Supercharge Your Innovation With Domain-Expert AI Agents!

Weak password detection method, apparatus and system

A detection method and detection device technology, applied in the field of security detection, can solve the problems of low identification efficiency of weak passwords, achieve the effect of improving the collision hit rate and identification efficiency, and solving the low identification efficiency

Active Publication Date: 2017-07-07
CHINA MOBILE GRP HEILONGJIANG CO LTD
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The purpose of the present invention is to provide a weak password detection method, device and system to solve the problem of low efficiency of weak password identification in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak password detection method, apparatus and system
  • Weak password detection method, apparatus and system
  • Weak password detection method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] Such as figure 1 As shown, the weak password detection method provided by Embodiment 1 of the present invention includes:

[0058] Step 11: Perform weak password detection based on the weak password detection knowledge base for the password information to be detected;

[0059] Step 12: Optimizing the weak password detection knowledge base according to the detection results.

[0060] The weak password detection method provided in Embodiment 1 of the present invention performs weak password detection on the password information to be detected based on the weak password detection knowledge base, and then optimizes the weak password detection knowledge base according to the detection results for subsequent weak password identification , improve the collision hit rate and recognition efficiency of subsequent weak password detection, and solve the problem of low efficiency of weak password recognition in the prior art.

[0061] Embodiment 1 of the present invention provides...

Embodiment 2

[0119] Such as Figure 5 As shown, the weak password detection device provided by Embodiment 2 of the present invention includes:

[0120] A detection module 51, configured to detect weak passwords based on the weak password detection knowledge base for the password information to be detected;

[0121] An optimization module 52, configured to optimize the weak password detection knowledge base according to the detection result.

[0122] The weak password detection device provided in Embodiment 2 of the present invention performs weak password detection on the password information to be detected based on the weak password detection knowledge base, and then optimizes the weak password detection knowledge base according to the detection results for subsequent weak password identification. , improve the collision hit rate and recognition efficiency of subsequent weak password detection, and solve the problem of low efficiency of weak password recognition in the prior art.

Embodiment approach

[0123] Embodiment 2 of the present invention provides two specific implementation modes for the function of the optimization module 52, as follows:

[0124] In the first type, the optimization module includes: a counting submodule, configured to count the weak passwords and corresponding weak password composition rules when the detection result indicates that a weak password is detected; a sorting submodule is configured to count the weak passwords according to The counting result sorts the calling priority of the weak passwords and corresponding weak password composition rules.

[0125] In the second type, the optimization module includes: an extension submodule, configured to expand the weak password dictionary of the weak password detection knowledge base according to the detection result.

[0126] It should be noted that the first and second manners may coexist or exist independently, which is not limited here.

[0127] Specifically, Embodiment 2 of the present invention ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a weak password detection method, apparatus and system. The weak password detection method comprises: carrying out weak password detection on to-be-detected password information based on the weak password detection knowledge base; and optimizing the weak password detection knowledge base according to a detection result. According to the scheme provided by the present invention, weak password detection is carried out on the to-be-detected password information based on the weak password detection knowledge base, and the weak password detection knowledge base is optimized according to the detection result for identification of the subsequent weak password, so that the collision hit rate and the identification efficiency of the subsequent weak password detection are improved, and the problem of low efficiency of weak password identification in the prior art is solved.

Description

technical field [0001] The invention relates to the technical field of security detection, in particular to a weak password detection method, device and system. Background technique [0002] Among many information security issues, password security is particularly important. If the account password of a resource or a system is not safe, it is easy to be guessed, or easily cracked, it will lead to random access to the resource or system, and cause serious damage to the important information in the resource or system. threaten. [0003] The emergence of the above problems makes it urgent to conduct security analysis on account passwords. The weak password check can identify the security of all account passwords, alert the found weak passwords, remind relevant personnel to modify the account passwords, and check the weak passwords again until the modified passwords are not easy to be guessed , or until the tool cannot be easily cracked. [0004] Existing implementation meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 刘莉王雅文王灿义贾金良王咏于佳华宋刚隋鹏
Owner CHINA MOBILE GRP HEILONGJIANG CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More