Unlock instant, AI-driven research and patent intelligence for your innovation.

Password security test method and device

A security testing and security technology, applied in the field of information security, can solve problems such as long overall cycle, low efficiency, and increased product R&D cycle, and achieve the effect of improving processing efficiency, improving testing efficiency, and shortening R&D cycle

Inactive Publication Date: 2018-01-19
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the CPU is used as the processor, only one input password and the original password matching test can be performed in each processing cycle, so the overall test cycle is longer, and the efficiency is relatively low, which increases the development cycle of products related to the password.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password security test method and device
  • Password security test method and device
  • Password security test method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 1 It is a flowchart of a password security testing method provided by an embodiment of the present invention. Please refer to figure 1 , the concrete steps of the security testing method of password comprise:

[0042] Step S10: Obtain the original password and the transformation strategy of the original password, and set the transformation steps according to the transformation strategy.

[0043] It should be noted that the original password referred to in this step is generated by converting a character string through the password conversion strategy designed by the user. The purpose of this method is to test the security of the original password, so the original password needs to be The cracking operation of the password judges the security of the original password according to the time length of cracking and the specific situation when cracking. The essence of cracking is that the user tentatively sets the input password and converts the string according to ...

Embodiment 2

[0052] figure 2 It is a flow chart of another password security testing method provided by the embodiment of the present invention. figure 2 In steps S10 to S12 with figure 1 Same, no more details here.

[0053] Such as figure 2 As shown, as a preferred embodiment, the method further includes:

[0054] Step S20: Set a security level judging standard, and judge the comparison result according to the security level judging standard to obtain the security level of the original password.

[0055] It can be understood that the more detailed way to reflect the security of the original password is to classify the security, so it is necessary to set the security level judgment standard, and based on the security level judgment standard and according to the implementation of the original password security Determine the security level of the original password based on the overall situation during the testing process. The criteria for judging the security level should be specific...

Embodiment 3

[0070] The embodiment of the security testing method of password has been described in detail above, the present invention also provides a kind of security testing device of password corresponding to this method, because the embodiment of device part and the embodiment of method part mutually Correspondingly, for the embodiment of the device part, please refer to the description of the embodiment of the method part, and details will not be repeated here.

[0071] image 3 It is a structural diagram of a password security testing device provided by the embodiment of the present invention. The security testing device of the password that the embodiment of the present invention provides specifically includes:

[0072] The conversion setting module 10 is used to obtain the original password and the conversion strategy of the original password, and set conversion steps according to the conversion strategy.

[0073] The password conversion module 11 is used to obtain the input pas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a password security test method and device. The method comprises the following steps of: obtaining an original password and a conversion strategy of the original password, andsetting a conversion step according to the conversion strategy; obtaining input passwords through an FPGA processor and gradually converting the input passwords according to the conversion step so asto obtain a result password, wherein the quantity of the input passwords is greater than 1; and comparing the result password with the original password to obtain a comparison result, wherein the comparison result represents security of the original password. When the method is used for carrying out password security test, the test efficiency can be relatively enhanced so as to correspondingly shorten the research and development periods of products related to passwords. Moreover, the password security test device also has above effects.

Description

technical field [0001] The invention relates to the field of information security, in particular to a password security testing method and device. Background technique [0002] The concept of information security has gone through a long historical stage in the 20th century, and has been deepened since the 1990s. In the 21st century, with the continuous development of information technology, the issue of information security has become increasingly prominent. How to ensure the security of information systems has become a concern of the whole society. [0003] As the most popular information protection method, password authentication has a series of advantages such as abundant resources, easy memory, and changeability. When a user accesses a file or system through a password, the system performs a series of analysis on the user's input password and compares the result with the original password of the file or system to determine whether the input password is correct. Howeve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46
Inventor 李雪雷王洪伟曹芳
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD