread is written; fourth, a master OpenCL program file is written, and preparation is made for execution of an OpenCL program; fifth, program running parameters are set, memory space is allocated, and the program runs; sixth, the encryption and decryption result is acquired, and resources are released. According to the method, in parallel running process of the AES, data are reasonably allocated in a memory and parallel granularity is reasonably selected so that running performance can be improved, and the method can be used for fast encryption and decryption or password cracking machines.
Owner:SOUTH CHINA NORMAL UNIVERSITY

WPA shared key cracking system based on GPU cluster

The invention relates to the technical field of password cracking, and discloses a WPA shared key cracking system based on a GPU cluster. The WPA shared key cracking system based on the GPU cluster specifically comprises a control node and a plurality of GPU computational nodes. The control node intercepts and obtains a WPA data package, a characteristic value extracting module extracts cracking characteristic values, and a user interaction module of the control node receives a password cracking range defined by a user; a password space partition module partitions password sections of certain ranges to all GPU computational nodes, and sends the password sections to all the corresponding GPU computational nodes; the GPU computational nodes calculate and obtain temporary verification parameters MIC_TMP, a breaking password passphrase is regarded as the shared key when the temporary verification parameters MIC_TMP are identical with a verification parameter MIC value, and password cracking is completed. According to the WPA shared key cracking system based on the GPU cluster, the GPU cluster is adopted to crack a password of a WPA / WPA2-PSK, multi-node GPU clusters are supported, expansion can be carried out properly according to needs, and cracking performance is improved well. Meanwhile, oriented to the heterogeneous characteristic of the GPU clusters, a reliable task dispatching system is designed, load balancing is achieved, and cracking speed is improved.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

User authentication method and device

The application relates to a computer technology, and discloses a user authentication method and device aiming at ensuring the accuracy of authentication while reducing the operation complexity of a verification process. The method comprises the following step: a user authentication device real-timely collects and stores a plurality of user behavior data of a first user through a plurality of sensors, separately generates corresponding user characteristic information based on two segments of user behavior data with different storage time, and then matches the two pieces of user characteristic information, and judges that the user is successfully authenticated when a successful match is determined. Thereby, according to a method for authenticating the user by using the user characteristic information extracted based on the user behavior data, the information leakage can be effectively avoided, the difficulty of password cracking can be increased, the possibility of stealing or copying passwords by third parties can be effectively reduced, the accuracy of authentication can be ensured, and the security of the system can be enhanced.
Owner:ALIBABA GRP HLDG LTD

Password lock unlocking method, system and server, equipment and password lock

The invention provides a password lock unlocking method, system and server, equipment and a password lock. The server comprises a receiving module, a synchronization time module, a password generatorand a transmission module, wherein the receiving module is used for receiving an unlocking request; the synchronization time module is used for acquiring synchronization time of time synchronization with a password generator in the password lock; the password generator is used for generating a random password according to the unlocking request and the synchronization time; and the transmission module is used for sending a random password to a mobile terminal. The password lock comprises a lock body, a password generator, a password receiving module, a password comparator and an unlocking control module, wherein the password generator is used for synchronously generating a random password identical to the random password generated in the server; the password receiving module is used for receiving an input unlocking password; the password comparator is used for comparing whether the received unlocking password is identical to the generated random password or not; and the unlocking control module is used for controlling the lock body to be opened or keep closed. Through adoption of the password lock unlocking method, system and server, a series of network problems caused by unlockingby means of network communication are solved, and the risk of password reusing and equipment password cracking is also avoided.
Owner:上海幸卓智能科技有限公司

Password guessing set generating method and password cracking method based on user name information

The invention discloses a password guessing set generating method and a password cracking method based on user name information. The password cracking method comprises the steps of: 1) labelling user names and passwords of a data training set leaked according to word segmentations and semantic structures, calculating the semantic similarity of the user names and passwords, wherein the semantic similarity comprises semantic structure similarity and semantic portion similarity; 2) applying the semantic similarity to PCFGs grammar, in another word, PCFGs grammar is built based on the semantic similarity; 3) building PCFGs grammar according to step 2), generating a password guessing set according to the probability of descending; 4) cracking the password according to the password guessing set. The password guessing set generating method and password cracking method have the advantages of utilizing the portion similarity and the structure similarity of the usernames and passwords, understanding the constitution semantic of the password, generating the password guessing set, and improving the password cracking efficiency.
Owner:INST OF INFORMATION ENG CAS

System for cracking and restoring iPhone encrypted backup files

The invention provides a system for cracking and restoring iPhone encrypted backup files. The system comprises a graphical user interface (GUI) module, a password cracking module, a backup file restoring module and a keychain checking module. The GUI module is used for interactive operation between a user and a device; the password cracking module is connected with the GUI module and used for cracking encrypted files to obtain cracking passwords; the backup file restoring module receives the cracking passwords to restore encrypted backup files; and the keychain checking module receives the cracking passwords to check data stored in the keychain. According to the system for cracking and restoring encrypted backup files, the iPhone encrypted backup files are restored directly through the encrypted passwords, so that data in the iPhone are obtained, and the inside of existing mobile phone forensic systems can be integrated, and evidence obtaining and case detecting of office departments are facilitated.
Owner:RUN TECH CO LTD BEIJING

Data transmission encryption method and device, storage medium and server

The invention relates to the technical fields of cryptography, information encryption and decryption and symmetric encryption, and provides a data transmission encryption method, which comprises the following steps of: obtaining a current data storage request, and generating a first token and a first random bit according to the current data storage request; Extracting to-be-stored data contained in the current data storage request, and performing AES encryption on the to-be-stored data based on the first token and the first random bit to obtain a first key; And performing md5 encryption on thefirst key to obtain a ciphertext data packet. When the front end receives the data storage request once, the data needing to be transmitted at the time is encrypted and transmitted to the rear end, the rear end verifies the password of the data transmission, and when the password is incorrect, the rear end refuses the data storage request at the time. And the front end dynamically generates the password through the AES every time, so that the security of data transmission is improved. And through the AES cryptographic algorithm, the adjustment is convenient, the password cracking difficulty is increased, and the data transmission security is improved again.
Owner:PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products