Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for centrally checking weak passwords of equipment

A weak password and weak password-level technology, applied in the transmission system, digital transmission system, electrical components, etc., can solve the problems of affecting the normal access of users, heavy manual workload, and destructive flaw detection, so as to save inspection manpower and management costs , improve work efficiency and effectiveness, and reduce direct or indirect losses

Active Publication Date: 2015-06-03
ULTRAPOWER SOFTWARE
View PDF7 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the way of repeatedly trying to log in to the account and password of the remote connection network element, due to the impact on the network element equipment, it is impossible to carry out a large dictionary attempt, so it is often concentrated on the factory default account configuration and a small number of other weak passwords, which cannot be more comprehensively found Other weak passwords that do not comply with the strong password policy; in the offline and stand-alone cracking method using cracking tools with weak password dictionaries to obtain password files after manually logging in to hosts and other devices, the weak password dictionaries are scattered among various offline cracking tools and cannot be cracked. Unified and efficient configuration and management, such as the upgrade of the weak password dictionary library, can not be done to upgrade the whole network to be effective, and update the latest weak password dictionary in time
In these two verification methods, the unified management and maintenance of the weak password dictionary has not been realized
[0005] In addition, in the method of repeatedly trying to log in to the account and password of the remote connection network element, there is a problem of lossy detection, which can easily cause a deadlock of the device configured with the account lock policy, affecting the normal access of the user; because only trying to log in can be accessed from the Internet The weak password verification of the intranet device isolated by the firewall cannot be realized; because the weak password verification is performed by trying to log in to the connected device, there is no password cracking algorithm module, and the offline inspection of the password file is not supported. The company cannot use the existing platform to complete the weak password verification of all firewall internal and external network devices
In the method of manually logging in to hosts and other devices to obtain password files, and using cracking tools with weak password dictionaries for offline and stand-alone cracking, the manual workload is huge, and it is necessary to obtain files one by one and analyze the cracking results to form a report; at the same time, the efficiency is low. Unable to implement regular, network-wide weak password troubleshooting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for centrally checking weak passwords of equipment
  • Method and system for centrally checking weak passwords of equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0047]The embodiment of the present invention has the weak password verification function of the "non-destructive detection" mode that does not affect the normal operation of the business system at all, and is mainly characterized by online or offline acquisition of the password files of each network element and centralized cracking in the background. Obtain password ciphertext through technical or manual methods, realize centralized weak password dictionary management, unify the weak password standard of the whole network, and can upgrade at any time, analyze weak password status based on weak password dictionary, and achieve the purpose of comprehensively controlling the device password settings. Discover the accounts with weak passwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for centrally checking weak passwords of equipment, and relates to the technical field of computer network information security and network management. The method comprises the following steps: when weak password check needs to be performed on the equipment, acquiring a password file of each piece of to-be-checked equipment by receiving the to-be-checked equipment and to-be-checked items, and uploading the password files onto a centralized control server; splitting the received password files into a plurality of cracking tasks through the centralized control server, and allocating the cracking tasks onto a plurality of cracking analysis servers according to the principle of load balance; automatically matching corresponding weak password dictionaries according to the to-be-checked items through the cracking analysis servers, and finishing weak password check according to corresponding levels; and uploading check results onto the centralized control server through each cracking analysis server in order to perform summarization analysis. Through adoption of the method and the system, the weak passwords of all equipment can be checked comprehensively and accurately; centralized weak password dictionary management is realized; and a whole-network weak password standard is unified.

Description

technical field [0001] The invention relates to the technical fields of computer network information security and network management, in particular to a method and system for centralized verification of device weak passwords. Background technique [0002] With the rapid development and popularization of the Internet, major enterprises have increased investment in the construction of IT systems, resulting in the continuous increase of various application systems and the number of users, the rapid expansion of the network scale, and the information security problems faced by enterprises have become more and more prominent. For a long time, weak passwords have been the most common high-risk security issues in various security inspections and risk assessment reports, and have become the main way for attackers to control the system. [0003] At present, there are mainly two methods for weak password verification: the method of repeatedly trying to log in to the account password b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 肖勇军陈浩赵昭苏砫张建军
Owner ULTRAPOWER SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products