Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Semantic transformation-based password enhancing method

A technology of semantic transformation and transformation algorithm, applied in the field of information security, can solve the problems of inappropriate password generation strategy user burden, wrong password user input, etc., to enhance the ability of guessing attacks, ensure availability, ensure information security and property security Effect

Inactive Publication Date: 2018-11-06
EAST CHINA NORMAL UNIV
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2007, Vu et al found that a strict password generation strategy can effectively resist password guessing attacks, but it also increases the difficulty for users to create and use passwords.
In 2013, Mazurek et al. found that high-strength passwords are likely to be mistyped by users
In 2015, Ur et al. found that inappropriate password generation strategies adopted by many services caused a heavy burden on users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semantic transformation-based password enhancing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described in detail in conjunction with the following specific embodiments and accompanying drawings. The process, conditions, experimental methods, etc. for implementing the present invention, except for the content specifically mentioned below, are common knowledge and common knowledge in this field, and the present invention has no special limitation content.

[0041] The implication that relevant technical term represents among the present invention is as follows:

[0042] blacklist - blacklist

[0043] pw - original user password

[0044] pw` - new password after strengthening

[0045] p(s) - probability of password s

[0046] thp - probability threshold

[0047] token list - list of password segments

[0048] psm(pw) - user password evaluation strength

[0049] wn - vocabulary database

[0050] G1=(V,Σ,S,P) where: V={S,A,L,U,D,K,N 1 ,N 2 ,N 3 ,B 1 ,B 2}

[0051] A nonterminal defined in V, where S is an initial no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a semantic transformation-based password enhancing method. The method comprises the following steps of: command blacklist matching: matching a password submitted by a user withan existing password blacklist; password strength assessment: assessing the strength of the password through comparing a generation probability for calculating user passwords with a set probability threshold value; password segmentation: segmenting the password into a plurality of fragments after carrying out semantic analysis on weak password; and password semantic transformation and enhancement: transforming the password fragments through a predefined transformation algorithm to ensure that the enhanced password and the original password has certain similarity. According to the method, theusers are fundamentally enabled to use fewer weak passwords through using a blacklist technology, and algorithms such as password strength assessment and semantic analysis and segmentation are used, so that the password availability is ensured, the password strength is improved, the guessing attack defensing ability of the passwords is strengthened and the password safety is improved.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a password strengthening method based on semantic transformation. Background technique [0002] With the in-depth advancement of the informatization process, passwords are widely used in various current computer systems as a basic identity authentication method to ensure user information security. In the foreseeable future, passwords will still be the most important identity authentication method. [0003] The user's password needs to meet the requirements of both usability and security. Usability is used to measure the memorability of the password, and security is used to measure the guessability of the password. However, most users do not have enough information to ensure that the passwords they use are secure enough. In order to ensure the security of user passwords, mainstream services or websites provide password creation policies (Password Creation Policies, PC...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 何道敬杨肖吴宇
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products