Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for checking weak password of operating system

An operating system and weak password technology, applied in the direction of digital data authentication, etc., can solve the problems of easy trigger system security mechanism, system login failure times lock, detection efficiency and low accuracy rate, etc., to improve inspection speed and detection efficiency, improve The effect of accuracy

Inactive Publication Date: 2015-12-23
BEIJING VRV SOFTWARE CO LTD
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a method and system for detecting weak passwords of an operating system, which are used to solve the problem of low detection efficiency and accuracy in the detection process of weak passwords in the prior art, and it is easy to trigger the system security mechanism, resulting in the failure of the system due to the number of login failures. too many locked issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for checking weak password of operating system
  • Method and system for checking weak password of operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0052] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof.

[0053]Those ski...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for checking a weak password of an operating system. The method comprises the steps of scanning disc files of the operating system and obtaining user information of the operating system, wherein the user information comprises a user password and a password encryption mode; extracting the encrypted user password which corresponds with the user password; encrypting a preset weak password according to the password encryption mode for obtaining the encrypted weak password; comparing the encrypted user password with the encrypted weak password, and when the encrypted user password is same with the encrypted weak password, determining the user password as the weak password. The method and the system according to the invention have advantages of greatly improving a checking speed and a checking efficiency for the weak password, preventing triggering of a system safety mechanism, and improving an accuracy in weak password checking.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method and system for detecting weak passwords of an operating system. Background technique [0002] At present, with the continuous development of computer technology and the wide application of computers, the importance of operating system passwords can be imagined. A password is equivalent to a key to enter your home. When someone else has a key to enter your home, our safety, property, and privacy will be threatened. The same is true for the passwords of computer operating systems. Weak passwords are easy to be guessed or cracked by others, so if the passwords we use are weak passwords, all information and data stored in our computers will face the possibility of being stolen, which is very Danger. Therefore, how to detect the weak password used in the operating system and realize the security of the computer system is extremely important to the user. [0003] The trad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 林皓张聪姜一
Owner BEIJING VRV SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products