CN105429751A - Device for generating random symbol strings and method for managing password - Google Patents
Device for generating random symbol strings and method for managing password Download PDFInfo
- Publication number
- CN105429751A CN105429751A CN201510741284.4A CN201510741284A CN105429751A CN 105429751 A CN105429751 A CN 105429751A CN 201510741284 A CN201510741284 A CN 201510741284A CN 105429751 A CN105429751 A CN 105429751A
- Authority
- CN
- China
- Prior art keywords
- symbol
- password
- string
- generating random
- random mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a device for generating random symbol strings and a method for managing password. The device is composed of at least two endless belts with symbol strings, the symbol strings on the of the same endless belt do not repeat and are arranged randomly, and the symbol sequences of any two endless belts are not completely the same. The adjacent endless belts can freely slide in a relative parallel manner so that the endless belts are aligned at different positions, thus, certain set symbol string is established at certain position in the aligning manner, and the symbol strings at other positions establish the random symbol strings, and the establishment process can be reproduced. A user can conveniently generate, reproduce and manage the password of sufficiently high intensity, and need not to memorize the password hard to memorize, and the safety of the password and accounts is ensured. The method can also serve as a method to encrypt and restore character information.
Description
Technical field
The present invention relates to field of information security technology, be specifically related to a kind ofly generate the device of random mark string and the method for administrator password.
Background technology
Random mark is concatenated into many application, for example comprise the purposes (such as, converting the symbol string with the specific meaning of one's words to character string without certain semantic) of information encryption aspect, as password, password etc. for confirming the legitimacy of user account number user.In password, password and English alleged password etc. be widely used in various as in the system such as safety system, information system to identify and confirmation user, thus ensureing that this user logs in and operate the uniqueness of its account and a kind of very conventional means of fail safe, unification is herein referred to as password.For security consideration, generally password can not be recorded in an explicit way, and only can learn by heart in the heart.For ease of memory, that general user can only select certain law or have Special Significance to oneself and the symbol string remembered or the above two limited permutation and combination serve as password; And on the other hand, such password is but felt unwell complete, it is generally acknowledged that just very safe password should be the symbol string of completely random, but such security password cannot be remembered substantially.Obviously, safety and facilitate these two aspects easy to remember to also exist to be difficult to the contradiction be in harmonious proportion.Namely object of the present invention wishes to solve this contradiction, uses device described in the invention, and can build whenever and wherever possible lays equal stress on reveals desired random mark string, also can destroy this building process rapidly time unwanted.
Summary of the invention
Object of the present invention mainly in order to solve the problems of the technologies described above, and provide a kind of and generates the device of random mark string and the method for generating cipher thereof.
A kind of device generating random mark string of the present invention is made up of the endless belt of at least two group tape symbol strings, and the symbol on same endless belt does not repeat, and random alignment, the symbol order on any two endless belt is incomplete same.
A kind of device generating random mark string for the method for administrator password is: adjacent endless belt opposing parallelly can be free to slide to align at diverse location, by this alignment thereof, a certain setting symbol string is built in a certain position, then the symbol string of other positions is built into random mark string, and this building process can reappear.
A kind of device generating random mark string mechanically realizes.
A kind of device generating random mark string by electronics or means that other are virtual simulate out.
A kind of device generating random mark string may be used for encrypting Word message, will expressly in a certain aligned in position, the symbol string of other positions all can be used as ciphertext and stores and send, and recipient only can use and just can complete decryption oprerations with encryption device symbol and the identical equipment of symbol ring order.
Advantage of the present invention is: user can generate easily, reappear and the sufficiently high password of management intensity, and removes without the need to expend energy on the password remembering these difficult notes, is conducive to password and account safety.This also can as a kind of method of encrypting and reducing Word message simultaneously.
Embodiment
A kind of device generating random mark string of the present invention is made up of the endless belt of at least two group tape symbol strings, and the symbol on same endless belt does not repeat, and random alignment, the symbol order on any two endless belt is incomplete same.
A kind of device generating random mark string for the method for administrator password is: adjacent endless belt opposing parallelly can be free to slide to align at diverse location, by this alignment thereof, a certain setting symbol string is built in a certain position, then the symbol string of other positions is built into random mark string, and this building process can reappear.
A kind of device generating random mark string mechanically realizes.
A kind of device generating random mark string by electronics or means that other are virtual simulate out.
A kind of device generating random mark string may be used for encrypting Word message, will expressly in a certain aligned in position, the symbol string of other positions all can be used as ciphertext and stores and send, and recipient only can use and just can complete decryption oprerations with encryption device symbol and the identical equipment of symbol ring order.
A kind of application of device in Password Management generating random mark string.
Working method principle: utilize the symbol string of random sequence generate and manage the device of random mark string, its core is several endless belt containing random mark string, by in the specific or nonspecific symbol string of a certain aligned in position one group, other positions can construct other random mark string automatically.One of them or several symbol string can be chosen use as the ciphertext after the password of safety or plain text encryption or transmit.Unwanted time, forward each group code ring to random position and destroy this building process, selected password will be difficult to known to other people.The recipient of ciphertext uses and can complete decryption oprerations with symbol string during encryption and the identical device of symbol ring order.After the ciphertext obtained is alignd, then according to semantic or other supplementary meanss, the clear content can reduced before encrypting.
A kind of execution mode citing such as, gets 26 English alphabets and 10 Arabic numerals totally 36 characters, vertical with random sequence arrangement from top to bottom, and end to end formation ring.Construct several (such as 10) similar but ring that character sequence is different, by transversely arranged for all character rings.At an arbitrary position by out transversely arranged for a certain specific character string (as 1234567890), then the character string that other 35 positions are laterally formed must be random character string.Choose one of them character string and can be used as password, remember a certain feature of this character string (as the first or ultimate character), next time can obtain be willing to password very soon by this building process of repetition and preceding feature.
Another kind of conventional mode can be above-mentioned random character ring only comprises 10 Arabic numerals, to generate the password of pure digi-tal.When this is applicable to much to use numerical ciphers.
Claims (5)
1. generate a device for random mark string, it is characterized in that it is made up of the endless belt of at least two group tape symbol strings, the symbol on same endless belt does not repeat, and random alignment, the symbol order on any two endless belt is incomplete same.
2. a kind of device generating random mark string according to claim 1, it is characterized in that its method for administrator password is: adjacent endless belt opposing parallelly can be free to slide to align at diverse location, by this alignment thereof, a certain setting symbol string is built in a certain position, then the symbol string of other positions is built into random mark string, and this building process can reappear.
3. a kind of device generating random mark string according to claim 1, is characterized in that it mechanically realizes.
4. a kind of device generating random mark string according to claim 1, it is characterized in that it by electronics or means that other are virtual simulate out.
5. a kind of device generating random mark string according to claim 1, it is characterized in that it may be used for encrypting Word message, will expressly in a certain aligned in position, the symbol string of other positions all can be used as ciphertext and stores and send, and recipient only can use and just can complete decryption oprerations with encryption device symbol and the identical equipment of symbol ring order.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510741284.4A CN105429751A (en) | 2015-11-05 | 2015-11-05 | Device for generating random symbol strings and method for managing password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510741284.4A CN105429751A (en) | 2015-11-05 | 2015-11-05 | Device for generating random symbol strings and method for managing password |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105429751A true CN105429751A (en) | 2016-03-23 |
Family
ID=55507704
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510741284.4A Pending CN105429751A (en) | 2015-11-05 | 2015-11-05 | Device for generating random symbol strings and method for managing password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105429751A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6173592B1 (en) * | 1999-06-11 | 2001-01-16 | Chun Te Yu | Lock for suitcase |
FR2885154A1 (en) * | 2005-04-29 | 2006-11-03 | Ronis | Code lock for e.g. suitcase, has detection unit movable between active and inactive positions, where unit detects determined angular position of each thumb wheel in active position, and key locking unit driving unit towards active position |
CN101882193A (en) * | 2010-07-14 | 2010-11-10 | 中兴通讯股份有限公司 | Method and equipment for unlocking handheld device |
CN102597401A (en) * | 2010-05-25 | 2012-07-18 | Jsb科技私人有限公司 | An electronic combination lock |
CN202980578U (en) * | 2013-01-14 | 2013-06-12 | 刘青 | Luggage box |
CN104278898A (en) * | 2014-09-26 | 2015-01-14 | 范雲鹤 | Trunk gear lock capable of preventing passwords from being changed by mistake |
CN104563633A (en) * | 2013-10-10 | 2015-04-29 | Dg国际控股有限公司 | Combination lock |
CN204363205U (en) * | 2014-12-24 | 2015-06-03 | 济南大学 | A kind of anti-theft luggage case |
CN204436058U (en) * | 2015-01-15 | 2015-07-01 | 温州金钥匙锁业有限公司 | A kind of many groups of formula cipher hang locks |
-
2015
- 2015-11-05 CN CN201510741284.4A patent/CN105429751A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6173592B1 (en) * | 1999-06-11 | 2001-01-16 | Chun Te Yu | Lock for suitcase |
FR2885154A1 (en) * | 2005-04-29 | 2006-11-03 | Ronis | Code lock for e.g. suitcase, has detection unit movable between active and inactive positions, where unit detects determined angular position of each thumb wheel in active position, and key locking unit driving unit towards active position |
CN102597401A (en) * | 2010-05-25 | 2012-07-18 | Jsb科技私人有限公司 | An electronic combination lock |
CN101882193A (en) * | 2010-07-14 | 2010-11-10 | 中兴通讯股份有限公司 | Method and equipment for unlocking handheld device |
CN202980578U (en) * | 2013-01-14 | 2013-06-12 | 刘青 | Luggage box |
CN104563633A (en) * | 2013-10-10 | 2015-04-29 | Dg国际控股有限公司 | Combination lock |
CN104278898A (en) * | 2014-09-26 | 2015-01-14 | 范雲鹤 | Trunk gear lock capable of preventing passwords from being changed by mistake |
CN204363205U (en) * | 2014-12-24 | 2015-06-03 | 济南大学 | A kind of anti-theft luggage case |
CN204436058U (en) * | 2015-01-15 | 2015-07-01 | 温州金钥匙锁业有限公司 | A kind of many groups of formula cipher hang locks |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahvanooey et al. | AITSteg: An innovative text steganography technique for hidden transmission of text message via social media | |
Omolara et al. | Developing a modified hybrid caesar cipher and vigenere cipher for secure data communication | |
Boonkrong et al. | Dynamic salt generation and placement for secure password storing | |
Aung et al. | A complex transformation of monoalphabetic cipher to polyalphabetic cipher:(Vigenère-Affine cipher) | |
Hannan et al. | Analysis of polyalphabetic transposition cipher techniques used for encryption and decryption | |
CN106301759A (en) | A kind of method of data encryption, the method and device of deciphering | |
Basu et al. | Modified playfair cipher using rectangular matrix | |
Bhargava et al. | A new algorithm combining substitution & transposition cipher techniques for secure communication | |
Bhattacharya | Cryptology and information security-past, present, and future role in society | |
CN106358184A (en) | Point-to-point identity authentication method | |
Choubey et al. | Cryptographic techniques in information security | |
Priyam | Extended vigenère using double transposition cipher with one time pad cipher | |
Majumder et al. | An enhanced cryptosystem based on modified classical ciphers | |
Gabor et al. | Security issues related to e-learning education | |
Tahir et al. | A scheme for the generation of strong cryptographic key pairs based on ICMetrics | |
CN105429751A (en) | Device for generating random symbol strings and method for managing password | |
Disina et al. | Enhanced caeser cipher to exclude repetition and withstand frequency cryptanalysis | |
Aich et al. | A symmetric key cryptosystem using DNA sequence with OTP key | |
Vatsa et al. | Novel cipher technique using substitution method | |
Licayan et al. | Performance Analysis of Playfair Cipher Color Substitution Variants | |
Iqbal et al. | Enhanced the security of playfair technique using excess 3 code (XS3) and ceasar cipher | |
Ray et al. | Integrating Hashing with Encoding to Eliminate Password Managers | |
Chauhan | Conversion of stream cipher into block cipher | |
Agrawal et al. | Refined polygram substitution cipher method: A enhanced tool for security | |
Naing et al. | Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160323 |
|
WD01 | Invention patent application deemed withdrawn after publication |