Unlock instant, AI-driven research and patent intelligence for your innovation.

A password traversal method based on keyboard rules

A technology of traversal algorithms and rules, which is applied in the field of password encryption and decryption, and can solve problems such as the inability to use the keyboard to arrange the order, and the inability to complete the traversal of passwords

Active Publication Date: 2018-02-23
XIAMEN MEIYA PICO INFORMATION
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Ordinary brute force traversal algorithm can only substitute all possible keyboard characters for full arrangement and combination, even if the password is less than 8 digits, the traversal cannot be completed in a short time
Due to the fact that it cannot use the keyboard arrangement sequence, most of the passwords it traverses are invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A password traversal method based on keyboard rules
  • A password traversal method based on keyboard rules
  • A password traversal method based on keyboard rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] As a specific embodiment, in order to achieve the above object, the technical solution adopted by the present invention is a password traversal method based on keyboard rules, including the following steps:

[0030] Step 1: Obtain the characters on the keyboard and establish a password set according to the keyboard character rules. The password set includes the first traversal character table and the second traversal character table, as shown below, Table 1 is the first traversal character table, and Table 2 is The second traverses the character table,

[0031] `

1

2

3

4

5

6

7

8

9

0

-

q

w

e

r

t

y

u

i

o

p

[

]

a

s

d

f

g

h

j

k

l

\

z

x

c

v

b

n

m

,

.

/

[0032] Table 1 All characters without pressing the Shift key

[0033] ~

@

#

$

^

&

*

(

)

_

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of password encryption and decryption, in particular to a password traversal algorithm based on keyboard rules. Step 1: Obtain the characters on the keyboard and establish a password set according to the keyboard character rules. Step 2: Set the brute force traversal rules for the password set. 3: Use the brute force traversal rules and the password set as the data source of the traversal algorithm, and use the traversal algorithm to construct the characters in the password set to generate the final traversal password. According to the characteristics of keyboard rules, this solution designs a corresponding traversal algorithm, which can realize the traversal of passwords with different keyboard sequences, different starting positions, and different lengths.

Description

technical field [0001] The invention relates to the field of password encryption and decryption, in particular to a method for traversing passwords based on keyboard rules. Background technique [0002] Brute force traversal and dictionary traversal are the two most commonly used traversal methods in password recovery. Brute force traversal is to traverse all the passwords in the rules specified by the user, and dictionary traversal is to traverse the passwords in the dictionary file. The brute force method often requires more rules to cover as large a password space as possible to improve the success rate of password recovery, but too large a password space will double the traversal time, or even take hundreds of thousands of years, making password recovery meaningless. The success rate of the dictionary traversal method is often limited by the number of passwords in the dictionary. Since the number of passwords in the dictionary is generally not too many, the password tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 张光斌王海滨张永光汤伟宾
Owner XIAMEN MEIYA PICO INFORMATION