Weak password judgment method and device, equipment and storage medium

A storage medium and weak password technology, applied in the field of network security, can solve the problems of inability to hit, time-consuming, manpower, and false negatives, and achieve the effect of reducing the probability of false negatives

Inactive Publication Date: 2022-02-01
北京微步在线科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technology described allows for efficient selection based on how much registered data has been collected during an initial phase or afterward period. This reduces the amount of time it takes users to input their details into systems like logon servers that require them to provide detailed personalized authentication credentials such as user names and password numbers. Additionally, this system uses regular expressions to determine if there are strong enough security measures needed before allowing access even when those checks have low confidence levels. Overall, these technical improvements improve efficiency and usability while minimizing issues with remembering complicated passwords.

Problems solved by technology

The technical problem addressed in this patented text relates to how strong or bad passwords are being leaked through social media platforms without causing any negative effects on people who use them (their own privacy).

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak password judgment method and device, equipment and storage medium
  • Weak password judgment method and device, equipment and storage medium
  • Weak password judgment method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] see figure 1 , figure 1 It is a schematic flowchart of a method for judging a weak password disclosed in the embodiment of the present application. Such as figure 1 As shown, the method of the embodiment of the present application includes the following steps:

[0050] 101. Obtain the network traffic generated during the user login process;

[0051] 102. Restore network traffic to packet information;

[0052] 103. Divide network traffic into request packets and response packets according to message information;

[0053] 104. Based on the preset password extraction rules, the login information is extracted from the start line, request header, and message body of the request packet;

[0054] 105. Based on the response packet, it is judged whether the login information can be successfully logged in, wherein, when the login information is successfully logged in, the login information is screened out and used as valid login information;

[0055] 106. Determine whether the

Embodiment 2

[0102] see figure 2 , figure 2 It is a schematic structural diagram of a weak password judging device disclosed in the embodiment of this application. Such as figure 2 As shown, the device of the embodiment of the present application includes the following functional modules:

[0103] Obtaining module 201, configured to obtain network traffic generated during the user login process;

[0104] A message restoration module 202, configured to restore network traffic to message information;

[0105] A division module 203, configured to divide network traffic into request packets and response packets according to message information;

[0106]The extraction module 204 is used to extract the login letter from the initial line of the request packet, the request header, and the message body based on the preset password extraction rule;

[0107] The first judging module 205 is used to judge whether the login information can be logged in successfully based on the response packet, whe

Embodiment 3

[0112] see image 3 , image 3 It is a schematic structural diagram of a weak password judging device disclosed in the embodiment of this application. Such as image 3 As shown, the equipment of the embodiment of the present application includes:

[0113] A memory 301 storing executable program codes;

[0114] a processor 302 coupled to the memory 301;

[0115] The processor 302 invokes the executable program code stored in the memory 301 to execute the method for determining a weak password according to Embodiment 1 of the present application.

[0116] The device in the embodiment of this application uses the weak password judgment method. On the one hand, it can filter out valid login information from a large number of login information, thereby reducing the workload of weak password judgment and reducing the disposal cost of weak passwords. On the other hand, this application The embodiment can further judge whether the login information is a weak password by customizing

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a weak password judgment method and device, equipment and a storage medium, and the method comprises the steps: restoring network traffic into message information; dividing the network traffic into a request packet and a response packet according to the message information; extracting login information from the start line, the request header and the message text of the request packet based on a preset password extraction rule; judging whether the login information can log in successfully or not based on the response packet; and judging whether the effective login information is a weak password or not. According to the method and the device, the effective login information can be screened from massive login information, so that the workload of weak password judgment and the processing cost of the weak password are reduced, and on the other hand, whether the login information is the weak password or not can be further judged through the custom rule, so that the probability of missing report of the weak password is reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 北京微步在线科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products