Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Weak password analysis method and system

An analysis method and weak password technology, applied in the field of weak password analysis methods and systems, can solve problems such as slow verification of weak passwords, inability to quickly check weak passwords, idle computing resources, etc., to make up for the overload of server resources and fast The effect of weak password verification work and reasonable allocation of computing resources

Active Publication Date: 2014-04-02
ULTRAPOWER SOFTWARE
View PDF5 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Inefficiency, weak password verification is slow, and it is impossible to quickly check weak passwords;
[0006] 2. Some computing resources are fully occupied, and most of the remaining computing resources are idle;
[0007] 3. Unable to calculate weak password verification progress to better allocate computing resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak password analysis method and system
  • Weak password analysis method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0067] The embodiment of the present invention analyzes the weak password situation based on the weak password dictionary, optimizes the weak password analysis method, achieves the purpose of rationally allocating computing resources and quickly performing weak password verification work. Solving the problem of slow verification of weak passwords and making full use of hardware resources not only saves a lot of manpower and material resources, but also greatly improves the efficiency of device weak password analysis and verification, and overcomes the shortcomings of unbalanced distribution of computing resources, laying a solid foundation for security.

[0068] see figure 1 , the embodiment of the present invention provides a weak pas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a weak password analysis method and system and relates to the technical field of computer network information security. With adoption of the method, work units can be split according to the encryption algorithm efficiency, and crack tasks corresponding to the split work units are allocated to a plurality of processing cores of one or more crack servers for execution respectively through a load balancing mode, so that weak password state analysis can be performed according to a dictionary based on a weak password, the weak password analysis method can be optimized, and the purposes of reasonably allocating computing resources and rapidly performing weak password inspection work are achieved. In addition, the method sufficiently makes up the disadvantages that the existing weak password analysis method wastes time and energy, and the server source load is too high, and can ensure that all analysis resources are sufficiently utilized. Furthermore, the embodiment of the invention can also compute the weak password inspection schedule, namely the system dynamically adjusts the crack tasks according to the crack server load condition, and further improves the weak password analysis efficiency.

Description

technical field [0001] The invention relates to the technical field of computer network information security, in particular to a weak password analysis method and system. Background technique [0002] With the rapid development and popularization of the Internet, major enterprises have increased investment in the construction of IT systems, resulting in the continuous increase of various application systems and the number of users, the rapid expansion of the network scale, and the information security problems faced by enterprises have become more and more prominent. For a long time, weak passwords have been the most common high-risk security issues in various security inspections and risk assessment reports, and have become the main way for attackers to control the system. [0003] At present, there are mainly two methods for weak password verification: the method of repeatedly trying to log in to the account password by connecting to the network element remotely, and the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/08G06F9/50G06F21/46
CPCY02D10/00
Inventor 肖勇军陈浩赵昭苏砫张建军
Owner ULTRAPOWER SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products