Method for avoiding dictionary attack

A dictionary attack and count value technology, applied in the direction of electrical digital data processing, digital data processing components, instruments, etc., can solve problems such as restart and release

Active Publication Date: 2006-02-01
SHENZHEN SINOSUN TECH
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some locks can only be removed by restarting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for avoiding dictionary attack
  • Method for avoiding dictionary attack
  • Method for avoiding dictionary attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the purpose, technical solution and effect of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0033] The method for avoiding dictionary attack of the present invention, it comprises the following steps:

[0034] a), setting a non-volatile storage area on the computer, such as flash or EEPROM, used to save the count value of failed authorization attempts, lock time value and lock sign, etc.

[0035] b) A timer is provided in the computer system, which can be hardware or software, and is used to count the locking time.

[0036] c), the owner of the computer or digital information can set a threshold for the number of failed authorizations;

[0037] d) If there is an authorization failure, the count value of the failed authorization attempt is increased by 1. It keeps accumulating, and the count value of failed authorization attempts is cleared...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for avoiding attack on dictionary includes setting a nonvolatile storing region in computer for storing counting figure of failure authority test, locking time figure and locking mark; providing a timer by computer for timing lock time ; setting threshold for number of failure authority ; locking said computer when set threshold is exceeded by counting figure of failure authority test; only responding to starting up, self detection and reset request by computer as it is in locking period.

Description

technical field [0001] The invention belongs to the field of computer information security, and in particular relates to a method for preventing a computer from being attacked by a dictionary. Background technique [0002] With the widespread application of computers and communication networks, while bringing great convenience to people's life and work, it also brings many problems to be solved urgently, among which the security of digital information is a prominent problem. In order to ensure that their digital information is not seen by others, people often set passwords for these information and operations on these information. Generally speaking, only those who know the password through normal legal channels can view or even modify these numbers. information. [0003] However, with the development of technology, there are always some people who, for certain purposes, try to find out the password of the digital information that does not belong to them, so as to gain unau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00
Inventor 陈强张璐朱广志张玮刘鑫
Owner SHENZHEN SINOSUN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products