Unlock instant, AI-driven research and patent intelligence for your innovation.

Dictionary library-based host password detection method and detection system

A detection method and dictionary library technology, applied in the direction of digital data authentication, digital data protection, electronic digital data processing, etc., can solve problems such as loss and weak passwords, achieve accurate detection and early warning, ensure safe operation, and eliminate the phenomenon of weak passwords Effect

Pending Publication Date: 2020-11-13
HEFEI YOUO ELECTRONICS TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Leakage of important files due to weak passwords and hacking to steal confidential data will bring huge losses
At present, weak passwords can be easily obtained by using social engineering methods or brute force cracking tools. At the same time, in real life, there are generally weak passwords caused by default configurations, custom configurations, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dictionary library-based host password detection method and detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Such as figure 1 As shown, the host password detection method based on the dictionary library includes the following steps:

[0025] Step A, build a weak password dictionary library:

[0026] Use the weak password dictionary with the highest usage rate in the world that has been counted, and gradually improve the weak password dictionary on the basis of the weak password dictionary to form a complete and unified weak password dictionary library.

[0027] Step B, collect the host file:

[0028] Collect the Sam ciphertext file of the Windows system and the Shadow ciphertext file of the Linux system, including the host name, host address, operating system, and system version.

[0029] Step C, read the hosts file:

[0030] Read the host file collected in step B to obtain the account name, encryption algorithm, random characters, and password ciphertext.

[0031] Step D, encrypt weak password dictionary library:

[0032] Encrypt all passwords in the weak password dictio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dictionary library-based host password detection method and detection system, and relates to the technical field of host password security. The detection method comprises thefollowing steps: establishing a weak password dictionary library, collecting host files, reading the host files, encrypting the weak password dictionary library, matching passwords, and giving a weakpassword alarm. The method has the advantages that the account password of the host equipment can be automatically acquired; the password strength can be efficiently, comprehensively and accurately detected and early warned; the weak password phenomenon of the host equipment is prevented, the safe operation of the host is guaranteed, and the safety of an information network is guaranteed.

Description

technical field [0001] The invention relates to the technical field of host password security, in particular to a host password detection method and a detection system based on a dictionary library. Background technique [0002] With the development of information technology, the application of information business is gradually deepened. A large amount of confidential information is stored on hosts, application systems and various media. The problem of information leakage caused by factors such as weak passwords cannot be ignored. Leakage of important files due to weak passwords and hackers stealing confidential data will bring huge losses. At present, weak passwords can be easily obtained by using social engineering methods or brute force cracking tools. At the same time, in real life, there are generally weak passwords caused by default configurations, custom configurations, and other reasons. Contents of the invention [0003] The technical problem to be solved by the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/60G06F40/237
CPCG06F21/46G06F21/602G06F40/237
Inventor 何兵兵石海春张超沈先波徐飞
Owner HEFEI YOUO ELECTRONICS TECH