A method and system for judging user password risk based on user habits
A user password and user technology, applied in the field of Internet security, can solve problems such as insufficient security awareness of employees
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] According to an embodiment of the present invention, an embodiment of a method for judging a user's password risk based on user habits is provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0028] figure 1 It is a flow chart of a method for judging user password risks based on user habits according to an embodiment of the present invention, as shown in figure 1 As shown, the method includes the following steps:
[0029] Step S102, acquiring user information input by the user on the terminal device, wherein the user information includes a user name and / or a user password. For example, when a user registers a user name and password, or when modifying a user passw...
Embodiment 2
[0076] The embodiment of the present invention also provides a system for judging user password risks based on user habits. Risk method, the following is a specific introduction to a system for judging user password risk based on user habits provided by the embodiment of the present invention.
[0077] Image 6 is a schematic diagram of a system for judging user password risks based on user habits according to an embodiment of the present invention, as shown in Image 6 As shown, the system for judging user password risks based on user habits mainly includes: an acquisition module 10, a similarity analysis module 20 and a risk prompt module 30, wherein,
[0078] The acquisition module 10 is configured to acquire user information input by the user on the terminal device, where the user information includes a user name and / or a user password;
[0079] The similarity analysis module 20 is used for if the first user sub-information is found in the user comparison database, then ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


