Method and device for detecting weak password in network
A weak password and password technology, applied in the Internet field, can solve the problem of high missed detection rate of weak passwords, and achieve the effects of convenient management, comprehensiveness, and flexible deployment.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0036] First of all, some nouns or terms appearing in the process of describing the embodiments of the present invention are applicable to the following explanations:
[0037] Password policy, the password can protect the file or data by encrypting the file or data. The password protection level is based on the structure of the password. The higher the complexity of the password, the harder the password is to be guessed, which can provide better security. The password policy reflects the structure of the password. The password policy can be applied to the login name of SQL Server authentication, and can be applied to the database user with the password.
[0038] For the construction of VPN, the network tunnel (Tunnelling) technology is a key technology. The network tunnel technology refers to the technology that uses one network protocol to transmit another network protocol, and it mainly uses the network tunnel protocol to achieve this function. The network tunnel technology inv...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap