Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

150 results about "Password strength" patented technology

Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.

Unified password prompt of a computer system

A computer system provides a unified password prompt for accepting a user power-on password or an administrator password. A password string entered by the system administrator at the unified password prompt is compared with a stored power-on password. If the user password string matches the stored power-on password, then access to system resources is granted. If the user password string does not match the stored power-on password, then the user password string is compared to a stored administrator password. If the user password string matches the stored administrative password, then access to system resources is granted. If the user password string does not match the stored administrative password, then the system administrator is given a predetermined number of times to enter a password string matching either the stored power-on password or the stored administrator password. If a password string matching either the stored power-on password or the stored administrator password is not provided in the predetermined number of times, access to system resources is denied. The unified password prompt does not require a system administrator to know a user's power-on password in order to access system resources. The unified password prompt also permits a system administrator to configure a plurality of computer systems by providing a single administrative password rather than a plurality of user power-on passwords.
Owner:HEWLETT PACKARD CO

Facilitating single sign-on by using authenticated code to access a password store

One embodiment of the present invention provides a system that facilitates accessing to a plurality of applications that require passwords. When the system receives a request for a password from an application running on a remote computer system, the system first authenticates the request to ensure that it originated from a trusted source. Next, the system uses an identifier for the application to look up the password for the application in a password store, which contains passwords associated with the plurality of applications. If the password exists in the password store, the system sends the password or a function of the password to the application on the remote computer system. Hence, the system creates the illusion that there is a single sign on to a large number of applications, whereas in reality the system automatically provides different passwords to the applications as they are requested. In one embodiment of the present invention, the request for the password includes computer code that when run on the local computer system requests the password on behalf of the application on the remote computer system. In a variation on this embodiment, the computer code is in the form of a JAVA™ applet that runs on a JAVA™ virtual machine on the local computer system. In one embodiment of the present invention, the JAVA™ applet is a signed JAVA™ applet, and authenticating the request involves authenticating the JAVA™ applet's certificate chain.
Owner:ORACLE INT CORP

User policy manageable strength-based password aging

Password aging based on the strength of the password provides an incentive for users to generate and / or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.
Owner:IBM CORP

Graduated access multi-password authentication

Methods and systems for accessing computer data and systems require different sequential and serial passwords to drive a user into a tiered set of sub-accounts of graduated access. At the same time, the tiered hierarchy of access acts as a honey pot system where remote intruders would statistically tend to break through the slightly less secure passwords first, triggering the notification system upon entry into the restricted or firewalled honey pot or virtual systems. With this system, the system administrator can manage multiple sessions for each user where the passwords are of a different level of security based on commercially available password strength tools. The system administrator creates the less secure passwords and lower access sub-accounts and optionally allows users to have such lower levels.
Owner:KOBOLD MICHAEL CHRISTOPHER

Method and device for identifying brute-force cracking

ActiveCN108011863AImprove the efficiency of identifying brute force attacksTransmissionBrute forceNumber times
The invention, which relates to the field of data security technology, discloses a method and device for identifying brute-force cracking so that a problem of low brute-force cracking identification efficiency in the prior art can be solved. The method comprises: a user name and a password that are used for logging in a current system are obtained, wherein a password meeting a preset password strength range and a corresponding user name are registered in advance in the current system; according to the preset password strength range, password strength checking is carried out on the obtained password; if the obtained password does not pass the password strength checking, whether the number of times of not passing the password strength checking reaches a preset number times threshold during the process of logging in the current system by the terminal making a request of logging in the current system by using the obtained user name is determined; and if so, the terminal is determined to bea brute-force cracking terminal. The method and device are mainly applied to the account login scene.
Owner:BEIJING CO WHEELS TECH CO LTD

Communication method and system based on quantum Ukey

The invention discloses a communication method and system based on the quantum Ukey, aiming to solve the potential safety hazards that the algorithm is not safe, the user password strength is not highenough, the user password plaintext input, secret key distribution and management are difficult, and the secret key cannot be automatically updated in the aspects of current identity authentication and security access cloud service application. The communication method based on the quantum Ukey comprises the following steps that when an access application service instruction is acquired, a user terminal determines a first quantum key by the quantum Ukey established the connection relation, and sending the corresponding authentication message to an authentication management platform for identity authentication; the authentication management platform obtains a second quantum key from the KMS according to the authentication message, and decrypting the encrypted information in the authentication message, if the decrypted information is consistent with the plaintext information in the authentication message, the identity authentication is determined to pass, and the passing information isreturned to the user terminal, so that the user terminal accesses the application server through the first quantum key.
Owner:QUANTUMCTEK GUANGDONG CO LTD

Password strength evaluation method based on personal information

The invention discloses a password strength evaluation method based on personal information. The method comprises the following steps that: when a user registers website service, collecting the influence factor field of personal information used for user password construction; independently carrying out classification on the influence factor field, and carrying out tagging processing on the influence factor field according to a practical transformation form; when the user inputs the password, according to an extracted and collected user information influence factor, calculating a coverage degree value which contains the personal information in the influence factor field in the password constructed by a current user, and combining the coverage value with a traditional heuristic method and pattern detection method to calculate a password strength value; and selecting a maximum threshold value which permits to contain the personal identification information in an acceptance password by a target website as an acceptance measurement index of the password strength. The invention puts forward the password strength evaluation method in which a personal identification information measurement factor is added. The method has the characteristics that the password strength value is instantly and effectively fed back, and an influence factor is plug and play and can be easily selected, and a user is assisted in selecting the password with a higher safety degree.
Owner:EAST CHINA NORMAL UNIV

Fingerprint dynamic password ID authentication device and the implementation method thereof

The invention aims to provide a fingerprint dynamic password ID authentication device and the implementation method thereof, which can effectively address the problems of equipment steal, insufficient cryptographic strength, inreversible generated dynamic passwords, lower security, great system consumption and the like in the ID authentication field. The equipment related to by the invention comprises a fingerprint chip, a fingerprint sensor, a dynamic password chip, a display, a storage medium, a power supply, a recharging interface and a control circuit; wherein, the control circuit is respectively connected with the fingerprint chip, fingerprint sensor, dynamic password chip, display, storage medium, power supply and recharging interface. The fingerprint dynamic password ID authentication device has the advantages that the fingerprint dynamic password ID authentication device can employ double authentications, namely authenticating a user's right to use a device through the user fingerprint and then authenticating the user's right to perform operations on a terminal through a dynamic password generated by the device, to ensure the user authentication device can be only used by the user himself and the authentication information is not stolen, thus sufficiently ensuring the security of the user account and rights.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Safety communication method suitable for remote control with limited capability at controlled end

The invention discloses a safety communication method suitable for remote control with a limited capability at a controlled end. The method comprises the following steps of: setting password sets at a control end and the controlled end and generating a password set according to an input initialization password by an irreversible method, wherein the password set comprises an index number and the password per se and encryption and decryption are performed by using the password corresponding to the recorded index number in a normal communication process; when the password is asynchronous, transmitting the index number by encrypting to perform password synchronization; and when a password set updating condition is met, negotiating about the update of the password set by transmitting a selected index number. A password set generating device for calculating the password set and communicating with the controlled end only when the password set is needed to be generated is arranged at the controlled end. Various attacks are resisted effectively by using a dynamic password and operation of real-time password calculation needed by the transmission of each data packet is avoided. Simultaneously, the password per se does not need to be transmitted on a communication link in password synchronizing and password set updating processes, so that simpleness and safety are realized.
Owner:SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products