Unlock instant, AI-driven research and patent intelligence for your innovation.

Password traversal method and device

A password and traversal technology, applied in the field of password encryption and decryption, which can solve the problem that the password cannot be traversed first.

Active Publication Date: 2018-03-20
XIAMEN MEIYA PICO INFORMATION
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide a password traversal method and device to solve the problem in the prior art that commonly used passwords cannot be traversed preferentially when traversing passwords in a permutation and combination manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password traversal method and device
  • Password traversal method and device
  • Password traversal method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] like figure 1 As shown, this embodiment provides a password traversal method, which includes the following steps S302 to S306.

[0054] Step S302: Obtain a preset character set for password traversal.

[0055] When performing password traversal, it is necessary to use the characters in the character set to construct each character of the traversal password. Therefore, at the beginning of the password traversal, step S302 is first performed to obtain a preset character set, such as the obtained preset character set It is a character set consisting of ten numbers from 0 to 9 and 26 lowercase letters from a to z.

[0056] Step S304: Obtain the probability factor set and correlation factor set corresponding to the preset character set.

[0057] Wherein, the probability factor set includes the probability factor α of each character in the preset character set corresponding to each bit of the password, specifically as defined above. The correlation factor set includes the ...

Embodiment 2

[0062] like figure 2 As shown, this embodiment provides a more preferred password traversal method, which includes the following steps S102 to S112.

[0063] Step S102: Obtain a preset character set for password traversal.

[0064]When performing password traversal, characters in the character set are used to construct each character of the traversal password. Therefore, at the beginning of password traversal, a character set is obtained first. A character set composed of 26 lowercase letters including numbers and a to z.

[0065] Step S104: Obtain the probability factor of each character in the preset character set corresponding to each digit of the password, and the correlation factor of any two characters in the preset character set.

[0066] For example, according to the research results of social engineering, it is possible to determine the probability factor of any existing character corresponding to each digit of the password, and generate a probability factor table ...

Embodiment 3

[0085] like image 3 As shown, this embodiment provides a more preferred password traversal method, which includes the following steps S202 to S218.

[0086] Step S202: Obtain a preset character set for password traversal.

[0087] Step S204: Obtain the probability factor of each character in the preset character set corresponding to each digit of the password, and the correlation factor of any two characters in the preset character set.

[0088] Step S206: Start password traversal to obtain the first password traversed.

[0089] Specifically, this step S206 may include the following steps:

[0090] a: For any character in the preset character set, calculate the occurrence probability of the character in the first digit of the password according to the probability factor of the character corresponding to the first digit of the password, so as to obtain the occurrence probability of each character in the preset character set in the first digit of the password;

[0091] b: Us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cipher traversal method and device. The method comprises the steps that a preset character set needing cipher traversal is obtained; a probability factor set and a correlation factor set which are corresponding to the preset character set are obtained, wherein the probability factor set comprises probability factors of each cipher corresponding to each character in the preset character set, and the correlation factor set comprises correlation factors of any two characters in the preset character set; traversal ciphers are determined according to the probability factor set and the correlation factor set. According to the cipher traversal method and device, common ciphers can be preferentially traversed.

Description

technical field [0001] The present invention relates to the technical field of password encryption and decryption, in particular, to a password traversal method and device. Background technique [0002] The brute force traversal method and the dictionary traversal method are currently the two most commonly used traversal methods in password traversal methods. The brute force traversal method refers to traversing all the passwords in the rules specified by the user, and the dictionary traversal method refers to traversing the passwords in the dictionary. The brute force traversal method often requires more rules to cover as large a password space as possible to improve the success rate of password recovery. However, if the password space is too large, the traversal time will double, and even hundreds of thousands of years will be required, making password recovery meaningless. The success rate of the dictionary traversal method is often limited by the number of passwords in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 张光斌王海滨张永光汤伟宾
Owner XIAMEN MEIYA PICO INFORMATION