Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A weak password detection method, device and server

A detection method and detection device technology, which are applied in the Internet field, can solve problems such as enterprise loss and inability to detect weak passwords, and achieve the effects of preventing security loss and improving comprehensiveness.

Active Publication Date: 2018-11-23
BEIJING QIERBULAITE TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially in most enterprises, the office automation system (OA) is commonly used as the daily operation and management for the organization. It is the most frequently used application system by employees and managers. If the password is leaked, it will bring immeasurable losses to the enterprise.
[0004] However, the password detection rules in the prior art are too simple to detect the increasingly serious problem of weak passwords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A weak password detection method, device and server
  • A weak password detection method, device and server
  • A weak password detection method, device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0029] figure 1 A flow chart of a weak password detection method 100 in an embodiment is shown, wherein the weak password detection method 100 is executed in a server. The method starts with step S110.

[0030] In step S110, the user name and the password to be tested input by the user are acquired. When a user needs to register an account in an application such as an email system or an OA system, he will enter registration infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a weak password detection method suitable for being executed in a server.The method includes the steps that a user name and a to-be-detected password input by a user are acquired; the correlation length pair and the total correlation length of the to-be-detected password are calculated; a first ratio of the correlation length pair and the total length of the to-be-detected password is calculated, and a second ratio of the total correlation length and the total length of the to-be-detected password is calculated; if the first ratio is not smaller than a first threshold value, or the second ratio is not smaller than a second threshold value, it is confirmed that the to-be-detected password is a weak password.The invention further discloses a weak password detection device and the server.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a weak password detection method, device and server. Background technique [0002] With the rapid development of information technology and the Internet, the security problems faced by computer networks and information systems are becoming more and more serious. Password is one of the most important factors as user credentials. If it is accidentally leaked or guessed by criminals and used, it will cause serious losses. [0003] Weak passwords are passwords that are easy to decipher. They are mostly simple number combinations, number combinations with the same account number, adjacent keys on the keyboard, or common names, such as "123456", "abc123", and "Michael". Weak passwords are a very serious security risk that exists widely in network host systems, and weak password detection constitutes an important part of the network security risk scanning system. Especially in mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 魏俊锋
Owner BEIJING QIERBULAITE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products