Unlock instant, AI-driven research and patent intelligence for your innovation.

A distributed security management method based on dynamic intelligent analysis of big data weights

A management method and big data technology, applied in the field of big data password management, can solve problems such as huge application account passwords and complex rules, and achieve the effect of reducing the possibility of trust errors and avoiding major losses

Active Publication Date: 2019-04-23
ZHONGSHAN YIYUN CLOUD COMPUTING
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The technical problem solved by the present invention is to propose a distributed password security management method based on dynamic intelligent analysis of big data weights for the problems that the application account passwords of enterprises and individual users are too large, the rules are complex and need to be updated periodically

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A distributed security management method based on dynamic intelligent analysis of big data weights
  • A distributed security management method based on dynamic intelligent analysis of big data weights
  • A distributed security management method based on dynamic intelligent analysis of big data weights

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will be combined with figure 2 , as shown in 3, the cryptographic security dynamic management scheme proposed by the present invention is described in detail.

[0034] In the figure, the definitions are explained as follows:

[0035] Application weight (AW, application weight): defined as two types. The first is the weight of the application group, and the second is the weight of the entire system, which is a summary of the weights of all application software groups.

[0036] Current weight (GW, Gained weight): is the accumulated weight value of the current user's operation.

[0037] The application group should continuously enter the correct number of times threshold (AC): for a certain application, the cumulative threshold of the number of times the user continuously enters the correct password.

[0038] Accumulated consecutive correct input times (CC) of an application group: the accumulative value of the number of times the user enters a correct pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a big data password management method, in particular to a distributed security management method based on big data weight dynamic intelligent analysis. According to the distributed security management method based on big data weight dynamic intelligent analysis, a dynamic hierarchical self-learning access right opening strategy is achieved according to password input scenes of user random sequence different applications and through intelligent analysis and judgment of the weight value accumulation process and threshold value control.

Description

technical field [0001] The invention relates to a big data password management method, in particular to a distributed password security management method based on dynamic intelligent analysis of big data weights. Background technique [0002] With the current development of the Internet and smart industries, more and more enterprises and individual users are faced with the need to access different application clients and web pages. For safety considerations, various applications currently require corresponding password settings, and the requirements for the security level and setting frequency of passwords are getting higher and higher. For example, banking-related applications require more robust and complex passwords, and most enterprise-level applications require regular password changes. From a user perspective, studies have shown that most people can only remember regular passwords with no more than seven characters. How to effectively and securely help users manage p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/45
CPCG06F21/31G06F21/45
Inventor 邬强
Owner ZHONGSHAN YIYUN CLOUD COMPUTING