Unlock instant, AI-driven research and patent intelligence for your innovation.

Password setting method based on weak password detection, storage medium and electronic equipment

A weak password and password technology, applied in the security field, can solve problems such as lack of supervision and repair, and achieve the effect of rapid and effective repair

Active Publication Date: 2019-08-02
重庆天蓬网络有限公司
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method cannot completely solve the problem of weak passwords. For example, using the method of name + birthday can be easily bypassed. When employees set passwords, they often use this rule to set passwords. This situation cannot be quickly discovered. , while lacking the ability to supervise and repair

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password setting method based on weak password detection, storage medium and electronic equipment
  • Password setting method based on weak password detection, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] like figure 1 As shown, a password setting method based on weak password detection provided by Embodiment 1 of the present invention includes:

[0039] S1. Collect public user password data;

[0040] S2. Analyzing the user password data and classifying it into common passwords and password rules;

[0041] S3. Store the common password and the password rules in the password rule database respectively, and this database is used for the weak password detection engine;

[0042] S4. Import the user names of all employees from the employee information database into the password rule database;

[0043] S5, generating a weak password detection engine for user name and password verification collision;

[0044] S6. Add user password verification interface;

[0045] S7. Based on the user password verification interface, the weak password detection engine performs password verification collision;

[0046] S8. After the user password is verified successfully, the user password ...

Embodiment 2

[0048] The embodiment of the present invention provides a method that first needs to collect public password information (such as: weak password Top1000, public user password data, etc.) through search engines (such as: Baidu, Google, Bing, etc.) on the Internet.

[0049] Then sort and classify the collected password data and store them in the weak password database. The password data is mainly divided into two categories, namely general passwords and regular passwords. A universal password is a single composition, and there is no personal information in the password (such as: 123456, 888888, aqwe123, etc.). A regular password is a password composed of a certain sequence, which may contain user information (such as: qq, phone number, pinyin, etc.), such as the password of zhangsan888, which is a typical regular password, and we can treat it as name888.

[0050]Then import the user name when the employee logs in into the weak password database, so that there are three types of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a password setting method based on weak password detection. The password setting method comprises the following steps: collecting public user password data on the Internet; analyzing the collected passwords, and classifying the passwords into universal passwords and password rules; respectively storing the general password and the password rule into a password rule base, wherein the database is used for a weak password detection engine; importing the user names of all employees into a password rule base from an employee information base; developing a weak password detection engine which is used for verifying collision by a user name and a password; adding a user password verification interface in the user login system; enabling the weak password detection engine to request a user password verification interface to carry out password verification collision; after the user password is verified to be successful, automatically setting the user password and enabling ashort message to inform the user. The technical problems that when using weak passwords, staff cannot quickly find and set the weak passwords and meanwhile repairing cannot be effectively supervisedare solved. The weak passwords used by users can be quickly found. The weak passwords can be quickly and effectively repaired, and repairing does not need to be supervised.

Description

technical field [0001] The invention relates to the security field, in particular to a password setting method based on weak password detection. Background technique [0002] A weak password is defined as a password that is generally considered easy to be guessed by others or cracked by cracking tools. The harm that weak passwords bring to enterprise security is huge, because the attacker's attack cost is low and the profit is high. Weak password detection depends on the password dictionary file used for detection, and the quality of the dictionary determines the efficiency of detecting weak passwords. Existing weak password detection tools use the built-in password dictionary to detect weak passwords on the target system. Since the built-in password dictionary is fixed and has not been optimized and adjusted in conjunction with the target website to be detected, it is not suitable for the target website. Password setting based on weak password detection is inefficient. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 陶安洪李英文立乾
Owner 重庆天蓬网络有限公司