Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

60 results about "Password policy" patented technology

A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of security awareness training. Either the password policy is merely advisory, or the computer systems force users to comply with it. Some governments have national authentication frameworks that define requirements for user authentication to government services, including requirements for passwords.

Privileged account manager, access management

Techniques for managing accounts are provided. An access management system may check out credentials for accessing target systems. For example a user may receive a password for a period of time or until checked back in. Access to the target system may be logged during this time. Upon the password being checked in, a security account may modify the password so that the user may not log back in without checking out a new password. Additionally, in some examples, password policies for the security account may be managed. As such, when a password policy changes, the security account password may be dynamically updated. Additionally, in some examples, hierarchical viewing perspectives may be determined and / or selected for visualizing one or more managed accounts. Further, accounts may be organized into groups based on roles, and grants for the accounts may be dynamically updated as changes occur or new accounts are managed.
Owner:ORACLE INT CORP

Privileged account manager, dynamic policy engine

Techniques for managing accounts are provided. An access management system may check out credentials for accessing target systems. For example a user may receive a password for a period of time or until checked back in. Access to the target system may be logged during this time. Upon the password being checked in, a security account may modify the password so that the user may not log back in without checking out a new password. Additionally, in some examples, password policies for the security account may be managed. As such, when a password policy changes, the security account password may be dynamically updated. Additionally, in some examples, hierarchical viewing perspectives may be determined and / or selected for visualizing one or more managed accounts. Further, accounts may be organized into groups based on roles, and grants for the accounts may be dynamically updated as changes occur or new accounts are managed.
Owner:ORACLE INT CORP

Method for dynamically setting password by setting graphic per se in grid digital array

InactiveCN102148826AKeep your password safePrevent surprise attackUser identity/authority verificationDigital data authenticationGraphicsPassword policy
The invention provides a method for dynamically setting a password by setting a graphic per se in a grid digital array. The method comprises the following steps of: setting the graphic, a counting point and a password point per se in the grid array with abscissas and ordinates, setting a positioning point and reference point arrangement sequence per se in the graphic, simultaneously performing password counting in any one of the eight directions of the grid digital array, transmitting a counted password into a computer server and storing the password as a graphic password; and moving the self-set graphic into the grid digital array with the abscissas and the ordinates, obtaining an abscissa and ordinate point and the password point in the moved graphic according to the self-set counting point, and obtaining the password every time the graphic is moved until meeting the requirement of a network on password digits to dynamically finish password login by the easily-remembered graphic capable of preventing the password from being detected. By the method for dynamically obtaining the password and finishing the login, even though the graphic is the same, the same password cannot be obtained due to different graphic positioning points, different counting points and different password points. Therefore, the password security of a user can be greatly and effectively protected, and sudden attacks from bogusware such as Trojan and the like, and different kinds of snooping and harassing attacks in front of automatic teller machines are prevented; and the method is easy to remember and operate, and highly preventive.
Owner:王颢

System for amending single point password

The invention discloses a one-point password modifying system. The system comprises two modules of a password strategy module and a password modifying module. The password strategy module defines the validity period of the password, and modifies the interface visit address. The password modifying module reminds the user to modify the password when the validity period of the password is expired, and a new password is automatically generated. The prior password and the new password are filled into the corresponding domain in the modification interface of the password. If other information which needs the user to fill manually does not exist in the modification interface of the password, the password modifying module can automatically finish the password modification, or else, the user is reminded to continue to finish the modification work of the password.
Owner:吴琛

Monitoring and alert services and data encryption management

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources. The services may include managing application policies, cryptographic policies, and encryption objects related to applications. The encryption objects may include encryption keys and certificates used to secure the resources. In an embodiment, the data encryption service may be included or implemented in a cloud computing environment and may provide a centralized framework for effectively managing the data encryption requirements of various applications hosted or provided by different customer systems. The disclosed data encryption service may provide monitoring and alert services related to encryption objects managed by the data encryption service and transmit the alerts related to the encryption objects via various communication channels.
Owner:ORACLE INT CORP

Identity authentication processing method and device, electronic equipment and storage medium

The invention provides an identity authentication processing method and device, electronic equipment and a storage medium. The method comprises the following steps: acquiring identity information submitted by a client; determining a target password strategy for verifying the identity information in a plurality of password strategies; authorizing the client to log in a third-party application basedon the identity information when the identity authentication of the identity information based on the target password strategy is passed, and allocating an operation authority after the login of thethird-party application to the client based on the security classification corresponding to the target password strategy; and based on the operation authority, controlling the operation of the clientafter logging in the third-party application. According to the method and the device, the operation experience and the identity authentication efficiency of the user can be improved while the safety is ensured.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Password setting method and device

InactiveCN105809024ASolve the problem that the password policy is too singleDigital data authenticationPassword policyPassword
The present invention provides a password setting method and device, wherein the method includes: searching for the password policy group to which the user belongs according to the preset corresponding relationship, wherein the corresponding relationship is used to indicate the user's corresponding Correspondence of password policy groups, where the password policy groups correspond to one or more users; according to the password policy groups indicated by the search results, password policies corresponding to the password policy groups are set for users. The above-mentioned technical solution provided by the present invention solves the problem in the related art that the user password policies in the same information system are too single, and different levels of user password policies can be set for different levels of users.
Owner:航天信息软件技术有限公司

Anonymous revocation ring signature based on public chain and generation and revocation method of anonymous revocation ring signature

The invention discloses an anonymous revocation ring signature based on a public chain and a generation and revocation method of the anonymous revocation ring signature, relating to the technical field of network security, the ring signature comprises a self-proving-based ring signature generation module and an anonymous identity cancellation module; the self-proving-based ring signature generation module comprises a key generation unit, a self-proving generation unit, a self-proving verification unit and a parallelizable ring signature generation unit, and the anonymous identity revocation module comprises a revocation initialization unit, a revocation initiation unit, a revocation judgment unit and a revocation effectiveness judgment unit. According to the invention, a ring signature parallel computing method based on cloud computing, an anonymous voting method based on ring signatures and a threshold password strategy are comprehensively used to realize efficient generation of ringsignatures of users on a public chain, conditional revocation of anonymous identities and security, fairness and credibility of a revocation process, so that the network security is improved.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Password input device and method

The invention provides a password input device and a method, comprising a device of the electrical brain stimulation which provides a plurality of the visual stimuli of the different fixed frequencies; an electroencephalographic signal acquisition device collecting the EEG signal of the user through a lead, wherein the EEG signal is generated by which the user choose a gaze from a plurality of the visual stimuli of the different fixed frequencies according to the password and the password strategy; an input device connected with the EEG signal acquisition device which the steady - state visual is extracted to evoke the potential characteristics from the EEG signal, then is converted into the password and is transmitted to the encryption device. And the password strategy comprises the relationship between the password and the visual stimuli of a plurality of the different fixed frequencies. The password input device and the method are the encrypted input method for with a new bio-metric feature compared with a conventional password input mode, which utilizes the SSVP as the encryption means to remove the actual cryptographic input operation. The password input device and the method improve the security of the password input and require no training with the high recognition correctness and the wide range of the applicable population.
Owner:TONGJI UNIV

Systems and methods to enable automatic password management in a proximity based authentication

The present disclosure relates to changing a password in a proximity-based authentication system. After a successful proximity-based authentication, a password agent may determine that a password does not comply with an administrative password policy. The password agent may then generate a new password that does comply with the administrative password policy and submit a password change request to an administrator of that password policy, without any input by a user at these steps. The user can then request to view the password for input to a service using the same password, and after passing a biometric challenge may view the password.
Owner:CA TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products