Method and device for detecting weak password in network

A weak password and password technology, applied in the Internet field, can solve the problem of high missed detection rate of weak passwords, and achieve the effects of convenient management, comprehensiveness, and flexible deployment.

Active Publication Date: 2014-04-02
HILLSTONE NETWORKS CORP +1
View PDF2 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] Aiming at the problem of high missed detection rate of detecting weak passwords in the related art, no effective solution has been proposed at present. Fo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting weak password in network
  • Method and device for detecting weak password in network
  • Method and device for detecting weak password in network

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0036] First of all, some nouns or terms appearing in the process of describing the embodiments of the present invention are applicable to the following explanations:

[0037] Password policy, the password can protect the file or data by encrypting the file or data. The password protection level is based on the structure of the password. The higher the complexity of the password, the harder the password is to be guessed, which can provide better security. The password policy reflects the structure of the password. The password policy can be applied to the login name of SQL Server authentication, and can be applied to the database user with the password.

[0038] For the construction of VPN, the network tunnel (Tunnelling) technology is a key technology. The network tunnel technology refers to the technology that uses one network protocol to transmit another network protocol, and it mainly uses the network tunnel protocol to achieve this function. The network tunnel technology inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for detecting a weak password in a network. The method comprises the following steps: extracting a login password from network traffic under the circumstance that a login request is detected from the network traffic; carrying out weak password check on the login password, and determining whether the login password is a weak password. According to the method and device disclosed by the invention, the problem that the detection omission rate of the weak password is high in the prior art is solved, the weak password in the network is accurately monitored, and the purpose of reducing the detection omission rate is achieved.

Description

technical field [0001] The invention relates to the field of the Internet, in particular to a method and device for detecting weak passwords in a network. Background technique [0002] Passwords are also called passwords. For the convenience of unified description, they are collectively referred to as passwords in this application document. [0003] There is no strict and accurate definition of weak passwords. Generally, passwords that are easy to be guessed by others or cracked by cracking tools are weak passwords, such as passwords that only contain simple numbers and letters: "123", "abc", because such passwords It is easy to be cracked by others, which puts the user's computer at risk, so it is not recommended for users. [0004] The authentication method is used when a user logs in to DSMP or uses data services, and the service gateway or Portal sends this message to DSMP to check the legality and validity of the user's use of data services (whether the status is activ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
Inventor 邓富镭张斌司亚强
Owner HILLSTONE NETWORKS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products