Remote brute force cracking prevention method based on database security
A database, anti-violence technology, applied in the field of Internet security, can solve problems such as corporate economic losses, affect corporate image, etc., to achieve the effect of anti-brute force technology security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] A remote anti-brute force cracking method based on database security, such as figure 1 shown, including the following steps:
[0046] S1. Obtain registered user information and receive system security policies;
[0047]The management center formulates a security policy against brute force cracking and sends it to the client. The content of the policy includes: database account lockout threshold, database account lockout time, database account reset counter time, and unlocking methods. Specifically,
[0048] Database account lock threshold: divide the database into legal accounts and illegal accounts, and configure account lock thresholds for the two types of accounts respectively;
[0049] Legal account: the account name is in the database user list;
[0050] Illegal account: the account name is not in the database user list;
[0051] Account lock threshold: When a legal account or an illegal account fails to log in more than a certain number of times within the spec...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
