Method and device for managing device weak password

A management method and weak password technology, applied in the field of network management, can solve problems such as relying on network operation and maintenance personnel, and achieve the effect of reducing work, eliminating existence, and avoiding system data loss

Active Publication Date: 2017-09-22
ULTRAPOWER SOFTWARE +1
View PDF16 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem in the prior art that the repair of weak passwords of equipment needs to rely on network operation and maintenance personnel, the embodiment of the present invention provides a method and device for managing weak passwords of equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for managing device weak password
  • Method and device for managing device weak password
  • Method and device for managing device weak password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0047] In view of the existing technology, there is a method of checking the weak password of the device when managing the weak password of the device, but the existing method can only provide the display function related to the weak password and the user account, and cannot automatically repair the problem of the weak password. Instead, it is necessary to manually write scripts for batch execut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for managing a device weak password. The method comprises steps: according to a preset account login password security check standard, a user account with a weak password in a target device is acquired; according to a preset password policy, a new login password meeting the preset password policy is generated for the user account with a weak password, weak password detection is carried out on the generated new login password, and if the new login password is not a weak password, the login password of the user account with the weak password is set to be the new login password. According to the method provided by the invention, weak password check and automatic repairing can be completed automatically, the work of a maintenance person can be lessened, the weak password in the device can be timely corrected, existence of a weak password in a network system is eliminated in a shortest time, and system data loss caused by a weak password and economic loss brought to an enterprise are further avoided.

Description

technical field [0001] The invention relates to the field of network management, in particular to a device weak password management method and device. Background technique [0002] With the rapid development and popularization of the Internet, various enterprises continue to increase the construction and investment of the Internet system, which makes the number of terminal devices in the enterprise network system continue to increase. Correspondingly, the amount of enterprise key data stored in the network system is also increasing. many. As an important security element of a network system, the login password security of terminal accounts plays a decisive role in the security of enterprise network information. If the level of the login password is set too low, it is easy to be guessed by an attacker or cracked by a cracking tool, which will pose a greater threat to the data stored in the enterprise management system. Therefore, it is necessary to log in to the terminal acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/205
Inventor 付芖钧高峰张建军苏砫
Owner ULTRAPOWER SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products