CN111859368A - Weak password generation method, password detection method, device and electronic equipment - Google Patents

Weak password generation method, password detection method, device and electronic equipment Download PDF

Info

Publication number
CN111859368A
CN111859368A CN202010738612.6A CN202010738612A CN111859368A CN 111859368 A CN111859368 A CN 111859368A CN 202010738612 A CN202010738612 A CN 202010738612A CN 111859368 A CN111859368 A CN 111859368A
Authority
CN
China
Prior art keywords
password
information
weak
target
weak password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010738612.6A
Other languages
Chinese (zh)
Inventor
栾存
刘可
赵静谧
王泽峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Bamboocloud Technology Co ltd
Original Assignee
Shenzhen Bamboocloud Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Bamboocloud Technology Co ltd filed Critical Shenzhen Bamboocloud Technology Co ltd
Priority to CN202010738612.6A priority Critical patent/CN111859368A/en
Publication of CN111859368A publication Critical patent/CN111859368A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention relates to the technical field of artificial intelligence, and discloses a self-adaptive weak password generation method, which comprises the following steps: acquiring basic information, wherein the basic information comprises historical password information, user information and basic weak password information; acquiring service type information of a target service, and determining a target weak password generation rule corresponding to the target service according to the service type information; generating a plurality of first weak passwords according to the basic information and a target weak password generation rule, wherein the target weak password generation rule is a combination rule of historical password information, user information and basic weak password information; and storing the first weak password and the service type information of the target service in a weak password group corresponding to the target service in a password library in an associated manner, wherein the password group stores historical password information, user information and basic weak password information. Through the mode, the embodiment of the invention has the beneficial effect of improving the password setting safety.

Description

Weak password generation method, password detection method, device and electronic equipment
Technical Field
The embodiment of the invention relates to the technical field of security detection, in particular to a self-adaptive weak password generation method, a password detection method, a self-adaptive weak password generation device, a password detection device, electronic equipment and a computer readable storage medium.
Background
With the continuous development of the internet, the problem of password security is an indispensable important security item in a security system, and a network hacker obtains a password through common attack means such as trojan horse implantation, brute force cracking, a fishing website and the like, thereby causing security threat to an account of a user. The password protection is also upgraded from simple password policy check to weak password library check combined with the historical password, personal information and the like of the user, so that the security of the account password is improved.
However, although the existing weak password can guarantee the security of the account password to a certain extent and reduce the probability of brute force cracking of the account password, with the continuous improvement of the existing weak password library and the adaptation to the existing password strength strategy of network hackers, the strength of the weak password library is still insufficient, and operation and maintenance personnel are required to continuously collect weak password information and maintain the weak password library through various channels, thereby increasing the system security operation and maintenance cost.
Disclosure of Invention
In view of the foregoing problems, embodiments of the present invention provide an adaptive weak cipher generation method, which is used to solve the problems in the prior art that the detection accuracy of facial impurities is low, the detection is easily affected by the environment, the robustness is low, and the like.
According to an aspect of an embodiment of the present invention, there is provided an adaptive weak password generation method, including:
acquiring basic information, wherein the basic information comprises historical password information, user information and basic weak password information;
acquiring service type information of a target service, and determining a target weak password generation rule corresponding to the target service according to the service type information;
generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information;
and storing the first weak password and the service type information of the target service in a password library in a correlated manner in a weak password group corresponding to the target service, wherein historical password information, user information and basic weak password information are stored in the password group.
In an optional manner, the method further comprises:
determining whether a time period for the cryptographic library update has been reached;
when the time period for updating the password library is reached, detecting whether the historical password information, the user information and the basic weak password information have updating information or not;
when the update information exists, acquiring the service type information of the target service, and determining a target generation algorithm corresponding to the target service according to the service type information;
generating a plurality of second weak passwords according to the target generation algorithm according to the basic information and the updating information;
and storing the second weak password and the target service in association with each other into a weak password group corresponding to the target service in the password library.
In an optional manner, the target weak password generation rule includes a target weak password length rule, a target weak password strength rule, and a target weak password calculation rule;
generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information, and the method comprises the following steps:
and calculating the historical password information, the user information and the basic weak password information according to the basic information and the target weak password length rule, the weak password strength rule and the weak password calculation rule to obtain a plurality of first weak passwords.
In an optional manner, the target weak password generation rule is a target regular expression corresponding to the service type information and including a target weak password length rule, a target weak password strength rule and a target weak password calculation rule;
generating a plurality of first weak passwords according to the target weak password generation rule according to the basic information, and further comprising:
and generating a plurality of first weak passwords through the target regular expression according to the basic information.
In an optional manner, generating a plurality of first weak passwords according to the target weak password generation rule according to the basic information, further includes:
and generating a plurality of first weak passwords through the target regular expression according to the basic information.
Obtaining service type information of a target service, determining a target weak password generation rule corresponding to the target service according to the service type information, and further comprising:
acquiring service type information of a target service; determining a target security level corresponding to the target service according to the service type information;
and determining a target weak password generation rule corresponding to the target security level.
According to another aspect of the embodiments of the present invention, there is provided a password detection method, including:
receiving setting information of a password to be detected input by a user, wherein the setting information comprises a target service corresponding to the password to be detected and the password to be detected;
determining a weak password group corresponding to the target service according to the service type information of the target service;
detecting whether a weak password matched with the password to be detected exists in the weak password group, wherein the weak password group comprises historical password information, user information, basic weak password information and a first weak password, and the first weak password is generated according to the self-adaptive weak password generation method;
and when the weak password matched with the password to be detected exists in the password library, determining that the password to be detected is the weak password.
According to another aspect of the embodiments of the present invention, there is provided an adaptive weak password generation apparatus, including:
the basic information acquisition module is used for acquiring basic information, wherein the basic information comprises historical password information, user information and basic weak password information;
the generation rule determining module is used for acquiring the service type information of the target service and determining a target weak password generation rule corresponding to the target service according to the service type information;
the weak password generation module is used for generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information;
and the storage module is used for storing the first weak password and the service type information of the target service in a password library in a correlated manner in a weak password group corresponding to the target service, wherein historical password information, user information and basic weak password information are stored in the password group.
According to another aspect of the embodiments of the present invention, there is provided a password detection apparatus, including:
the system comprises a receiving module, a password processing module and a password processing module, wherein the receiving module is used for receiving setting information of a password to be detected, which is input by a user, and the setting information comprises a target service corresponding to the password to be detected and the password to be detected;
the group determining module is used for determining a weak password group corresponding to the target service according to the service type information of the target service;
the detection module is used for detecting whether a weak password matched with the password to be detected exists in the weak password group, wherein the weak password group comprises historical password information, user information, basic weak password information and a first weak password, and the first weak password is generated according to the self-adaptive weak password generation method or the self-adaptive weak password generation device;
and the result determining module is used for determining that the password to be detected is a weak password when the weak password matched with the password to be detected exists in the password library.
According to another aspect of the embodiments of the present invention, there is provided an electronic device including:
the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operation of the self-adaptive weak password generation method or the password detection method.
According to another aspect of the embodiments of the present invention, there is provided a computer-readable storage medium having at least one executable instruction stored therein, where the executable instruction causes an electronic device to perform the operations of the adaptive weak password generation method or the password detection method.
According to the embodiment of the invention, different weak passwords with different weak password generation rules are set according to different service types, so that one website or system can adapt to the security requirements of different service scenes, the system security is improved, different service requirements are met, and the user experience is improved.
In addition, the updating information of the user is obtained by setting the updating period, and the weak password is further generated by using the updating information, so that the beneficial effects of actively finding and automatically updating the weak password library and responding to the security threat brought by the weak password in time are achieved.
The foregoing description is only an overview of the technical solutions of the embodiments of the present invention, and the embodiments of the present invention can be implemented according to the content of the description in order to make the technical means of the embodiments of the present invention more clearly understood, and the detailed description of the present invention is provided below in order to make the foregoing and other objects, features, and advantages of the embodiments of the present invention more clearly understandable.
Drawings
The drawings are only for purposes of illustrating embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart illustrating an adaptive weak password generation method according to an embodiment of the present invention;
FIG. 2 is a flow chart of a password detection method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an adaptive weak password generation apparatus provided in an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a password detection apparatus provided in an embodiment of the present invention;
fig. 5 shows a schematic structural diagram of an electronic device provided in an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein.
Fig. 1 shows a flowchart of an embodiment of the adaptive weak password generation method of the present invention, which is executed by an electronic device, and it is understood that the electronic device may be a computer device, a mobile phone, a terminal, or the like. As shown in fig. 1, the method comprises the steps of:
step S110: and acquiring basic information, wherein the basic information comprises historical password information, user information and basic weak password information.
The historical password information comprises a password historically set by a user in a target service to be set with a weak password.
The user information comprises information such as user name, mobile phone number, identity card number and the like of the user. In an embodiment of the present invention, the user information further includes location information such as a registration address and a common address of the user.
The base weak cipher information may include weak cipher information that is now stored in a weak cipher library.
Step S120: acquiring the service type information of the target service, and determining a target weak password generation rule corresponding to the target service according to the service type information.
The target service of the embodiment of the present invention may be one or more service modules in the system, such as a login service module, an inquiry service module, a payment service module, an information modification service module, and the like. The adaptive weak password generation method can be applied to the password setting of a plurality of service modules in one system. Therefore, each service in the system corresponds to a password generation rule, and the target service corresponds to a target weak password generation rule.
The target weak password generation rule comprises a target weak password length rule, a target weak password strength rule and a target weak password calculation rule. The target weak password length rule sets the length of the password required to be set by the target service, and the embodiment of the invention does not specifically limit the target weak password length rule. For example, one embodiment may be no less than the target length. For example, for a login scene of a shopping website, the weak password length may be no less than 6 digits, letters or special symbols; for a payment scenario, the weak password may be no less than 8 digits, letters, or special symbols in length. The embodiment of the invention does not specifically limit the target weak password strength rule. For example, in one possible implementation, the target weak password strength rule may be "the password needs to be a combination of capital letters, lowercase letters and numbers", "the password needs to be a combination of any three of capital letters, lowercase letters, special characters and numbers", and so on. The target weak password calculation rule can be obtained by combining one or more information of historical password information, user information and basic weak password information in the basic information.
In a specific embodiment of the present invention, each service is correspondingly set with a security level, and corresponding generation rules can be correspondingly set for a plurality of services in a system according to the corresponding security levels. Specifically, the following steps may be included:
s1201: and acquiring the service type information of the target service. The service type information may be a service type identifier. For example, for a shopping website, service identification such as login browsing and payment can be divided.
S1202: determining a target security level corresponding to the target service according to the service type information; and determining a target weak password generation rule corresponding to the target security level.
By setting corresponding security levels for different services, the corresponding security levels for different services are different, and each security level corresponds to different weak cipher length rules, weak cipher strength rules and weak cipher calculation rules. And setting a lower security level for the target service with lower security requirement, for example, when a shopping website is browsed, the user can rapidly log in by adopting the lower security level. When shopping payment is carried out on the shopping website, a higher security level is required, and a user can carry out payment operation only by setting a higher-level password. Through the arrangement, one website or system can be adaptive to different service scenes, different service requirements are met, and therefore user experience is improved.
In a specific embodiment of the present invention, the corresponding password rule is further generated according to the registered address, the commonly used address and the current address information in the user information. Specifically, for a registered address which is a common address, such as a home address or an office address, a target weak password generation rule can be set only according to the target service; when the registered address is a temporary address, such as an address of an internet bar, the target weak password generation rule corresponding to the target service is adjusted, the generation rule of the target weak password is upgraded, the security strength of the target weak password is improved, a new target weak password generation rule is determined, and a plurality of weak passwords are generated according to the new target weak password generation rule, so that the security strength of the set password input by the user is improved.
Step S130: and generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information.
And according to a target weak password generation rule, combining one or more information of the history password information, the user information and the basic weak password information in the basic information to obtain a plurality of first weak passwords.
In one embodiment of the present invention, one or more of the historical password information, the user information, and the basic weak password information may be a plurality of first weak passwords combined in a combination manner of AABB, ABAB, ABCD, and the like. Or a plurality of first weak passwords formed by combining the pinyin of the user name, the last four digits of the mobile phone number or the last four digits of the identity card and the like in combination modes of AABB, ABAB, ABCD and the like, wherein the pinyin of the user name, the last four digits of the mobile phone number or the last four digits of the identity card and the like are included in the user information. The specific combination mode can be set according to the target security level of the target service. For example, for the login service, the security level required is low, so the target weak password generation rule is simple, the target is generated, and the weak password in the corresponding weak password group is also the password with the low security level. For example, the weak password in the corresponding weak password group may be one of historical password information, user information, and basic weak password information. For the payment service, the required security level is higher, so the target weak password generation rule needs to perform complex combination besides the simple historical password information, the user information, the basic weak password information and the simple combination thereof, for example, the target weak password generation rule can be a plurality of first weak passwords formed by combining one or more information of the historical password information, the user information and the basic weak password information in a combination manner of AABB, ABAB, ABCD and the like.
In the embodiment of the present invention, according to the basic information, the generation of the plurality of first weak passwords according to the target weak password generation rule may be implemented by a target regular expression including a target weak password length rule, a target weak password strength rule, and a target weak password calculation rule.
The regular expression is a logic formula for operating character strings, which is a 'regular character string' formed by using predefined characters and the combination of the characters, and is used for expressing a filtering logic for the character strings, wherein the character strings comprise common characters and special characters. The regular grammar refers to the grammar of a regular expression, and the regular grammar refers to the operation logic of the character string. A regular expression is a text pattern that describes one or more strings of characters to be matched when searching for text.
Therefore, the program can be written and the regular expression can be written according to the target weak password generation rule. The specific implementation process is as follows: and acquiring a regular expression of the target weak password generation rule, wherein the regular expression is expressed by using Chinese keywords, and the Chinese keywords can be acquired from the description of the characters in the regular grammar. The target weak password generation rule can comprise simpler historical password information, user information, basic weak password information and simple combination thereof, and one or more of the historical password information, the user information and the basic weak password information are combined in combination modes such as AABB, ABAB, ABCD and the like. Therefore, the Chinese keywords in the target weak password generation rule can be obtained. The method comprises the steps of obtaining the description of the character form of the regular grammar corresponding to the Chinese key words of each target weak password generation rule in the regular expression, converting each Chinese key word in the regular expression into the character corresponding to the Chinese key word according to the description of the character form of the regular grammar corresponding to the obtained Chinese key word to generate the regular expression of the character form, and accordingly obtaining the target regular expression corresponding to the target weak password required by the computer. And performing associated storage on the target regular expression corresponding to the target weak password and the description information corresponding to the target regular expression. In the embodiment of the invention, the target regular expression is also packaged into a jar packet, so that a universal weak password generation calling tool is formed, a system administrator can adapt to weak password generation of corresponding services in the system by adaptively modifying information in jar, and the effect of adapting to various systems and service scenes is achieved.
In another embodiment of the present invention, the target weak password generation rule may be further implemented by a weak password calculation framework, and the weak password calculation framework is packaged into jar packets, so as to form a universal weak password generation invoking tool, and a system administrator may adapt to weak password generation of a corresponding service in a system by adaptively modifying information in jar, thereby achieving an effect of adapting to various systems and service scenarios. Specifically, the weak cryptographic computing architecture includes a presentation layer, a service layer, and a data layer.
The display layer provides weak cipher algorithm management and configuration management functions, and manages built-in target weak cipher generation rules (weak cipher algorithms) or target weak cipher generation rules (weak cipher algorithms) developed based on standard architecture and related configuration contents. The service layer can be a server and is used for providing a process management engine, performing off-line or real-time calculation and collecting calculation results, wherein data such as personal information data, personal password data, safety information data and risk information data of other data sources can be introduced for data calculation. The data layer provides a relational database for persistence, stores data such as configuration and the like, provides a non-relational database or a cache database for user data calculation, stores process data in various calculations, and ensures data safety and performance.
Step 140: and storing the first weak password and the service type information of the target service in a password library in a correlated manner in a weak password group corresponding to the target service, wherein historical password information, user information and basic weak password information are stored in the password group.
The weak password library is stored with historical password information, user information and basic weak password information, and also stores weak password groups associated with service type information, and different services correspond to different weak password groups. Therefore, after the plurality of first weak passwords are generated, the plurality of first weak passwords are updated to the weak password group corresponding to the target service. In addition to the plurality of weak passwords generated according to the target weak password generation rule, the weak password group of the embodiment of the invention also comprises a plurality of existing weak passwords with lower security than the first weak password passing through the target weak password generation rule. The existing weak password may be one or more of historical password information, user information, and basic weak password information, and a plurality of weak passwords generated by combining the existing weak password generation rules. It is to be understood that the existing weak password may be various weak passwords having a security lower than or equal to the first weak password.
The service type information and the associated weak password group can be stored in association with the user information. The information such as the user ID or the user name can be stored in association with the service type information and the weak password group, so that the weak password group of the user under the target service is determined.
In one embodiment of the invention, the updating of the password library is also performed regularly by setting the time period for updating the password library. The method comprises the following steps:
determining whether a time period for the cryptographic library update has been reached.
And when the time period for updating the password library is reached, detecting whether the historical password information, the user information and the basic weak password information have updating information.
And when the update information exists, acquiring the service type information of the target service, and determining a target generation algorithm corresponding to the target service according to the service type information.
And generating a plurality of second weak passwords according to the target generation algorithm according to the basic information and the updating information.
And storing the second weak password and the target service in association with each other into a weak password group corresponding to the target service in the password library.
By setting the time period for updating the password library, the system can actively discover the historical password information of the user, the user information and the updating information of the basic weak password information, so that the response is timely performed, and the security threat caused by untimely updating of the weak password after the information is updated is reduced. For example, when the mobile phone number of the user is changed, if the update is not detected in time, when the user sets the password, the changed mobile phone number will not be used as a weak password, so that the user may set the account password as the mobile phone number or a combination of the name and the last four digits of the mobile phone number, and the like, thereby the password set by the user is easy to crack, and potential safety hazards exist.
According to the embodiment of the invention, different weak passwords with different weak password generation rules are set according to different service types, so that one website or system can adapt to the security requirements of different service scenes, the security of password setting in the system is improved in a targeted manner, different service requirements are met, and the user experience is improved.
In addition, the updating information of the user is obtained by setting the updating period, and the weak password is further generated by using the updating information, so that the beneficial effects of actively finding and automatically updating the weak password library and responding to the security threat brought by the weak password in time are achieved.
Referring to fig. 2, a flow chart of a password detection method according to an embodiment of the invention is shown. The method is performed by an electronic device. As shown in fig. 2, the method comprises the steps of:
step 210: receiving setting information of a password to be detected input by a user, wherein the setting information comprises a target service corresponding to the password to be detected and the password to be detected.
When the user does not set the password and the system detects that the user uses the target service, or when the user modifies the password of the target service, the setting information input by the user is obtained.
The setting information comprises the password to be detected, the user information and the service type information of the corresponding target service. The service type information may be a service identifier, such as a service name. The user information may be user identification information such as a user ID, a user name, and the like.
Step 220: and determining a weak password group corresponding to the target service according to the service type information of the target service.
The weak password group corresponding to the target service of the user is stored in the password library, so that the weak password group corresponding to the target service of the user is obtained from the password library according to the user information and the target service, and the password to be detected input by the user is matched with the password in the weak password group.
Step 230: and detecting whether a weak password matched with the password to be detected exists in the weak password group, wherein the weak password group comprises historical password information, user information, basic weak password information and a first weak password, and the first weak password is generated according to the self-adaptive weak password generation method.
The step flow of the first weak password generation method is the same as that of the adaptive weak password generation method, and details are not repeated here.
Step 240: and when the weak password matched with the password to be detected exists in the password library, determining that the password to be detected is the weak password.
The weak passwords in the weak password group of the target service are traversed in the password library, and when the weak password matched with the password to be detected exists in the password library, the security of the password to be detected set by the user under the target service is relatively weak, so that the user needs to be reminded to modify the password. When the weak password matched with the password to be detected does not exist in the password library, the security of the password to be detected input by the user is in accordance with the security level requirement corresponding to the target service in the system, and the password can be set as the password of the user under the target service.
According to the embodiment of the invention, different weak passwords with different weak password generation rules are set according to different service types, so that one website or system can adapt to the security requirements of different service scenes, the security of password setting in the system is improved in a targeted manner, different service requirements are met, and the user experience is improved.
In addition, the updating information of the user is obtained by setting the updating period, and the weak password is further generated by using the updating information, so that the beneficial effects of actively finding and automatically updating the weak password library and responding to the security threat brought by the weak password in time are achieved.
Fig. 3 is a schematic structural diagram illustrating an adaptive weak password generation apparatus according to an embodiment of the present invention. As shown in fig. 3, the apparatus 300 includes: a basic information acquisition module 310, a generation rule determination module 320, a weak password generation module 330, and a storage module 340.
The basic information obtaining module 310 is configured to obtain basic information, where the basic information includes historical password information, user information, and basic weak password information.
The generation rule determining module 320 is configured to obtain service type information of a target service, and determine a target weak password generation rule corresponding to the target service according to the service type information.
And a weak password generating module 330, configured to generate a plurality of first weak passwords according to the basic information and according to the target weak password generating rule, where the target weak password generating rule is a combination rule of the historical password information, the user information, and the basic weak password information.
The storage module 340 is configured to store the first weak password and the service type information of the target service in a password library in association with a weak password group corresponding to the target service, where historical password information, user information, and basic weak password information are stored in the password group.
The specific working process of the adaptive weak password generation apparatus 300 is the same as the step flow of the adaptive weak password generation method, and is not described herein again.
According to the embodiment of the invention, different weak passwords with different weak password generation rules are set according to different service types, so that one website or system can adapt to the security requirements of different service scenes, the security of password setting in the system is improved in a targeted manner, different service requirements are met, and the user experience is improved.
In addition, the updating information of the user is obtained by setting the updating period, and the weak password is further generated by using the updating information, so that the beneficial effects of actively finding and automatically updating the weak password library and responding to the security threat brought by the weak password in time are achieved.
Fig. 4 is a schematic structural diagram of a password detection apparatus according to an embodiment of the present invention. As shown in fig. 4, the apparatus 400 includes: a receiving module 410, a group determination module 420, a detection module 430, and a result determination module 440.
The receiving module 410 is configured to receive setting information of a password to be detected, where the setting information includes a target service corresponding to the password to be detected and the password to be detected.
A group determining module 420, configured to determine, according to the service type information of the target service, a weak password group corresponding to the target service.
The detection module 430 is configured to detect whether a weak password matching the password to be detected exists in the weak password group, where the weak password group includes historical password information, user information, basic weak password information, and a first weak password, and the first weak password is generated by the adaptive weak password generation method or the adaptive weak password generation apparatus. The step flow of the first weak password generation method is the same as that of the adaptive weak password generation method, and details are not repeated here.
And the result determining module 440 is configured to determine that the password to be detected is a weak password when the weak password matching the password to be detected exists in the password library.
The specific working process of the password detection apparatus 400 is the same as the above-mentioned password detection process, and is not described herein again.
According to the embodiment of the invention, different weak passwords with different weak password generation rules are set according to different service types, so that one website or system can adapt to the security requirements of different service scenes, the security of password setting in the system is improved in a targeted manner, different service requirements are met, and the user experience is improved.
In addition, the updating information of the user is obtained by setting the updating period, and the weak password is further generated by using the updating information, so that the beneficial effects of actively finding and automatically updating the weak password library and responding to the security threat brought by the weak password in time are achieved.
Fig. 5 is a schematic structural diagram of an embodiment of the electronic device according to the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the electronic device.
As shown in fig. 5, the electronic device may include: a processor (processor)502, a Communications Interface 504, a memory 506, and a communication bus 508.
Wherein: the processor 502, communication interface 504, and memory 506 communicate with one another via a communication bus 508. A communication interface 504 for communicating with network elements of other devices, such as clients or other servers. The processor 502 is configured to execute the program 510, and may specifically perform the relevant steps in the foregoing adaptive weak password generation method or password detection method embodiment.
In particular, program 510 may include program code comprising computer-executable instructions.
The processor 502 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement an embodiment of the invention. The electronic device comprises one or more processors, which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 506 for storing a program 510. The memory 506 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
Specifically, the program 510 may be invoked by the processor 502 to cause the electronic device to perform the following operations:
acquiring basic information, wherein the basic information comprises historical password information, user information and basic weak password information;
acquiring service type information of a target service, and determining a target weak password generation rule corresponding to the target service according to the service type information;
generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information;
and storing the first weak password and the service type information of the target service in a password library in a correlated manner in a weak password group corresponding to the target service, wherein historical password information, user information and basic weak password information are stored in the password group.
In an optional manner, the method further comprises:
determining whether a time period for the cryptographic library update has been reached;
when the time period for updating the password library is reached, detecting whether the historical password information, the user information and the basic weak password information have updating information or not;
when the update information exists, acquiring the service type information of the target service, and determining a target generation algorithm corresponding to the target service according to the service type information;
generating a plurality of second weak passwords according to the target generation algorithm according to the basic information and the updating information;
and storing the second weak password and the target service in association with each other into a weak password group corresponding to the target service in the password library.
In an optional manner, the target weak password generation rule includes a target weak password length rule, a target weak password strength rule, and a target weak password calculation rule;
generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information, and the method comprises the following steps:
and calculating the historical password information, the user information and the basic weak password information according to the basic information and the target weak password length rule, the weak password strength rule and the weak password calculation rule to obtain a plurality of first weak passwords.
In an optional manner, the target weak password generation rule is a target regular expression corresponding to the service type information and including a target weak password length rule, a target weak password strength rule and a target weak password calculation rule;
generating a plurality of first weak passwords according to the target weak password generation rule according to the basic information, and further comprising:
and generating a plurality of first weak passwords through the target regular expression according to the basic information.
In an optional manner, generating a plurality of first weak passwords according to the target weak password generation rule according to the basic information, further includes:
and generating a plurality of first weak passwords through the target regular expression according to the basic information.
Obtaining service type information of a target service, determining a target weak password generation rule corresponding to the target service according to the service type information, and further comprising:
acquiring service type information of a target service; determining a target security level corresponding to the target service according to the service type information;
and determining a target weak password generation rule corresponding to the target security level.
The specific working process of the electronic device is the same as the specific steps of the adaptive weak password generation method or the password detection method, and is not described herein again.
According to the embodiment of the invention, different weak passwords with different weak password generation rules are set according to different service types, so that one website or system can adapt to the security requirements of different service scenes, the security of password setting in the system is improved in a targeted manner, different service requirements are met, and the user experience is improved.
In addition, the updating information of the user is obtained by setting the updating period, and the weak password is further generated by using the updating information, so that the beneficial effects of actively finding and automatically updating the weak password library and responding to the security threat brought by the weak password in time are achieved.
An embodiment of the present invention provides a computer-readable storage medium, where the storage medium stores at least one executable instruction, and when the executable instruction is executed on an electronic device, the electronic device executes an adaptive weak password generation method or a password detection method in any of the above method embodiments.
The executable instructions may be specifically configured to cause the electronic device to perform the following operations:
acquiring basic information, wherein the basic information comprises historical password information, user information and basic weak password information;
acquiring service type information of a target service, and determining a target weak password generation rule corresponding to the target service according to the service type information;
generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information;
and storing the first weak password and the service type information of the target service in a password library in a correlated manner in a weak password group corresponding to the target service, wherein historical password information, user information and basic weak password information are stored in the password group.
In an optional manner, the method further comprises:
determining whether a time period for the cryptographic library update has been reached;
when the time period for updating the password library is reached, detecting whether the historical password information, the user information and the basic weak password information have updating information or not;
when the update information exists, acquiring the service type information of the target service, and determining a target generation algorithm corresponding to the target service according to the service type information;
generating a plurality of second weak passwords according to the target generation algorithm according to the basic information and the updating information;
and storing the second weak password and the target service in association with each other into a weak password group corresponding to the target service in the password library.
In an optional manner, the target weak password generation rule includes a target weak password length rule, a target weak password strength rule, and a target weak password calculation rule;
generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information, and the method comprises the following steps:
and calculating the historical password information, the user information and the basic weak password information according to the basic information and the target weak password length rule, the weak password strength rule and the weak password calculation rule to obtain a plurality of first weak passwords.
In an optional manner, the target weak password generation rule is a target regular expression corresponding to the service type information and including a target weak password length rule, a target weak password strength rule and a target weak password calculation rule;
generating a plurality of first weak passwords according to the target weak password generation rule according to the basic information, and further comprising:
and generating a plurality of first weak passwords through the target regular expression according to the basic information.
In an optional manner, generating a plurality of first weak passwords according to the target weak password generation rule according to the basic information, further includes:
and generating a plurality of first weak passwords through the target regular expression according to the basic information.
Obtaining service type information of a target service, determining a target weak password generation rule corresponding to the target service according to the service type information, and further comprising:
acquiring service type information of a target service; determining a target security level corresponding to the target service according to the service type information;
and determining a target weak password generation rule corresponding to the target security level.
The specific implementation process of each specific step in the medium is the same as the specific steps of the adaptive weak password generation method or the password detection method, and is not described herein again.
According to the embodiment of the invention, different weak passwords with different weak password generation rules are set according to different service types, so that one website or system can adapt to the security requirements of different service scenes, the security of password setting in the system is improved in a targeted manner, different service requirements are met, and the user experience is improved.
In addition, the updating information of the user is obtained by setting the updating period, and the weak password is further generated by using the updating information, so that the beneficial effects of actively finding and automatically updating the weak password library and responding to the security threat brought by the weak password in time are achieved.
The embodiment of the invention provides a self-adaptive weak password generation device, which is used for executing the password detection self-adaptive weak password generation method.
The embodiment of the invention provides a password detection device, which is used for executing the password detection method.
Embodiments of the present invention provide a computer program that can be invoked by a processor to enable an electronic device to perform an adaptive weak password generation method or a password detection method in any of the above method embodiments.
Embodiments of the present invention provide a computer program product comprising a computer program stored on a computer-readable storage medium, the computer program comprising program instructions that, when run on a computer, cause the computer to perform the adaptive weak password generation method or the password detection method of any of the above-mentioned method embodiments.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specified otherwise.

Claims (10)

1. An adaptive weak password generation method, the method comprising:
acquiring basic information, wherein the basic information comprises historical password information, user information and basic weak password information;
acquiring service type information of a target service, and determining a target weak password generation rule corresponding to the target service according to the service type information;
generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information;
and storing the first weak password and the service type information of the target service in a password library in a correlated manner in a weak password group corresponding to the target service, wherein historical password information, user information and basic weak password information are stored in the password group.
2. The method of claim 1, further comprising:
determining whether a time period for the cryptographic library update has been reached;
when the time period for updating the password library is reached, detecting whether the historical password information, the user information and the basic weak password information have updating information or not;
when the update information exists, acquiring the service type information of the target service, and determining a target generation algorithm corresponding to the target service according to the service type information;
generating a plurality of second weak passwords according to the target generation algorithm according to the basic information and the updating information;
and storing the second weak password and the target service in association with each other into a weak password group corresponding to the target service in the password library.
3. The method of claim 1, wherein the target weak cipher generation rule comprises a target weak cipher length rule, a target weak cipher strength rule, and a target weak cipher calculation rule;
generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information, and the method comprises the following steps:
and calculating the historical password information, the user information and the basic weak password information according to the basic information and the target weak password length rule, the weak password strength rule and the weak password calculation rule to obtain a plurality of first weak passwords.
4. The method according to claim 3, wherein the target weak cipher generation rule is a target regular expression corresponding to the service type information and including a target weak cipher length rule, a target weak cipher strength rule and a target weak cipher calculation rule;
generating a plurality of first weak passwords according to the target weak password generation rule according to the basic information, and further comprising:
and generating a plurality of first weak passwords through the target regular expression according to the basic information.
5. The method of claim 1, wherein service type information of a target service is obtained, and a target weak password generation rule corresponding to the target service is determined according to the service type information, and further comprising:
acquiring service type information of a target service; determining a target security level corresponding to the target service according to the service type information;
and determining a target weak password generation rule corresponding to the target security level.
6. A password detection method, the method comprising:
receiving setting information of a password to be detected input by a user, wherein the setting information comprises a target service corresponding to the password to be detected and the password to be detected;
determining a weak password group corresponding to the target service according to the service type information of the target service;
detecting whether a weak password matched with the password to be detected exists in the weak password group, wherein the weak password group comprises historical password information, user information, basic weak password information and a first weak password, and the first weak password is generated according to the self-adaptive weak password generation method of any one of claims 1 to 5;
and when the weak password matched with the password to be detected exists in the password library, determining that the password to be detected is the weak password.
7. An adaptive weak cipher generation apparatus, comprising:
the basic information acquisition module is used for acquiring basic information, wherein the basic information comprises historical password information, user information and basic weak password information;
the generation rule determining module is used for acquiring the service type information of the target service and determining a target weak password generation rule corresponding to the target service according to the service type information;
the weak password generation module is used for generating a plurality of first weak passwords according to the basic information and the target weak password generation rule, wherein the target weak password generation rule is a combination rule of the historical password information, the user information and the basic weak password information;
and the storage module is used for storing the first weak password and the service type information of the target service in a password library in a correlated manner in a weak password group corresponding to the target service, wherein historical password information, user information and basic weak password information are stored in the password group.
8. A password detection apparatus, characterized in that the apparatus comprises:
the system comprises a receiving module, a password processing module and a password processing module, wherein the receiving module is used for receiving setting information of a password to be detected, which is input by a user, and the setting information comprises a target service corresponding to the password to be detected and the password to be detected;
the group determining module is used for determining a weak password group corresponding to the target service according to the service type information of the target service;
a detection module, configured to detect whether a weak password matching the password to be detected exists in the weak password group, where the weak password group includes historical password information, user information, basic weak password information, and a first weak password, and the first weak password is generated by the adaptive weak password generation method according to any one of claims 1 to 5 or the adaptive weak password generation apparatus according to claim 7;
and the result determining module is used for determining that the password to be detected is a weak password when the weak password matched with the password to be detected exists in the password library.
9. An electronic device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is configured to store at least one executable instruction that causes the processor to perform the operations of the adaptive weak password generation method of any one of claims 1 to 5 or the password detection method of claim 6.
10. A computer-readable storage medium having stored therein at least one executable instruction that, when executed on an electronic device, causes the electronic device to perform the operations of the adaptive weak password generation method of any one of claims 1 to 5 or the password detection method of claim 6.
CN202010738612.6A 2020-07-28 2020-07-28 Weak password generation method, password detection method, device and electronic equipment Pending CN111859368A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010738612.6A CN111859368A (en) 2020-07-28 2020-07-28 Weak password generation method, password detection method, device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010738612.6A CN111859368A (en) 2020-07-28 2020-07-28 Weak password generation method, password detection method, device and electronic equipment

Publications (1)

Publication Number Publication Date
CN111859368A true CN111859368A (en) 2020-10-30

Family

ID=72947998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010738612.6A Pending CN111859368A (en) 2020-07-28 2020-07-28 Weak password generation method, password detection method, device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111859368A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112329003A (en) * 2020-11-06 2021-02-05 上海湖顶大数据科技有限公司 Method and system for generating safe and easy-to-remember password
CN112487147A (en) * 2020-12-02 2021-03-12 中国电子科技集团公司第三十研究所 Automatic matching method, system, computer program and storage medium for password cracking algorithm
CN112613028A (en) * 2020-12-29 2021-04-06 北京天融信网络安全技术有限公司 Weak password detection method and device, electronic equipment and readable storage medium
CN112685782A (en) * 2021-01-04 2021-04-20 浪潮云信息技术股份公司 Distributed login control method and system realized based on cache database
CN114448614A (en) * 2021-12-22 2022-05-06 天翼云科技有限公司 Weak password detection method, device, system and storage medium
CN114978752A (en) * 2022-06-17 2022-08-30 北京安博通金安科技有限公司 Weak password detection method and device, electronic equipment and computer readable storage medium
CN115242508A (en) * 2022-07-22 2022-10-25 中国银行股份有限公司 Account password modification method and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130318578A1 (en) * 2012-05-24 2013-11-28 Ca, Inc. Password management and smart honey pot system
CN106682489A (en) * 2015-11-09 2017-05-17 广州市动景计算机科技有限公司 Password security detection method, password security reminding method and corresponding devices
CN108809895A (en) * 2017-04-27 2018-11-13 腾讯科技(深圳)有限公司 The detection method and device of weak passwurd
CN109246111A (en) * 2018-09-18 2019-01-18 郑州云海信息技术有限公司 A kind of detection method and device of network equipment telnet weak passwurd
CN109361518A (en) * 2018-10-16 2019-02-19 杭州安恒信息技术股份有限公司 A kind of weak passwurd detection method, device and computer readable storage medium
CN110084034A (en) * 2019-05-06 2019-08-02 重庆天蓬网络有限公司 A kind of cipher set-up method, storage medium and electronic equipment based on weak passwurd detection
CN110826051A (en) * 2019-10-14 2020-02-21 广州江南科友科技股份有限公司 Weak password detection method, device, medium and terminal equipment
CN110874490A (en) * 2019-11-21 2020-03-10 广州西麦科技股份有限公司 Weak password detection method, system and storage medium for Dameng database
CN111447204A (en) * 2020-03-24 2020-07-24 深信服科技股份有限公司 Weak password detection method, device, equipment and medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130318578A1 (en) * 2012-05-24 2013-11-28 Ca, Inc. Password management and smart honey pot system
CN106682489A (en) * 2015-11-09 2017-05-17 广州市动景计算机科技有限公司 Password security detection method, password security reminding method and corresponding devices
CN108809895A (en) * 2017-04-27 2018-11-13 腾讯科技(深圳)有限公司 The detection method and device of weak passwurd
CN109246111A (en) * 2018-09-18 2019-01-18 郑州云海信息技术有限公司 A kind of detection method and device of network equipment telnet weak passwurd
CN109361518A (en) * 2018-10-16 2019-02-19 杭州安恒信息技术股份有限公司 A kind of weak passwurd detection method, device and computer readable storage medium
CN110084034A (en) * 2019-05-06 2019-08-02 重庆天蓬网络有限公司 A kind of cipher set-up method, storage medium and electronic equipment based on weak passwurd detection
CN110826051A (en) * 2019-10-14 2020-02-21 广州江南科友科技股份有限公司 Weak password detection method, device, medium and terminal equipment
CN110874490A (en) * 2019-11-21 2020-03-10 广州西麦科技股份有限公司 Weak password detection method, system and storage medium for Dameng database
CN111447204A (en) * 2020-03-24 2020-07-24 深信服科技股份有限公司 Weak password detection method, device, equipment and medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112329003A (en) * 2020-11-06 2021-02-05 上海湖顶大数据科技有限公司 Method and system for generating safe and easy-to-remember password
CN112329003B (en) * 2020-11-06 2023-12-29 上海湖顶大数据科技有限公司 Method and system for generating password with good security
CN112487147A (en) * 2020-12-02 2021-03-12 中国电子科技集团公司第三十研究所 Automatic matching method, system, computer program and storage medium for password cracking algorithm
CN112487147B (en) * 2020-12-02 2023-05-23 中国电子科技集团公司第三十研究所 Automatic matching method, system, computer program and storage medium for password cracking algorithm
CN112613028A (en) * 2020-12-29 2021-04-06 北京天融信网络安全技术有限公司 Weak password detection method and device, electronic equipment and readable storage medium
CN112685782A (en) * 2021-01-04 2021-04-20 浪潮云信息技术股份公司 Distributed login control method and system realized based on cache database
CN114448614A (en) * 2021-12-22 2022-05-06 天翼云科技有限公司 Weak password detection method, device, system and storage medium
CN114978752A (en) * 2022-06-17 2022-08-30 北京安博通金安科技有限公司 Weak password detection method and device, electronic equipment and computer readable storage medium
CN115242508A (en) * 2022-07-22 2022-10-25 中国银行股份有限公司 Account password modification method and device

Similar Documents

Publication Publication Date Title
CN111859368A (en) Weak password generation method, password detection method, device and electronic equipment
JP2020030866A (en) Sensitive information processing method, device and server, and security determination system
CN110602052B (en) Micro-service processing method and server
KR102151862B1 (en) Service processing method and device
US10715320B2 (en) Password generation with key and derivation parameter
US10142308B1 (en) User authentication
US20090187442A1 (en) Feedback augmented object reputation service
CN109213781B (en) Wind control data query method and device
CN107003976A (en) Based on active rule can be permitted determine that activity can be permitted
US9639689B1 (en) User authentication
CN107688733B (en) Service interface calling method, device, user terminal and readable storage medium
CN110704816A (en) Interface cracking recognition method, device, equipment and storage medium
US20180357404A1 (en) Information processing method and apparatus, and electronic device
CN113946560A (en) Database security management method and system
CN114595481A (en) Method, device, equipment and storage medium for processing response data
CN112073407A (en) System, method and storage medium for real-time judgment of abnormal equipment in high-concurrency service
CN112804374B (en) Threat IP identification method, threat IP identification device, threat IP identification equipment and threat IP identification medium
CN109871260B (en) Multi-dimensional service current limiting method and system based on shared memory between containers
CN109992960B (en) Counterfeit parameter detection method and device, electronic equipment and storage medium
CN111953647A (en) Security verification method and device, electronic equipment and storage medium
CN114745280B (en) Asset information management method, device, equipment and readable storage medium
CN112351008B (en) Network attack analysis method and device, readable storage medium and computer equipment
CN113674083A (en) Internet financial platform credit risk monitoring method, device and computer system
CN114924783A (en) Interface calling method, device, equipment and storage medium of application program
JP2014524210A (en) Generate variable length nonce

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201030