Method and device for identifying brute-force cracking

A violent and terminal technology, applied in the field of identifying brute force cracking, can solve the problem of low efficiency of identifying brute force cracking, and achieve the effect of improving efficiency

Active Publication Date: 2018-05-08
BEIJING CO WHEELS TECH CO LTD
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a method and device for identifying brute force cracking, which can solve the problem of low efficiency in identifying brute force cracking in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying brute-force cracking
  • Method and device for identifying brute-force cracking
  • Method and device for identifying brute-force cracking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0030] In order to improve the efficiency of identifying brute force cracking, an embodiment of the present invention provides a method for identifying brute force cracking, such as figure 1 As shown, the method includes:

[0031] 101. Obtain a user name and password for logging into the current system.

[0032] Wherein, the current system is pre-registered with a password meeting a preset password strength range and a correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention, which relates to the field of data security technology, discloses a method and device for identifying brute-force cracking so that a problem of low brute-force cracking identification efficiency in the prior art can be solved. The method comprises: a user name and a password that are used for logging in a current system are obtained, wherein a password meeting a preset password strength range and a corresponding user name are registered in advance in the current system; according to the preset password strength range, password strength checking is carried out on the obtained password; if the obtained password does not pass the password strength checking, whether the number of times of not passing the password strength checking reaches a preset number times threshold during the process of logging in the current system by the terminal making a request of logging in the current system by using the obtained user name is determined; and if so, the terminal is determined to bea brute-force cracking terminal. The method and device are mainly applied to the account login scene.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method and device for identifying brute force cracking. Background technique [0002] Existing applications are registered and logged in through the form of user name and password. For example, if a user wants to use an email address, he needs to register with the user name and password first. After the registration is passed, the user can enter the registered value in the login interface Username and password to enter the mailbox home page. [0003] Although the password can guarantee the security of the account to a certain extent, it is easy for hackers to successfully crack the password through brute force cracking (that is, the exhaustive method). In order to identify the brute-force cracking terminal and prevent the brute-force cracking terminal from continuing to crack other accounts, the existing identification method is that the server matches the user name and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/1441
Inventor 马东辉周文来
Owner BEIJING CO WHEELS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products