JPH03240856A - Password ciphering system - Google Patents

Password ciphering system

Info

Publication number
JPH03240856A
JPH03240856A JP2038944A JP3894490A JPH03240856A JP H03240856 A JPH03240856 A JP H03240856A JP 2038944 A JP2038944 A JP 2038944A JP 3894490 A JP3894490 A JP 3894490A JP H03240856 A JPH03240856 A JP H03240856A
Authority
JP
Japan
Prior art keywords
password
file
calculation rule
computer system
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2038944A
Other languages
Japanese (ja)
Inventor
Masashi Sakamaki
坂巻 真史
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP2038944A priority Critical patent/JPH03240856A/en
Publication of JPH03240856A publication Critical patent/JPH03240856A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To make it difficult to estimate a calculation rule for ciphering by changing the calculation rule for ciphering when a password file is accessed. CONSTITUTION:When a user inputs a password (x)5, this password (x)5 is ciphered according to a calculation rule 4, converted to a password (y)6 and collated with a password (y)3. When the both passwords are coincident, the user can utilize a computer system 1. In such a case, assuming that a pass word file 2 is intensively or accidentally accessed by the user of the computer system 1, the ciphering calculation rule 4 is changed to the other rule at such a time and the password (y)3 in the password file 2 is updated corresponding to the changed calculation rule. Thus, when the password file 2 is accessed again, the contents are changed and therefore, the estimation of the calculation rule 4 can be made difficult.

Description

【発明の詳細な説明】 〔産業上の利用分野〕 本発明はユーザをパスワードにより認識する計算機シス
テムのパスワード暗号化方式に関する。
DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to a password encryption method for a computer system that recognizes users by passwords.

〔従来の技術〕[Conventional technology]

従来の計算機システムでは、ユーザ認識のためのパスワ
ードをある計算規則に従って暗号化したものをパスワー
ドファイルへ登録しておき、ユーザが計算機システムを
利用する際には、パスワードを入力させて暗号化を施し
、パスワードファイルに登録しであるものと照合して利
用を許可して、いた。
In conventional computer systems, the password for user recognition is encrypted according to certain calculation rules and registered in a password file, and when the user uses the computer system, the user is prompted to enter the password and encrypt it. , I verified it against the one registered in the password file and allowed its use.

〔発明が解決しようとする課題〕[Problem to be solved by the invention]

上述した従来の計算機システムのパスワード暗号化方式
は、パスワードの暗号化の計算規則が固定になっている
ので、故意あるいは偶然にパスワードファイルがアクセ
スされ、内容が読み出された場合、暗号化の計算規則が
推測され、パスワードが知られてしまうという問題があ
る。
In the password encryption method of the conventional computer system described above, the calculation rules for password encryption are fixed, so if the password file is accessed intentionally or accidentally and the contents are read, the encryption calculation will be interrupted. The problem is that rules can be guessed and passwords can be known.

〔課題を解決するための手段〕[Means to solve the problem]

本発明はユーザをパスワードにより認識する計算機シス
テムのパスワード暗号化方式において、暗号化されたパ
スワードを登録しておくパスワードファイルを備え、前
記パスワードファイルがアクセスされた時にパスワード
暗号化の計算規則を変更しパスワード暗号化の計算規則
の推測を困難にする機能を含む。
The present invention provides a password encryption method for a computer system that recognizes users by passwords, which includes a password file in which encrypted passwords are registered, and changes calculation rules for password encryption when the password file is accessed. Contains a feature that makes it difficult to guess password encryption calculation rules.

〔実施例〕〔Example〕

次に、本発明について図面を参照して説明する。 Next, the present invention will be explained with reference to the drawings.

一実施例を示す第1図を参照すると、1はユーザをパス
ワードにより認識する計算機システムを示す。2はパス
ワードファイルを示し、3は暗号化されてパスワードフ
ァイル2に登録されたパスワード(y)を示す。4はパ
スワード暗号化の計算規則を示す、5はユーザが入力す
るパスワード(x)を示し、6は計算規則に従って暗号
化したパスワード(y)を示す。
Referring to FIG. 1 showing one embodiment, 1 indicates a computer system that recognizes users by passwords. 2 indicates a password file, and 3 indicates a password (y) encrypted and registered in the password file 2. 4 indicates calculation rules for password encryption, 5 indicates a password (x) input by the user, and 6 indicates a password (y) encrypted according to the calculation rules.

ユーザがパスワード(X)5を入力すると、このパスワ
ード(X〉5は計算規則4に従って暗号化され、パスワ
ード〈y〉6に変換される。そして、パスワード(y)
3と照合され、一致した場合にユーザは計算機システム
1を利用できる。ここで、パスワードファイル2が計算
機システム1のあるユーザによって故意あるいは偶然に
アクセスされたとする。このとき、暗号化計算規則4を
別のものに変更するとともに、パスワードファイル2中
のパスワード(y)3をその計算規則に従ったものに更
新しておく、すると、パスワードファイル2が再びアク
セスされたときには、その内容が変更されているため、
計算規則4を推測することが困難になる。
When the user enters password (X)5, this password (X>5 is encrypted according to calculation rule 4 and converted to password <y>6. Then, password (y)
3, and if they match, the user can use the computer system 1. Here, it is assumed that the password file 2 is accessed intentionally or accidentally by a certain user of the computer system 1. At this time, change the encryption calculation rule 4 to another one and update the password (y) 3 in the password file 2 to one that conforms to the calculation rule. Then, the password file 2 will be accessed again. When the content is changed,
It becomes difficult to guess calculation rule 4.

〔発明の効果〕〔Effect of the invention〕

以上説明したように本発明によれば、ユーザをパスワー
ドにより認識する計算機システムにおいてパスワードフ
ァイ、ルがアクセスされた時に暗号化の計算規則を変更
することにより、暗号化の計算規則の推測を困難にする
ことができる。
As explained above, according to the present invention, in a computer system that recognizes users by passwords, when a password file is accessed, the encryption calculation rules are changed, thereby making it difficult to guess the encryption calculation rules. can do.

【図面の簡単な説明】[Brief explanation of drawings]

第1図は本発明の一実施例を示す構成図である。 1・・・計算機システム、2・・・パスワードファイル
、3・・・暗号化されてパスワードファイルに登録され
たパスワード、4・・・パスワード暗号化の計算規則、
5・・・ユーザが入力するパスワード、6・・・計算規
則に従って暗号化したパスワード。
FIG. 1 is a block diagram showing an embodiment of the present invention. 1... Computer system, 2... Password file, 3... Password encrypted and registered in the password file, 4... Calculation rules for password encryption,
5...Password input by the user, 6...Password encrypted according to calculation rules.

Claims (1)

【特許請求の範囲】[Claims] ユーザをパスワードにより認識する計算機システムのパ
スワード暗号化方式において、暗号化されたパスワード
を登録しておくパスワードファイルを備え、前記パスワ
ードファイルがアクセスされた時にパスワード暗号化の
計算規則を変更しパスワード暗号化の計算規則の推測を
困難にする機能を含むことを特徴とするパスワード暗号
化方式。
In a password encryption method for a computer system that recognizes users by passwords, a password file is provided in which encrypted passwords are registered, and when the password file is accessed, the password encryption calculation rules are changed and the password is encrypted. A password encryption method characterized by including a function that makes it difficult to guess the calculation rules.
JP2038944A 1990-02-19 1990-02-19 Password ciphering system Pending JPH03240856A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2038944A JPH03240856A (en) 1990-02-19 1990-02-19 Password ciphering system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2038944A JPH03240856A (en) 1990-02-19 1990-02-19 Password ciphering system

Publications (1)

Publication Number Publication Date
JPH03240856A true JPH03240856A (en) 1991-10-28

Family

ID=12539326

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2038944A Pending JPH03240856A (en) 1990-02-19 1990-02-19 Password ciphering system

Country Status (1)

Country Link
JP (1) JPH03240856A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010103967A (en) * 2008-10-24 2010-05-06 Feitian Technologies Co Ltd Intelligent cipher key apparatus for enhancing pin code input security and its method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010103967A (en) * 2008-10-24 2010-05-06 Feitian Technologies Co Ltd Intelligent cipher key apparatus for enhancing pin code input security and its method

Similar Documents

Publication Publication Date Title
JP3499680B2 (en) System and method for transparently integrating private key operations from a smart card with host-based cryptographic services
US7290279B2 (en) Access control method using token having security attributes in computer system
US11251977B2 (en) Validation data structure for decentralized identity claim
US11128457B2 (en) Cryptographic key generation using external entropy generation
US11394542B2 (en) Deauthorization of private key of decentralized identity
JPH09179871A (en) System and method providing safe sql-level access to data base
MXPA04004144A (en) Secure communication with a keyboard or related device.
Park et al. Combined authentication-based multilevel access control in mobile application for DailyLifeService
EP3981126B1 (en) Resolving decentralized identifiers using multiple resolvers
US11363032B2 (en) Resolving decentralized identifiers at customized security levels
CN105022965B (en) A kind of data ciphering method and device
CN113282959A (en) Service data processing method and device and electronic equipment
JP2000188594A (en) Authentication system, fingerprint collation device and authentication method
JP4657706B2 (en) Authority management system, authentication server, authority management method, and authority management program
JP2002077138A (en) Encrypting system and method therefor based on transition state
JPH03240856A (en) Password ciphering system
JPWO2011058629A1 (en) Information management system
CN115145973A (en) Data operation method, program product, storage medium and electronic device
CN115176246A (en) Identification technology for removing centralization on skin
JP2002312222A (en) Cryptic file managing device and method
US20240340166A1 (en) Method for threshold secret sharing and reconstruction for multi-compartment
WO2022137549A1 (en) Information management device
Domingo-Ferrer Algorithm-sequenced access control
Osbakk et al. A Privacy Enhancing Infrastructure for Context-Awareness
JPS62184563A (en) Security system by variable password