A method, device, server and storage medium for detecting weak account passwords

A detection method and weak password technology, applied in the field of network security, can solve problems such as increasing equipment security risks, enterprise data center network attack threats, affecting data center operation and maintenance efficiency, etc., to improve operation and maintenance efficiency, reduce security risks, and improve The effect of rectification efficiency

Active Publication Date: 2022-07-12
TRAVELSKY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existence of weak account passwords greatly increases the security risks of equipment and makes enterprise data centers more vulnerable to network attacks.
[0003] At present, although the security detection devices provided by major security vendors can scan the account weak passwords in the device, the scanning results of account weak passwords are usually inaccurate, which affects the efficiency of data center operation and maintenance.
[0004] Moreover, at present, after the security detection device scans out that there is a weak account password in the device, the security operation and maintenance personnel need to manually query the person in charge of the account of the device with the weak account password and the contact information of the person in charge of the account, and the security operation and maintenance personnel According to the contact information of the person in charge of the account, notify the person in charge of the account to rectify the devices with weak account passwords, and the rectification efficiency of devices with weak account passwords is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device, server and storage medium for detecting weak account passwords
  • A method, device, server and storage medium for detecting weak account passwords
  • A method, device, server and storage medium for detecting weak account passwords

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The disclosed embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided as a For a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments disclosed in the present invention are only used for exemplary purposes, and are not intended to limit the protection scope of the present disclosure.

[0050]As used herein, the term "including" and variations thereof are open-ended inclusions, ie, "including but not limited to". The term "based on" is "based at least in part on." The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one addi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method, device, server and storage medium for detecting weak account passwords. By determining each device in a data center to be subjected to weak account password detection, calling a security detection device to scan each device respectively, and receiving an existing account returned by the security detection device The account weak password information of the target device with weak password, the account weak password information indicates the scanned account weak password of the target device and the information carrier logged in by the account weak password on the target device, simulating the use of the account weak password to log in to the target device. In the operation of the information carrier, the weak password of the account is verified to obtain a verification result. If the verification result indicates that the weak password of the account is valid, first notification information is sent to the first user who manages the target device, and the first notification information indicates that the target device has an account. weak password. Based on the present invention, not only the accuracy of the detection result of the weak account password of the device can be improved, but also the rectification efficiency of the device with the weak account password can be improved.

Description

technical field [0001] The present invention relates to the technical field of network security, and more particularly, to a method, device, server and storage medium for detecting weak account passwords. Background technique [0002] With the development of the Internet and informatization, major domestic companies have built their own data centers, which requires a large number of equipment. As the number of devices increases, the problem of weak account passwords on the operating system, middleware, and applications on the device becomes more and more serious. The existence of weak account passwords greatly increases the security risks of equipment and makes enterprise data centers more vulnerable to network attacks. [0003] At present, although the security detection devices provided by major security manufacturers can scan the weak account passwords in the device, the scan results of weak account passwords are usually inaccurate, which affects the operation and mainte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/0807
Inventor 刘畅蒋冰
Owner TRAVELSKY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products