CN108763918A - A kind of password reinforcement method based on semantic transforms - Google Patents
A kind of password reinforcement method based on semantic transforms Download PDFInfo
- Publication number
- CN108763918A CN108763918A CN201810313942.3A CN201810313942A CN108763918A CN 108763918 A CN108763918 A CN 108763918A CN 201810313942 A CN201810313942 A CN 201810313942A CN 108763918 A CN108763918 A CN 108763918A
- Authority
- CN
- China
- Prior art keywords
- password
- user
- algorithm
- probability
- semantic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a kind of, and the password based on semantic transforms reinforces method, including the matching of password blacklist, the segmentation of password strength assessment, password and password semantic transforms reinforce step.Wherein, password blacklist matching step:User's submission password is matched with existing password blacklist;Password strength assessment step:By the generating probability by user password is calculated compared with the probability threshold value of setting, assessment password is strong and weak;Password division step:After carrying out semantic analysis to weak passwurd, password is divided into several segments;Password semantic transforms reinforce step:It enables segment be converted by the predefined scaling method counterpart that becomes, strengthened password and original password is made to have certain similitude.By the present invention in that reducing user from the root cause with black list techniques uses weak passwurd, and password intensity is improved while ensureing password availability using password strength assessment and semantic analysis segmentation scheduling algorithm, the ability that password resists guessing attack is enhanced, the safety of password is improved.
Description
Technical field
The invention belongs to field of information security technology, more particularly to a kind of password based on semantic transforms reinforces method.
Background technology
With the deep propulsion of IT application process, password extensive utilization in current all kinds of computer systems, as guarantee
The basic authentication means of user information safety, in a foreseeable future, password will be most important identification authentication mode.
The password of user needs to meet to be required of both availability and safety, and what availability was used to weigh password can
Memorability, safety are used to weigh the property guessed of password.However the not enough information of most users ensures that their use
Password whether safe enough, in order to ensure the safety of user password, the service of mainstream or website in user's registration and can repair
When changing password, password generated strategy is provided(Password Creation Policies, PCP)Know that user password generates.
There is no the constraint of password generated strategy, user to often tend to using simple, unsafe password.Nineteen ninety-five,
Bishop and Klein carries out dictionary attack to a series of encrypted passwords of the hash provided by system manager, from about 14000
It has been cracked in more passwords nearly, this illustrates that the password that a big chunk administrator generates is too simple.In order to cope with these feelings
Condition, 2004, the portion of Burr etc. the report recommends that command identifying should apply some password generated strategies, and user is prevented to make
With simple password.2012, Kelley etc. was analyzed by 7 different password generated strategies are influenced and generate 12000
The intensity of password, the password generated under the conditions of discovery is without any restrictions is much weaker than the password life of " password length is no less than 12 "
At the password generated under strategy.2016, Shay etc. further study show that, using " length 12, at least two class characters "
The password generated strategy of password generated strategy ratio " 8 bit lengths, at least three classes character " is more advantageous to the safety of password set.
One rational password generated strategy must simultaneously take account two aspect contents of availability and safety of password.
Availability lays particular emphasis on the convenience and mnemonic that user uses password, and safety lays particular emphasis on password itself and resists guessing attack
Ability.2007, Vu etc. was the study found that stringent password generated strategy can effectively resist guessing attack, but also carry
High user create and using password difficulty.2013, there is very high possibility in the password of the discoveries such as Mazurek, high intensity
Property is inputed by mistake by user.2015, Ur etc. was the study found that inappropriate password generated strategy that many services are taken is caused to user
Heavy burden.The further investigation discovery such as Shay, the intensity of password and the availability of password not necessarily negative correlation,
Suitable password generated strategy can not lose the availability of password while ensureing password intensity.
Invention content
It is an object of the invention to make up the deficiency of existing password reinforcement technology, by probability contexts index refinement and
By carrying out semantic analysis to user password, a kind of password reinforcement method based on semantic transforms is provided, traditional mouth is being inherited
While enabling the efficiency and robustness of reinforcement method, the potential weak passwurd that simple transformation generates is eliminated to a certain degree, is enhanced
Password resists the ability of guessing attack, improves the safety of password.
Realizing the specific technical solution of the object of the invention is:
A kind of password reinforcement method based on semantic transforms, this method include step in detail below:
Step 1:Password blacklist matches
For the password that user submits, it is matched with predefined password blacklist;
Step 2:Password strength assessment
The probability occurred to user password using password strength assessment algorithm probability evaluation entity calculates, by that will calculate
To probability compared with preset probability threshold value, provide the password intensity of user in the present invention;
Step 3:Password is segmented
Password semantic analysis is carried out in conjunction with the lexical data base password weaker to assessment result, by segmentation algorithm by password cutting
At several password segments and composition fragment list;
Step 4:Password semantic transforms are reinforced
Password fragment list is converted by password semantic transforms algorithm, forms new password, repeats to walk using new password
Rapid 2, step 3 and step 4, until new password strength assessment result is strong password.
In step 1 of the present invention blacklist generation method include but not limited to frequency of use successively decrease strategy to password into
Row sequence, selects password in the top(Such as:Choose the password of ranking previous ten thousand)Generate password blacklist.
Step 1 of the present invention is specially:
Step A1:User password is matched with password blacklist;
Step A2:Directly refuse user password if successful match, terminates password enhance process;
Step A3:Password strength assessment is carried out if it fails to match.
Step 2 of the present invention is specially:
Step B1:Determine password strength assessment algorithm;
Step B2:Probability calculation is carried out to user password using password strength assessment algorithm;
Step B3:By the way that user password probability is compared to obtain the user password intensity with preset threshold value;
Step B4:Show that the user password is strong password, nothing if the user password probability of occurrence is less than preset threshold value
It needs to reinforce, terminates password enhance process, user password is otherwise subjected to password segmentation;Wherein:
The password strength assessment algorithm includes but not limited to:Probability context-free algorithm, n rank Markov algorithms.
Step 3 of the present invention is specially:
Step C1:Determine lexical data base;
Step C2:According to lexical data base, semantic analysis is completed to password and password is segmented;
Step C3:Password list of fragments is generated according to segmentation result;Wherein:
The lexical data base includes but not limited to:COCA n-gram corpus and WordNet English glossary databases;
The strong segmentation method of password includes but not limited to:The password segmentation algorithm of maximal cover degree.
Step 4 of the present invention is specially:
Step D1:Determine password transforming algorithm;
Step D2:Password transforming is carried out to password list of fragments according to password transforming algorithm, obtains new password;Wherein:
The password transforming algorithm includes but not limited to:Password list of fragments is replaced, password list of fragments is added
Add, password list is swapped.
The present invention eliminates user to a certain degree while inheriting the efficiency and robustness of conventional password reinforcement method
The ability that password resists guessing attack is enhanced, is improved come potential weak passwurd by simple transformation in password
The safety of password has ensured the information security and property safety of user.Meanwhile the present invention analyzes password semanteme,
The availability that ensure that password while improving password intensity helps user to build intensity that is, while remembering convenient for user
Higher password makes password security reach preferable balance with availability.And the present invention is in the base of conventional probability contexts
It is refined on plinth, in user password strength assessment, making assessment result, more accurately, more truly reaction user password is strong
Spend situation.
Description of the drawings
Fig. 1 is the flow chart of the present invention.
Specific implementation mode
In conjunction with following specific examples and attached drawing, the present invention is described in further detail.The process of the implementation present invention,
Condition, experimental method etc. are among the general principles and common general knowledge in the art, this hair in addition to the following content specially referred to
It is bright that content is not particularly limited.
The meaning that related technical term represents in the present invention is as follows:
Blacklist- blacklists
Pw- original user passwords
New password after pw`- reinforces
The probability of p (s)-passwords s
Thp- probability threshold values
List after token lists-password segmentation
Psm (pw)-user password assesses intensity
Wn- lexical data bases
G1=(V, Σ, S, P) is wherein:V={S,A,L,U,D,K,N1,N2,N3,B1,B2}
Nonterminal symbol defined in V, wherein S are the nonterminal symbol of a beginning, and A indicates alphabetic character, AnRepresent n continuously
Alphabetic character;L, U are used for alphabetic character mask, and wherein L represents lowercase, and U represents capitalization;D indicates numerical character, Dn
Represent n continuous numerical characters;K indicates keyboard continuation character, KnRepresent n keyboard continuation character (n>= 4);N1-N3Generation
Table name, wherein N1Represent name spelling, N2Represent name Pinyin abbreviation, N3Represent the group of user's surname Pinyin abbreviation and name spelling
It closes;Wherein B1Represent birthdate, B2Represent the combination of the part of sum-bit month day after year of birth.
Wherein:Σ represents terminal symbol collection;S represents the nonterminal symbol of a beginning, and S belongs to V;P is probability.
As shown in Figure 1, it includes following four steps that a kind of password based on semantic transforms of the present invention, which reinforces method,:
Step 1:Password blacklist matches:For the password pw that user submits, by itself and predefined password blacklist blacklist
It is matched;
Step 2:Password strength assessment:The probability occurred to user password pw using password strength assessment algorithm probability evaluation entity
P (pw) is calculated, by compared with preset probability threshold value thp, providing in the present invention the probability being calculated
User password intensity psm (pw);
Step 3:Password is segmented:Password semantic analysis is carried out in conjunction with password weaker to assessment result lexical data base wn, is passed through
Password is cut into several password segments and composition fragment list token by segmentation algorithm;
Step 4:Password semantic transforms are reinforced:By password semantic transforms algorithm to password(Fragment list is converted, and composition is new
Password pw`, repeat step 2, step 3 and step 4, until new password intensity psm (pw`) assessment result is strong using new password
Password.
Wherein, blacklist blacklist generation methods include but not limited to frequency of use successively decrease strategy to password carry out
Sequence, selects password in the top(Such as:Choose the password of ranking previous ten thousand)Generate password blacklist.
Wherein, step 1:The matching of password blacklist is as follows:
A1, user password pw is matched with password blacklist blacklist;
A2, directly refuse user password pw if successful match, terminate password enhance process;
A3, password strength assessment is carried out if it fails to match.
Wherein, step 2:Password strength assessment is as follows:
B1, password strength assessment algorithm is determined;
B2, probability calculation p (pw) is carried out to user password pw using password strength assessment algorithm;
B3, by the way that user password Probability p (pw) is compared to obtain user password intensity psm with preset threshold value thp
(pw);
B4, show that the user password is strong password if the user password probability of occurrence is less than preset threshold value, without adding
By force, terminate password enhance process, user password is otherwise subjected to password segmentation;Wherein:
The password strength assessment algorithm includes but not limited to:Probability context-free algorithm, n rank Markov algorithms.
Wherein, step 3:Password segmentation is as follows:
C1, lexical data base wn is determined;
C2, according to lexical data base, semantic analysis is completed to password and password is segmented;
C3, password list of fragments token is generated according to segmentation result;Wherein:
The lexical data base includes but not limited to:COCA n-gram corpus and WordNet English glossary databases;
The strong segmentation method of password includes but not limited to:The password segmentation algorithm of maximal cover degree.
Wherein, step 4:Password transforming reinforcement is as follows:
D1, password transforming algorithm is determined;
D2, password transforming is carried out to password list of fragments according to password transforming algorithm, obtains new password;Wherein:
The password transforming algorithm includes but not limited to:Password list of fragments is replaced, password list of fragments is added
Add, password list is swapped.
Password intensity is assessed by the probability contexts index system more refined, eliminates user password to a certain degree
In by simple transformation come potential weak passwurd, enhance the ability that password resists guessing attack, improve password
Safety has ensured the information security and property safety of user.Meanwhile the present invention analyzes password semanteme, is improving mouth
The availability that ensure that password while enabling intensity helps user to build intensity higher that is, while remembering convenient for user
Password.And the present invention refines on the basis of conventional probability contexts, in user password strength assessment, makes assessment
As a result more accurate, more truly react user password strength conditions.
The protection content of the present invention is not limited to above example.Without departing from the spirit and scope of the invention, originally
Field technology personnel it is conceivable that variation and advantage be all included in the present invention, and with appended claims be protect
Protect range.
Claims (6)
1. a kind of password based on semantic transforms reinforces method, which is characterized in that this method includes step in detail below:
Step 1:Password blacklist matches
For the password that user submits, it is matched with predefined password blacklist;
Step 2:Password strength assessment
The probability occurred to user password using password strength assessment algorithm probability evaluation entity calculates, by that will calculate
To probability compared with preset probability threshold value, provide the password intensity of user;
Step 3:Password is segmented
Password semantic analysis is carried out in conjunction with the lexical data base password weaker to assessment result, by segmentation algorithm by password cutting
At several password segments and composition fragment list;
Step 4:Password semantic transforms are reinforced
Password fragment list is converted by password semantic transforms algorithm, forms new password, repeats to walk using new password
Rapid 2, step 3 and step 4, until new password strength assessment result is strong password.
2. the password according to claim 1 based on semantic transforms reinforces method, which is characterized in that in step 1, the mouth
It includes but not limited to that the mode successively decreased of frequency of use is ranked up password to enable blacklist predefined process, is selected in the top
Password generated password blacklist.
3. the password according to claim 1 based on semantic transforms reinforces method, which is characterized in that the step 1 is specific
For:
Step A1:User password is matched with password blacklist;
Step A2:Directly refuse user password if successful match, terminates password enhance process;
Step A3:Password strength assessment is carried out if it fails to match.
4. the password according to claim 1 based on semantic transforms reinforces method, which is characterized in that the step 2 is specific
For:
Step B1:Determine password strength assessment algorithm;
Step B2:Probability calculation is carried out to user password using password strength assessment algorithm;
Step B3:By the way that user password probability is compared to obtain the user password intensity with preset threshold value;
Step B4:Show that the user password is strong password, nothing if the user password probability of occurrence is less than preset threshold value
It needs to reinforce, terminates password enhance process, user password is otherwise subjected to password segmentation;Wherein:
The password strength assessment algorithm includes but not limited to:Probability context-free algorithm, n rank Markov algorithms.
5. the password according to claim 1 based on semantic transforms reinforces method, which is characterized in that the step 3 is specific
For:
Step C1:Determine lexical data base;
Step C2:According to lexical data base, semantic analysis is completed to password and password is segmented;
Step C3:Password list of fragments is generated according to segmentation result;Wherein:
The lexical data base includes but not limited to:COCA n-gram corpus and WordNet English glossary databases;
The strong segmentation method of password includes but not limited to:The password segmentation algorithm of maximal cover degree.
6. the password according to claim 1 based on semantic transforms reinforces method, which is characterized in that the step 4 is specific
For:
Step D1:Determine password transforming algorithm;
Step D2:Password transforming is carried out to password list of fragments according to password transforming algorithm, obtains new password;Wherein:
The password transforming algorithm includes but not limited to:Password list of fragments is replaced, password list of fragments is added
Add, password list is swapped.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810313942.3A CN108763918A (en) | 2018-04-10 | 2018-04-10 | A kind of password reinforcement method based on semantic transforms |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810313942.3A CN108763918A (en) | 2018-04-10 | 2018-04-10 | A kind of password reinforcement method based on semantic transforms |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108763918A true CN108763918A (en) | 2018-11-06 |
Family
ID=63981552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810313942.3A Pending CN108763918A (en) | 2018-04-10 | 2018-04-10 | A kind of password reinforcement method based on semantic transforms |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108763918A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110135147A (en) * | 2019-06-11 | 2019-08-16 | 华中师范大学 | A kind of honey jar password system and its generation method |
CN110555140A (en) * | 2019-08-29 | 2019-12-10 | 华南理工大学 | Description, generation and detection method of corpus product rule oriented to password guess |
CN112257433A (en) * | 2020-12-23 | 2021-01-22 | 四川大学 | Password dictionary generation method and system based on Markov chain and neural network |
CN112580021A (en) * | 2020-12-02 | 2021-03-30 | 上海派拉软件股份有限公司 | Traditional password intensity scoring method |
CN112632526A (en) * | 2021-01-07 | 2021-04-09 | 复旦大学 | User password modeling and strength evaluation method based on comprehensive segmentation |
CN117786664A (en) * | 2024-02-26 | 2024-03-29 | 道普信息技术有限公司 | Sample-induced password test method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102819701A (en) * | 2012-06-29 | 2012-12-12 | 北京奇虎科技有限公司 | Method and device for prompting password security of form filling component |
US20160301524A1 (en) * | 2013-11-07 | 2016-10-13 | Shengyuan Wu | Methods and apparatuses of digital data processing |
CN106934275A (en) * | 2017-01-22 | 2017-07-07 | 华东师范大学 | A kind of password intensity evaluating method based on personal information |
-
2018
- 2018-04-10 CN CN201810313942.3A patent/CN108763918A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102819701A (en) * | 2012-06-29 | 2012-12-12 | 北京奇虎科技有限公司 | Method and device for prompting password security of form filling component |
US20160301524A1 (en) * | 2013-11-07 | 2016-10-13 | Shengyuan Wu | Methods and apparatuses of digital data processing |
CN106934275A (en) * | 2017-01-22 | 2017-07-07 | 华东师范大学 | A kind of password intensity evaluating method based on personal information |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110135147A (en) * | 2019-06-11 | 2019-08-16 | 华中师范大学 | A kind of honey jar password system and its generation method |
CN110555140A (en) * | 2019-08-29 | 2019-12-10 | 华南理工大学 | Description, generation and detection method of corpus product rule oriented to password guess |
CN110555140B (en) * | 2019-08-29 | 2022-11-22 | 华南理工大学 | Description, generation and detection method of corpus product rule oriented to password guess |
CN112580021A (en) * | 2020-12-02 | 2021-03-30 | 上海派拉软件股份有限公司 | Traditional password intensity scoring method |
CN112580021B (en) * | 2020-12-02 | 2024-03-22 | 上海派拉软件股份有限公司 | Traditional password strength scoring method |
CN112257433A (en) * | 2020-12-23 | 2021-01-22 | 四川大学 | Password dictionary generation method and system based on Markov chain and neural network |
CN112632526A (en) * | 2021-01-07 | 2021-04-09 | 复旦大学 | User password modeling and strength evaluation method based on comprehensive segmentation |
CN112632526B (en) * | 2021-01-07 | 2022-04-12 | 复旦大学 | User password modeling and strength evaluation method based on comprehensive segmentation |
CN117786664A (en) * | 2024-02-26 | 2024-03-29 | 道普信息技术有限公司 | Sample-induced password test method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108763918A (en) | A kind of password reinforcement method based on semantic transforms | |
Klein et al. | Named entity recognition with character-level models | |
Castelluccia et al. | Adaptive password-strength meters from markov models. | |
Yu et al. | Extracting synonymous gene and protein terms from biological literature | |
WO2003012661A1 (en) | Computer based summarization of natural language documents | |
EP2260373A1 (en) | Determining relevant information for domains of interest | |
JP3921523B2 (en) | Text generation method and text generation apparatus | |
Cummins et al. | Learning in a pairwise term-term proximity framework for information retrieval | |
JPS6211932A (en) | Information retrieving method | |
CN108647511A (en) | The password strength assessment method derived based on weak passwurd | |
Resnick et al. | Mapping Characters for Internationalized Domain Names in Applications (IDNA) 2008 | |
CN110334488A (en) | User authentication password security appraisal procedure and device based on Random Forest model | |
Houshmand et al. | Using personal information in targeted grammar-based probabilistic password attacks | |
Plake et al. | Optimizing syntax patterns for discovering protein-protein interactions | |
KR20170107282A (en) | Apparatus and method for supporting decision making based on natural language understanding and question and answer | |
Toutanova et al. | The leaf path projection view of parse trees: Exploring string kernels for HPSG parse selection | |
Yitagesu et al. | Unsupervised labeling and extraction of phrase-based concepts in vulnerability descriptions | |
Aljero et al. | Genetic programming approach to detect hate speech in social media | |
Yu et al. | A large scale, corpus-based approach for automatically disambiguating biomedical abbreviations | |
Hu et al. | A hybrid method of coreference resolution in information security | |
Grover et al. | Adapting a relation extraction pipeline for the BioCreAtIvE II task | |
Taha | Extracting various classes of data from biological text using the concept of existence dependency | |
JP6084081B2 (en) | Password generator | |
Yazdi | Probabilistic context-free grammar based password cracking: attack, defense and applications | |
Zahariev | A linguistic approach to extracting acronym expansions from text |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181106 |