CN108763918A - A kind of password reinforcement method based on semantic transforms - Google Patents

A kind of password reinforcement method based on semantic transforms Download PDF

Info

Publication number
CN108763918A
CN108763918A CN201810313942.3A CN201810313942A CN108763918A CN 108763918 A CN108763918 A CN 108763918A CN 201810313942 A CN201810313942 A CN 201810313942A CN 108763918 A CN108763918 A CN 108763918A
Authority
CN
China
Prior art keywords
password
user
algorithm
probability
semantic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810313942.3A
Other languages
Chinese (zh)
Inventor
何道敬
杨肖
吴宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
East China Normal University
Original Assignee
East China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by East China Normal University filed Critical East China Normal University
Priority to CN201810313942.3A priority Critical patent/CN108763918A/en
Publication of CN108763918A publication Critical patent/CN108763918A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a kind of, and the password based on semantic transforms reinforces method, including the matching of password blacklist, the segmentation of password strength assessment, password and password semantic transforms reinforce step.Wherein, password blacklist matching step:User's submission password is matched with existing password blacklist;Password strength assessment step:By the generating probability by user password is calculated compared with the probability threshold value of setting, assessment password is strong and weak;Password division step:After carrying out semantic analysis to weak passwurd, password is divided into several segments;Password semantic transforms reinforce step:It enables segment be converted by the predefined scaling method counterpart that becomes, strengthened password and original password is made to have certain similitude.By the present invention in that reducing user from the root cause with black list techniques uses weak passwurd, and password intensity is improved while ensureing password availability using password strength assessment and semantic analysis segmentation scheduling algorithm, the ability that password resists guessing attack is enhanced, the safety of password is improved.

Description

A kind of password reinforcement method based on semantic transforms
Technical field
The invention belongs to field of information security technology, more particularly to a kind of password based on semantic transforms reinforces method.
Background technology
With the deep propulsion of IT application process, password extensive utilization in current all kinds of computer systems, as guarantee The basic authentication means of user information safety, in a foreseeable future, password will be most important identification authentication mode.
The password of user needs to meet to be required of both availability and safety, and what availability was used to weigh password can Memorability, safety are used to weigh the property guessed of password.However the not enough information of most users ensures that their use Password whether safe enough, in order to ensure the safety of user password, the service of mainstream or website in user's registration and can repair When changing password, password generated strategy is provided(Password Creation Policies, PCP)Know that user password generates.
There is no the constraint of password generated strategy, user to often tend to using simple, unsafe password.Nineteen ninety-five, Bishop and Klein carries out dictionary attack to a series of encrypted passwords of the hash provided by system manager, from about 14000 It has been cracked in more passwords nearly, this illustrates that the password that a big chunk administrator generates is too simple.In order to cope with these feelings Condition, 2004, the portion of Burr etc. the report recommends that command identifying should apply some password generated strategies, and user is prevented to make With simple password.2012, Kelley etc. was analyzed by 7 different password generated strategies are influenced and generate 12000 The intensity of password, the password generated under the conditions of discovery is without any restrictions is much weaker than the password life of " password length is no less than 12 " At the password generated under strategy.2016, Shay etc. further study show that, using " length 12, at least two class characters " The password generated strategy of password generated strategy ratio " 8 bit lengths, at least three classes character " is more advantageous to the safety of password set.
One rational password generated strategy must simultaneously take account two aspect contents of availability and safety of password. Availability lays particular emphasis on the convenience and mnemonic that user uses password, and safety lays particular emphasis on password itself and resists guessing attack Ability.2007, Vu etc. was the study found that stringent password generated strategy can effectively resist guessing attack, but also carry High user create and using password difficulty.2013, there is very high possibility in the password of the discoveries such as Mazurek, high intensity Property is inputed by mistake by user.2015, Ur etc. was the study found that inappropriate password generated strategy that many services are taken is caused to user Heavy burden.The further investigation discovery such as Shay, the intensity of password and the availability of password not necessarily negative correlation, Suitable password generated strategy can not lose the availability of password while ensureing password intensity.
Invention content
It is an object of the invention to make up the deficiency of existing password reinforcement technology, by probability contexts index refinement and By carrying out semantic analysis to user password, a kind of password reinforcement method based on semantic transforms is provided, traditional mouth is being inherited While enabling the efficiency and robustness of reinforcement method, the potential weak passwurd that simple transformation generates is eliminated to a certain degree, is enhanced Password resists the ability of guessing attack, improves the safety of password.
Realizing the specific technical solution of the object of the invention is:
A kind of password reinforcement method based on semantic transforms, this method include step in detail below:
Step 1:Password blacklist matches
For the password that user submits, it is matched with predefined password blacklist;
Step 2:Password strength assessment
The probability occurred to user password using password strength assessment algorithm probability evaluation entity calculates, by that will calculate To probability compared with preset probability threshold value, provide the password intensity of user in the present invention;
Step 3:Password is segmented
Password semantic analysis is carried out in conjunction with the lexical data base password weaker to assessment result, by segmentation algorithm by password cutting At several password segments and composition fragment list;
Step 4:Password semantic transforms are reinforced
Password fragment list is converted by password semantic transforms algorithm, forms new password, repeats to walk using new password Rapid 2, step 3 and step 4, until new password strength assessment result is strong password.
In step 1 of the present invention blacklist generation method include but not limited to frequency of use successively decrease strategy to password into Row sequence, selects password in the top(Such as:Choose the password of ranking previous ten thousand)Generate password blacklist.
Step 1 of the present invention is specially:
Step A1:User password is matched with password blacklist;
Step A2:Directly refuse user password if successful match, terminates password enhance process;
Step A3:Password strength assessment is carried out if it fails to match.
Step 2 of the present invention is specially:
Step B1:Determine password strength assessment algorithm;
Step B2:Probability calculation is carried out to user password using password strength assessment algorithm;
Step B3:By the way that user password probability is compared to obtain the user password intensity with preset threshold value;
Step B4:Show that the user password is strong password, nothing if the user password probability of occurrence is less than preset threshold value It needs to reinforce, terminates password enhance process, user password is otherwise subjected to password segmentation;Wherein:
The password strength assessment algorithm includes but not limited to:Probability context-free algorithm, n rank Markov algorithms.
Step 3 of the present invention is specially:
Step C1:Determine lexical data base;
Step C2:According to lexical data base, semantic analysis is completed to password and password is segmented;
Step C3:Password list of fragments is generated according to segmentation result;Wherein:
The lexical data base includes but not limited to:COCA n-gram corpus and WordNet English glossary databases;
The strong segmentation method of password includes but not limited to:The password segmentation algorithm of maximal cover degree.
Step 4 of the present invention is specially:
Step D1:Determine password transforming algorithm;
Step D2:Password transforming is carried out to password list of fragments according to password transforming algorithm, obtains new password;Wherein:
The password transforming algorithm includes but not limited to:Password list of fragments is replaced, password list of fragments is added Add, password list is swapped.
The present invention eliminates user to a certain degree while inheriting the efficiency and robustness of conventional password reinforcement method The ability that password resists guessing attack is enhanced, is improved come potential weak passwurd by simple transformation in password The safety of password has ensured the information security and property safety of user.Meanwhile the present invention analyzes password semanteme, The availability that ensure that password while improving password intensity helps user to build intensity that is, while remembering convenient for user Higher password makes password security reach preferable balance with availability.And the present invention is in the base of conventional probability contexts It is refined on plinth, in user password strength assessment, making assessment result, more accurately, more truly reaction user password is strong Spend situation.
Description of the drawings
Fig. 1 is the flow chart of the present invention.
Specific implementation mode
In conjunction with following specific examples and attached drawing, the present invention is described in further detail.The process of the implementation present invention, Condition, experimental method etc. are among the general principles and common general knowledge in the art, this hair in addition to the following content specially referred to It is bright that content is not particularly limited.
The meaning that related technical term represents in the present invention is as follows:
Blacklist- blacklists
Pw- original user passwords
New password after pw`- reinforces
The probability of p (s)-passwords s
Thp- probability threshold values
List after token lists-password segmentation
Psm (pw)-user password assesses intensity
Wn- lexical data bases
G1=(V, Σ, S, P) is wherein:V={S,A,L,U,D,K,N1,N2,N3,B1,B2}
Nonterminal symbol defined in V, wherein S are the nonterminal symbol of a beginning, and A indicates alphabetic character, AnRepresent n continuously Alphabetic character;L, U are used for alphabetic character mask, and wherein L represents lowercase, and U represents capitalization;D indicates numerical character, Dn Represent n continuous numerical characters;K indicates keyboard continuation character, KnRepresent n keyboard continuation character (n>= 4);N1-N3Generation Table name, wherein N1Represent name spelling, N2Represent name Pinyin abbreviation, N3Represent the group of user's surname Pinyin abbreviation and name spelling It closes;Wherein B1Represent birthdate, B2Represent the combination of the part of sum-bit month day after year of birth.
Wherein:Σ represents terminal symbol collection;S represents the nonterminal symbol of a beginning, and S belongs to V;P is probability.
As shown in Figure 1, it includes following four steps that a kind of password based on semantic transforms of the present invention, which reinforces method,:
Step 1:Password blacklist matches:For the password pw that user submits, by itself and predefined password blacklist blacklist It is matched;
Step 2:Password strength assessment:The probability occurred to user password pw using password strength assessment algorithm probability evaluation entity P (pw) is calculated, by compared with preset probability threshold value thp, providing in the present invention the probability being calculated User password intensity psm (pw);
Step 3:Password is segmented:Password semantic analysis is carried out in conjunction with password weaker to assessment result lexical data base wn, is passed through Password is cut into several password segments and composition fragment list token by segmentation algorithm;
Step 4:Password semantic transforms are reinforced:By password semantic transforms algorithm to password(Fragment list is converted, and composition is new Password pw`, repeat step 2, step 3 and step 4, until new password intensity psm (pw`) assessment result is strong using new password Password.
Wherein, blacklist blacklist generation methods include but not limited to frequency of use successively decrease strategy to password carry out Sequence, selects password in the top(Such as:Choose the password of ranking previous ten thousand)Generate password blacklist.
Wherein, step 1:The matching of password blacklist is as follows:
A1, user password pw is matched with password blacklist blacklist;
A2, directly refuse user password pw if successful match, terminate password enhance process;
A3, password strength assessment is carried out if it fails to match.
Wherein, step 2:Password strength assessment is as follows:
B1, password strength assessment algorithm is determined;
B2, probability calculation p (pw) is carried out to user password pw using password strength assessment algorithm;
B3, by the way that user password Probability p (pw) is compared to obtain user password intensity psm with preset threshold value thp (pw);
B4, show that the user password is strong password if the user password probability of occurrence is less than preset threshold value, without adding By force, terminate password enhance process, user password is otherwise subjected to password segmentation;Wherein:
The password strength assessment algorithm includes but not limited to:Probability context-free algorithm, n rank Markov algorithms.
Wherein, step 3:Password segmentation is as follows:
C1, lexical data base wn is determined;
C2, according to lexical data base, semantic analysis is completed to password and password is segmented;
C3, password list of fragments token is generated according to segmentation result;Wherein:
The lexical data base includes but not limited to:COCA n-gram corpus and WordNet English glossary databases;
The strong segmentation method of password includes but not limited to:The password segmentation algorithm of maximal cover degree.
Wherein, step 4:Password transforming reinforcement is as follows:
D1, password transforming algorithm is determined;
D2, password transforming is carried out to password list of fragments according to password transforming algorithm, obtains new password;Wherein:
The password transforming algorithm includes but not limited to:Password list of fragments is replaced, password list of fragments is added Add, password list is swapped.
Password intensity is assessed by the probability contexts index system more refined, eliminates user password to a certain degree In by simple transformation come potential weak passwurd, enhance the ability that password resists guessing attack, improve password Safety has ensured the information security and property safety of user.Meanwhile the present invention analyzes password semanteme, is improving mouth The availability that ensure that password while enabling intensity helps user to build intensity higher that is, while remembering convenient for user Password.And the present invention refines on the basis of conventional probability contexts, in user password strength assessment, makes assessment As a result more accurate, more truly react user password strength conditions.
The protection content of the present invention is not limited to above example.Without departing from the spirit and scope of the invention, originally Field technology personnel it is conceivable that variation and advantage be all included in the present invention, and with appended claims be protect Protect range.

Claims (6)

1. a kind of password based on semantic transforms reinforces method, which is characterized in that this method includes step in detail below:
Step 1:Password blacklist matches
For the password that user submits, it is matched with predefined password blacklist;
Step 2:Password strength assessment
The probability occurred to user password using password strength assessment algorithm probability evaluation entity calculates, by that will calculate To probability compared with preset probability threshold value, provide the password intensity of user;
Step 3:Password is segmented
Password semantic analysis is carried out in conjunction with the lexical data base password weaker to assessment result, by segmentation algorithm by password cutting At several password segments and composition fragment list;
Step 4:Password semantic transforms are reinforced
Password fragment list is converted by password semantic transforms algorithm, forms new password, repeats to walk using new password Rapid 2, step 3 and step 4, until new password strength assessment result is strong password.
2. the password according to claim 1 based on semantic transforms reinforces method, which is characterized in that in step 1, the mouth It includes but not limited to that the mode successively decreased of frequency of use is ranked up password to enable blacklist predefined process, is selected in the top Password generated password blacklist.
3. the password according to claim 1 based on semantic transforms reinforces method, which is characterized in that the step 1 is specific For:
Step A1:User password is matched with password blacklist;
Step A2:Directly refuse user password if successful match, terminates password enhance process;
Step A3:Password strength assessment is carried out if it fails to match.
4. the password according to claim 1 based on semantic transforms reinforces method, which is characterized in that the step 2 is specific For:
Step B1:Determine password strength assessment algorithm;
Step B2:Probability calculation is carried out to user password using password strength assessment algorithm;
Step B3:By the way that user password probability is compared to obtain the user password intensity with preset threshold value;
Step B4:Show that the user password is strong password, nothing if the user password probability of occurrence is less than preset threshold value It needs to reinforce, terminates password enhance process, user password is otherwise subjected to password segmentation;Wherein:
The password strength assessment algorithm includes but not limited to:Probability context-free algorithm, n rank Markov algorithms.
5. the password according to claim 1 based on semantic transforms reinforces method, which is characterized in that the step 3 is specific For:
Step C1:Determine lexical data base;
Step C2:According to lexical data base, semantic analysis is completed to password and password is segmented;
Step C3:Password list of fragments is generated according to segmentation result;Wherein:
The lexical data base includes but not limited to:COCA n-gram corpus and WordNet English glossary databases;
The strong segmentation method of password includes but not limited to:The password segmentation algorithm of maximal cover degree.
6. the password according to claim 1 based on semantic transforms reinforces method, which is characterized in that the step 4 is specific For:
Step D1:Determine password transforming algorithm;
Step D2:Password transforming is carried out to password list of fragments according to password transforming algorithm, obtains new password;Wherein:
The password transforming algorithm includes but not limited to:Password list of fragments is replaced, password list of fragments is added Add, password list is swapped.
CN201810313942.3A 2018-04-10 2018-04-10 A kind of password reinforcement method based on semantic transforms Pending CN108763918A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810313942.3A CN108763918A (en) 2018-04-10 2018-04-10 A kind of password reinforcement method based on semantic transforms

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810313942.3A CN108763918A (en) 2018-04-10 2018-04-10 A kind of password reinforcement method based on semantic transforms

Publications (1)

Publication Number Publication Date
CN108763918A true CN108763918A (en) 2018-11-06

Family

ID=63981552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810313942.3A Pending CN108763918A (en) 2018-04-10 2018-04-10 A kind of password reinforcement method based on semantic transforms

Country Status (1)

Country Link
CN (1) CN108763918A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135147A (en) * 2019-06-11 2019-08-16 华中师范大学 A kind of honey jar password system and its generation method
CN110555140A (en) * 2019-08-29 2019-12-10 华南理工大学 Description, generation and detection method of corpus product rule oriented to password guess
CN112257433A (en) * 2020-12-23 2021-01-22 四川大学 Password dictionary generation method and system based on Markov chain and neural network
CN112580021A (en) * 2020-12-02 2021-03-30 上海派拉软件股份有限公司 Traditional password intensity scoring method
CN112632526A (en) * 2021-01-07 2021-04-09 复旦大学 User password modeling and strength evaluation method based on comprehensive segmentation
CN117786664A (en) * 2024-02-26 2024-03-29 道普信息技术有限公司 Sample-induced password test method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819701A (en) * 2012-06-29 2012-12-12 北京奇虎科技有限公司 Method and device for prompting password security of form filling component
US20160301524A1 (en) * 2013-11-07 2016-10-13 Shengyuan Wu Methods and apparatuses of digital data processing
CN106934275A (en) * 2017-01-22 2017-07-07 华东师范大学 A kind of password intensity evaluating method based on personal information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819701A (en) * 2012-06-29 2012-12-12 北京奇虎科技有限公司 Method and device for prompting password security of form filling component
US20160301524A1 (en) * 2013-11-07 2016-10-13 Shengyuan Wu Methods and apparatuses of digital data processing
CN106934275A (en) * 2017-01-22 2017-07-07 华东师范大学 A kind of password intensity evaluating method based on personal information

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135147A (en) * 2019-06-11 2019-08-16 华中师范大学 A kind of honey jar password system and its generation method
CN110555140A (en) * 2019-08-29 2019-12-10 华南理工大学 Description, generation and detection method of corpus product rule oriented to password guess
CN110555140B (en) * 2019-08-29 2022-11-22 华南理工大学 Description, generation and detection method of corpus product rule oriented to password guess
CN112580021A (en) * 2020-12-02 2021-03-30 上海派拉软件股份有限公司 Traditional password intensity scoring method
CN112580021B (en) * 2020-12-02 2024-03-22 上海派拉软件股份有限公司 Traditional password strength scoring method
CN112257433A (en) * 2020-12-23 2021-01-22 四川大学 Password dictionary generation method and system based on Markov chain and neural network
CN112632526A (en) * 2021-01-07 2021-04-09 复旦大学 User password modeling and strength evaluation method based on comprehensive segmentation
CN112632526B (en) * 2021-01-07 2022-04-12 复旦大学 User password modeling and strength evaluation method based on comprehensive segmentation
CN117786664A (en) * 2024-02-26 2024-03-29 道普信息技术有限公司 Sample-induced password test method

Similar Documents

Publication Publication Date Title
CN108763918A (en) A kind of password reinforcement method based on semantic transforms
Klein et al. Named entity recognition with character-level models
Castelluccia et al. Adaptive password-strength meters from markov models.
Yu et al. Extracting synonymous gene and protein terms from biological literature
WO2003012661A1 (en) Computer based summarization of natural language documents
EP2260373A1 (en) Determining relevant information for domains of interest
JP3921523B2 (en) Text generation method and text generation apparatus
Cummins et al. Learning in a pairwise term-term proximity framework for information retrieval
JPS6211932A (en) Information retrieving method
CN108647511A (en) The password strength assessment method derived based on weak passwurd
Resnick et al. Mapping Characters for Internationalized Domain Names in Applications (IDNA) 2008
CN110334488A (en) User authentication password security appraisal procedure and device based on Random Forest model
Houshmand et al. Using personal information in targeted grammar-based probabilistic password attacks
Plake et al. Optimizing syntax patterns for discovering protein-protein interactions
KR20170107282A (en) Apparatus and method for supporting decision making based on natural language understanding and question and answer
Toutanova et al. The leaf path projection view of parse trees: Exploring string kernels for HPSG parse selection
Yitagesu et al. Unsupervised labeling and extraction of phrase-based concepts in vulnerability descriptions
Aljero et al. Genetic programming approach to detect hate speech in social media
Yu et al. A large scale, corpus-based approach for automatically disambiguating biomedical abbreviations
Hu et al. A hybrid method of coreference resolution in information security
Grover et al. Adapting a relation extraction pipeline for the BioCreAtIvE II task
Taha Extracting various classes of data from biological text using the concept of existence dependency
JP6084081B2 (en) Password generator
Yazdi Probabilistic context-free grammar based password cracking: attack, defense and applications
Zahariev A linguistic approach to extracting acronym expansions from text

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181106