Unlock instant, AI-driven research and patent intelligence for your innovation.

Host password control method based on zero trust

A password management and password technology, applied in secure communication devices, digital transmission systems, user identity/authority verification, etc., can solve the problems of difficulty in automatic auditing and unified management, large workload, etc., and achieve the effect of reducing the risk of weak passwords

Active Publication Date: 2021-06-29
HUANENG POWER INTERNATIONAL +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 3. The password of the host computer is usually set by the machine user. When the network security is strengthened, the workload of host security verification and auditing is heavy, and it is difficult to realize automatic auditing and unified management.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host password control method based on zero trust
  • Host password control method based on zero trust
  • Host password control method based on zero trust

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. The present invention is a zero-trust based host password management and control method, and the host password management and control system for realizing the method includes a password management server S p and the managed host M i , i from 1 to N, password management server S p Deploy password server-side SS m , equipped with a card reader; host M i Deploy password setting client program on SC i , the identification card C matched with the host i and card reader equipment.

[0046] Among them, the password management server S p Responsible for password generation, password verification, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a host password management and control method based on zero trust. The host password management and control method comprises a method for bringing a host into management and control, a method for forcibly resetting a host password after the host password exceeds the validity period and a method for processing login password abnormity. A password generated through a password construction strategy can meet the strength requirement of the host password, the weak password risk of the host is remarkably reduced, management and auditing of the host password are achieved through unified management and control, execution of a regular forced replacement strategy of the host password is ensured, the host password is stored in an entity identity recognition card, the difficulty of password cracking and identity counterfeiting is remarkably improved, meanwhile, a user does not need to record complex host passwords, password-free login can be completed through the identity identification card, and full-life-cycle management of the host password is achieved.

Description

technical field [0001] This application relates to network security host security management, in particular to a zero-trust-based host password management and control method. Background technique [0002] Weak passwords are a typical network and information security problem, which widely exist in various occasions. Once the host passwords involved in the network are cracked by network attackers, identity spoofing, illegal access, privilege theft, etc. will occur, resulting in leakage or loss of important data. Even if the attacker only obtains the password of the non-core system host, he will have the conditions to perform lateral jumps within the network and further escalate privileges, and then pose a threat to the security of the core system. According to the "barrel principle" of network security protection, the overall security level of the system depends on the "short board" of system security protection, and the host password security cannot be ignored. [0003] In ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0807H04L9/3226H04L63/083
Inventor 王文庆邓楠轶毕玉冰陈燕宋润高原英董夏昕介银娟崔逸群刘超飞
Owner HUANENG POWER INTERNATIONAL
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More