A zero-trust based host password control method

A password management and password technology, applied in secure communication devices, digital transmission systems, user identity/authority verification, etc., can solve problems such as difficult automatic audit and unified management, heavy workload, etc., and achieve the effect of reducing the risk of weak passwords

Active Publication Date: 2022-04-26
HUANENG POWER INT INC +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 3. The password of the host computer is usually set by the machine user. When the network security is strengthened, the workload of host security verification and auditing is heavy, and it is difficult to realize automatic auditing and unified management.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A zero-trust based host password control method
  • A zero-trust based host password control method
  • A zero-trust based host password control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. The present invention is a zero-trust based host password management and control method, and the host password management and control system for realizing the method includes a password management server S p and the managed host M i , i from 1 to N, password management server S p Deploy password server-side SS m , equipped with a card reader; host M i Deploy password setting client program on SC i , the identification card C matched with the host i and card reader equipment.

[0046] Among them, the password management server S p Responsible for password generation, password verification, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for managing and controlling host passwords based on zero trust, including a method for bringing hosts into management and control, a method for forcibly resetting host passwords after the expiration date, and a method for processing abnormal login passwords; the invention generates passwords through password construction strategies The password can meet the password strength requirements of the host, significantly reducing the risk of weak passwords of the host, and realizes the management and audit of the host password through unified management and control, ensures the implementation of the regular forced replacement policy of the host password, and saves the host password to the entity's identification card , which significantly increases the difficulty of password cracking and identity forgery. At the same time, users do not need to record complex host passwords, and can complete password-free login with an ID card, realizing the full lifecycle management of host passwords.

Description

technical field [0001] This application relates to network security host security management, in particular to a zero-trust-based host password management and control method. Background technique [0002] Weak passwords are a typical network and information security problem, which widely exist in various occasions. Once the host passwords involved in the network are cracked by network attackers, identity spoofing, illegal access, privilege theft, etc. will occur, resulting in leakage or loss of important data. Even if the attacker only obtains the password of the non-core system host, he will have the conditions to perform lateral jumps within the network and further escalate privileges, and then pose a threat to the security of the core system. According to the "barrel principle" of network security protection, the overall security level of the system depends on the "short board" of system security protection, and the host password security cannot be ignored. [0003] In ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/0807H04L9/3226H04L63/083
Inventor 王文庆邓楠轶毕玉冰陈燕宋润高原英董夏昕介银娟崔逸群刘超飞
Owner HUANENG POWER INT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products