Analytical method and system based on password coding rule

An analysis method and analysis system technology, which is applied in the field of analysis methods and systems based on password encoding rules, can solve the problems of undiscovered and difficult to cover encrypted passwords, etc.

Active Publication Date: 2017-10-10
NEXWISE INTELLIGENCE CHINA LTD
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is limited by the number of commonly used passwords and passwords, and it is difficult to cover most of the passwords used for encryption on a large scale.
[0004] The password encoding rule analysis system uses data mining technology and its own rule analysis algorithm to conduct statistical analysis on the password database, extracts common password encoding rules, and improves the hit rate of passwords. Application system for password analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Analytical method and system based on password coding rule
  • Analytical method and system based on password coding rule
  • Analytical method and system based on password coding rule

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0062] figure 1 It is a schematic diagram of the method flow chart of the analysis method based on password encoding rules in the embodiment of the present invention, such as figure 1 As shown, the analysis method includes:

[0063] S11: Perform mining processing according to the occurrence rules of the password items to obtain the association rules of the password items;

[0064] S12: Perform iterative layered analysis and processing according to the commonly used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an analytical method and system based on a password coding rule, the analytical method includes the steps that according to the rules of password, the password is excavated and processed, the association rule of password entry is obtained ; according to the commonly used coding rule of the password entry, iterative hierarchical analysis is performed to obtain a first commonly used coding rule; the association rule and the first commonly used coding rule are extracted and processed to obtain an easily decomposed coding rule. The using of the analytical method and system can expand a large number of commonly used passwords according to the password coding habit, the coverage is prioritized with existing library hit ratios,encryption passwords are cracked extremely fast, and the using of the analytical method and system can also expand the mining rules freely, expand the password library, and adjust the encoding rules automatically.

Description

technical field [0001] The invention relates to the technical field of security authentication, in particular to an analysis method and system based on password coding rules. Background technique [0002] Due to the digitization of criminal communication methods of criminals and dangerous elements, most of the text information used in interaction has been encrypted with passwords. Even if the security agency captures the criminal evidence file information, it cannot be decrypted and effective evidence information cannot be obtained. Therefore, it is necessary to be able to analyze the priority of the encoding rules of encrypted passwords, so as to greatly improve the speed of cracking encrypted file passwords, grasp the criminal evidence of criminals as soon as possible, and improve a strong guarantee for further solving cases. [0003] Most of the current encrypted file cracking uses common passwords for exhaustive cracking or uses existing password libraries for credential...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06N5/02G06Q50/26
CPCG06F21/46G06N5/025G06Q50/26
Inventor 龙飞伯桂增招继恩黄敏
Owner NEXWISE INTELLIGENCE CHINA LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products