Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detecting weak password in network

A weak password and password technology, applied in the Internet field, can solve the problem of high missed detection rate of weak passwords, and achieve the effects of convenient management, comprehensiveness, and flexible deployment.

Active Publication Date: 2014-04-02
HILLSTONE NETWORKS CORP +1
View PDF2 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] Aiming at the problem of high missed detection rate of detecting weak passwords in the related art, no effective solution has been proposed at present. For this reason, the main purpose of the present invention is to provide a method and device for detecting weak passwords in the network to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting weak password in network
  • Method and device for detecting weak password in network
  • Method and device for detecting weak password in network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] First of all, some nouns or terms appearing in the process of describing the embodiments of the present invention are applicable to the following explanations:

[0037] Password policy, passwords can protect files or data by encrypting files or data. The password protection level is based on the structure of the password. The higher the complexity of the password, the harder it is for people to guess the password, which can provide better security. The password policy reflects the construction of the password. Password policies can be applied to logins for SQL Server authentication and to contained database users with passwords.

[0038]For constructing VPN, network tunneling (Tunnelling) technology is a key technology. Network tunneling technology refers to the technology of using one network protocol to transmit another network protocol, and it mainly uses the network tunneling protocol to realize this function. The network tunnel technology involves three network p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for detecting a weak password in a network. The method comprises the following steps: extracting a login password from network traffic under the circumstance that a login request is detected from the network traffic; carrying out weak password check on the login password, and determining whether the login password is a weak password. According to the method and device disclosed by the invention, the problem that the detection omission rate of the weak password is high in the prior art is solved, the weak password in the network is accurately monitored, and the purpose of reducing the detection omission rate is achieved.

Description

technical field [0001] The invention relates to the field of the Internet, in particular to a method and device for detecting weak passwords in a network. Background technique [0002] Passwords are also called passwords. For the convenience of unified description, they are collectively referred to as passwords in this application document. [0003] There is no strict and accurate definition of weak passwords. Generally, passwords that are easy to be guessed by others or cracked by cracking tools are weak passwords, such as passwords that only contain simple numbers and letters: "123", "abc", because such passwords It is easy to be cracked by others, which puts the user's computer at risk, so it is not recommended for users. [0004] The authentication method is used when a user logs in to DSMP or uses data services, and the service gateway or Portal sends this message to DSMP to check the legality and validity of the user's use of data services (whether the status is activ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26
Inventor 邓富镭张斌司亚强
Owner HILLSTONE NETWORKS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products