Device weak password management method and device
A management method and weak password technology, applied in the field of network management, can solve problems such as relying on network operation and maintenance personnel, and achieve the effect of reducing work, avoiding system data loss, and eliminating existence.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.
[0047] In view of the existing technology, there is a method for checking device weak passwords when managing device weak passwords, but the existing methods can only provide display functions related to weak passwords and user accounts, and cannot automatically repair weak passwords. Instead, it is necessary to manually write scripts for batch execution or open the device remote connection tool...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


