Unlock instant, AI-driven research and patent intelligence for your innovation.

Weak password detection method and device, computer equipment and service server

A technology of detection equipment and detection method, which is applied in the field of data processing, can solve problems such as potential safety hazards, remote server intrusion, weak user safety awareness, etc., and achieve the effect of improving efficiency and accuracy

Inactive Publication Date: 2019-04-05
ADVANCED NEW TECH CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, for password-based security verification, due to the lack of security awareness of some users, the passwords set are weak passwords, which makes the user account and password easily obtained by malicious attackers. Once obtained by malicious attackers, it will directly lead to The remote server was hacked, causing great security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak password detection method and device, computer equipment and service server
  • Weak password detection method and device, computer equipment and service server
  • Weak password detection method and device, computer equipment and service server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order for those skilled in the art to better understand the technical solutions in the embodiments of this specification, the technical solutions in the embodiments of this specification will be described in detail below in conjunction with the drawings in the embodiments of this specification. Obviously, the described implementation Examples are only some of the embodiments in this specification, not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in this specification shall fall within the scope of protection.

[0035] At present, for the password-based security verification method provided by the SSH protocol, due to the lack of security awareness of some users, the passwords set are weak passwords, which makes the user account and password easily obtained by malicious attackers. If the attacker obtains it, it will directly lead to the invasion of the remote server, causing a great security risk. In ord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a weak password detection method and device, computer equipment and a service server. The method comprises that at least one piece of ciphertext verification information to beverified is obtained, any piece of ciphertext verification information corresponds to one user account and includes encryption information, a salt random string and a first ciphertext of the user account, and the first ciphertext is obtained by encrypting the salt random string and password of the user account via an encryption algorithm identified by the encryption infomraiton; the salt random string in the ciphertext verification information to be verified and a weak password in a preset weak password dictionary are encrypted via an encryption algorithm identified by encryption information in the ciphertext verification information to be verified, and a second ciphertext is obtained; whether there is second ciphertext, the same with the first ciphertext in the ciphertext verification information to be verified, in the second ciphertext is determined; and if YES, the password of the user account corresponding to the ciphertext verification information to be verified is determined to be a weak password.

Description

technical field [0001] The embodiments of this specification relate to the field of data processing technology, and in particular to a weak password detection method, device, computer equipment and service server. Background technique [0002] The SSH (Secure Shell) protocol is a protocol designed to provide security for remote login sessions and other network services. Using the SSH protocol can effectively prevent information leakage during remote management. Currently, the SSH protocol provides two levels of security verification methods, namely password-based security verification and secret key-based security verification. Both of these two security verification methods transmit data through ciphertext. Among them, for password-based security verification, due to the lack of security awareness of some users, the passwords set are weak passwords, which makes the user account and password easily obtained by malicious attackers. Once obtained by malicious attackers, it wil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/46
CPCG06F21/46H04L63/083
Inventor 毛武斌
Owner ADVANCED NEW TECH CO LTD