An analysis method and system based on password encoding rules

An analysis method and analysis system technology, applied in the field of analysis methods and systems based on password encoding rules, can solve problems such as difficult to cover passwords used for encryption, no discovery, etc.

Active Publication Date: 2020-12-04
NEXWISE INTELLIGENCE CHINA LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is limited by the number of commonly used passwords and passwords, and it is difficult to cover most of the passwords used for encryption on a large scale.
[0004] The password encoding rule analysis system uses data mining technology and its own rule analysis algorithm to conduct statistical analysis on the password database, extracts common password encoding rules, and improves the hit rate of passwords. Application system for password analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An analysis method and system based on password encoding rules
  • An analysis method and system based on password encoding rules
  • An analysis method and system based on password encoding rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0062] figure 1 It is a schematic diagram of the method flow chart of the analysis method based on password encoding rules in the embodiment of the present invention, such as figure 1 As shown, the analysis method includes:

[0063] S11: Perform mining processing according to the occurrence rules of the password items to obtain the association rules of the password items;

[0064] S12: Perform iterative layered analysis and processing according to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an analysis method and system based on password encoding rules, wherein the analysis method includes: performing mining processing according to the occurrence rules of password items to obtain association rules of password items; The iterative layered analysis process is used to obtain the first commonly used encoding rules; the rule extraction process is performed on the association rules and the first commonly used encoding rules to obtain easily decomposable encoding rules. In the embodiment of the present invention, adopting the embodiment of the present invention can expand a large number of commonly used passwords according to the password coding habits, and the coverage amount and the hit rate of the existing database are prioritized, and the encrypted passwords can be cracked extremely quickly, and the mining can also be freely expanded. Rules, freely expand the password library, and automatically adjust the coding rules.

Description

technical field [0001] The invention relates to the technical field of security authentication, in particular to an analysis method and system based on password coding rules. Background technique [0002] Due to the digitization of criminal communication methods of criminals and dangerous elements, most of the text information used in interaction has been encrypted with passwords. Even if the security agency captures the criminal evidence file information, it cannot be decrypted and effective evidence information cannot be obtained. Therefore, it is necessary to be able to analyze the priority of the encoding rules of encrypted passwords, so as to greatly improve the speed of cracking encrypted file passwords, grasp the criminal evidence of criminals as soon as possible, and improve a strong guarantee for further solving cases. [0003] Most of the current encrypted file cracking uses common passwords for exhaustive cracking or uses existing password libraries for credential...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46G06N5/02G06Q50/26
CPCG06F21/46G06N5/025G06Q50/26
Inventor 龙飞伯桂增招继恩黄敏
Owner NEXWISE INTELLIGENCE CHINA LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products