Weak password rapid comparison and searching method

A weak password and binary search technology, applied in the field of information security, can solve the problems of not being able to adapt to the comparison requirements of large amounts of data, reduce the human-computer interaction experience, and have no algorithm optimization, so as to avoid system data loss and shorten offline comparison The effect of the time of verification and the improvement of verification efficiency

Active Publication Date: 2017-02-15
STATE GRID CORP OF CHINA +2
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 3. There is no optimization in the comparison and verification algorithm, which is only suitable for a small amount of comparison and verification, and cannot meet the comparison requirements of a large amount of data. The comparison time is too long, and the result output is too slow
[0006] These problems have caused the efficiency of weak password detection and reduced the human-computer interaction experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak password rapid comparison and searching method
  • Weak password rapid comparison and searching method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Such as figure 1 As shown, the present invention provides a quick comparison and search method for weak passwords, including:

[0035] (1) Import multiple weak password dictionary files;

[0036] (2) Import the encrypted password file to be verified from the application system;

[0037] (3) Encrypt the weak password dictionary, wherein single or mixed encryption is performed according to the encryption method and encryption order of the encrypted password file to be verified;

[0038] (4) Offline comparison and verification of weak passwords and encrypted passwords to be verified is performed by combining multi-threading and binary search method, so as to greatly shorten the time of offline comparison and verification.

[0039] Preferably, after the step (4), the step also includes:

[0040] (5) Perform human-computer interaction based on the results of weak password comparison and verification.

[0041] Preferably, the step (1) includes: importing a weak password d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In order to improve the account number encryption password comparison verification efficiency and improve the stability and the high efficiency of the application system, the present invention provides a weak password rapid comparison and searching method. The method comprises: (1) leading in a plurality of weak password dictionary files; (2) leading in encryption password files from an application system; (3) performing weak password dictionary encryption; and (4) performing off-line comparison verification of the weak password and the encryption password to be verified. Through adoption of the mode of combination of the multithread processing and the binary searching method, the weak password rapid comparison and searching method fully develop the performances of the hardware device (the oversized data volume verification and comparison be processed through cloud calculation) so as to greatly shorten the time of the encryption password comparison verification, improve the efficiency of the big data volume password verification and rapidly and effectively realize the detection of the weak passwords to allow the comparison and verification between the huge account passwords of the application system and the equal huge weak password dictionary to have realization possibility on the aspect of time.

Description

technical field [0001] The present invention relates to the field of information security technology, and more specifically, to a method for quickly comparing and finding weak passwords in application systems, which is used for efficient verification and detection of weak passwords in the system, and is generally applicable to weak passwords in various types of enterprise application systems. Password verification. Background technique [0002] Existing application systems (eg, software application systems, server application systems, database application systems, security authentication systems, etc.) usually use account numbers and passwords to perform security management such as security authentication. The account passwords of various enterprise application systems have the characteristics of wide distribution and a large number of users, and the weak password data stored in the system may reach the level of millions of records. In addition, the accounts of some users i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3226
Inventor 孙建吴丽莎蔡翔邵奎先王潇
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products