CN110245488A - Cipher Strength detection method, device, terminal and computer readable storage medium - Google Patents

Cipher Strength detection method, device, terminal and computer readable storage medium Download PDF

Info

Publication number
CN110245488A
CN110245488A CN201910433513.4A CN201910433513A CN110245488A CN 110245488 A CN110245488 A CN 110245488A CN 201910433513 A CN201910433513 A CN 201910433513A CN 110245488 A CN110245488 A CN 110245488A
Authority
CN
China
Prior art keywords
password
cipher strength
character
score value
total weight
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910433513.4A
Other languages
Chinese (zh)
Other versions
CN110245488B (en
Inventor
高林龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guoxin Jinhong Information Consulting Co ltd
Shenzhen Lian Intellectual Property Service Center
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910433513.4A priority Critical patent/CN110245488B/en
Publication of CN110245488A publication Critical patent/CN110245488A/en
Application granted granted Critical
Publication of CN110245488B publication Critical patent/CN110245488B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Abstract

The invention belongs to field of computer technology more particularly to a kind of Cipher Strength detection method, device, terminal and computer readable storage mediums, wherein the described method includes: receiving password to be detected, and analyze the password, obtain cryptographic properties information;The corresponding overall score score value of the password and the total weight of Cipher Strength are calculated according to the cryptographic properties information and default computation rule;By the pre-generated fuzzy controller of the overall score score value and the total weight input of the Cipher Strength, the corresponding Cipher Strength of the password is obtained according to the overall score score value and the total weight calculation of the Cipher Strength by the fuzzy controller;So that the Cipher Strength is accurately calculated, effectively reduces Cipher Strength detection and the probability judged by accident occur.

Description

Cipher Strength detection method, device, terminal and computer readable storage medium
Technical field
The invention belongs to field of computer technology more particularly to a kind of Cipher Strength detection method, device, terminal and calculating Machine readable storage medium storing program for executing.
Background technique
Currently, in some application scenarios for needing to be arranged password, in order to guarantee the safety of user password, it usually needs When user setting password, Cipher Strength prompting is carried out to user, so as to the password of the larger Cipher Strength of user setting.
However, in the prior art, mostly using canonical check addition to detect greatly the detection of Cipher Strength, examination criteria mistake It in single, is easy for the weak password of Cipher Strength to be detected as the strong password of Cipher Strength, and the strong password of Cipher Strength is detected For the weak password of Cipher Strength, the high problem of False Rate is detected with Cipher Strength.
Summary of the invention
The embodiment of the present invention provides a kind of Cipher Strength detection method, device, terminal and computer readable storage medium, can To solve the problems, such as that Cipher Strength detection False Rate is high.
First aspect of the embodiment of the present invention provides a kind of Cipher Strength detection method, comprising:
Password to be detected is received, and the password is analyzed, obtains cryptographic properties information;
The corresponding overall score score value of the password and close is calculated according to the cryptographic properties information and default computation rule The code total weight of intensity;
By the pre-generated fuzzy controller of the overall score score value and the total weight input of the Cipher Strength, by the mould Fuzzy controllers obtain the corresponding Cipher Strength of the password according to the overall score score value and the total weight calculation of the Cipher Strength; The fuzzy controller is according to the corresponding overall score score value sample data of known password gathered in advance, the known password pair What the total weight samples data of the Cipher Strength answered and the corresponding Cipher Strength sample data of the known password generated.
A kind of Cipher Strength detection device that second aspect of the embodiment of the present invention provides, comprising:
Analytical unit is analyzed for receiving password to be detected, and to the password, obtains cryptographic properties information;
Computing unit, it is corresponding total for calculating the password according to the cryptographic properties information and default computation rule Score score value and the total weight of Cipher Strength;
Detection unit, for the Fuzzy Control that the overall score score value and the total weight input of the Cipher Strength is pre-generated Device processed obtains the password pair according to the overall score score value and the total weight calculation of the Cipher Strength by the fuzzy controller The Cipher Strength answered;The fuzzy controller be according to the corresponding overall score score value sample data of known password gathered in advance, The total weight samples data of the corresponding Cipher Strength of the known password and the corresponding Cipher Strength sample number of the known password According to generation.
The third aspect of the embodiment of the present invention provides a kind of terminal, including memory, processor and is stored in the storage In device and the computer program that can run on the processor, the processor are realized above-mentioned when executing the computer program The step of method.
Fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer readable storage medium The step of being stored with computer program, the above method realized when the computer program is executed by processor.
In the embodiment of the present invention, by analyzing password to be detected, a variety of cryptographic properties information are obtained, and according to The cryptographic properties information and default computation rule calculate the corresponding overall score score value of the password and the total weight of Cipher Strength; Then, the fuzzy controller that the overall score score value and the total weight input of the Cipher Strength is pre-generated, by described fuzzy Controller obtains the corresponding Cipher Strength of the password according to the overall score score value and the total weight calculation of the Cipher Strength;Make Obtain being accurately calculated for the Cipher Strength;Also, since the fuzzy controller is according to known password gathered in advance Corresponding overall score score value sample data, total weight samples data of the known corresponding Cipher Strength of password and described known The corresponding Cipher Strength sample data of password generates, and the known corresponding Cipher Strength sample data of password is through excessive Therefore the data that secondary practice summary obtains can greatly improve the accuracy of Cipher Strength detection, be not in by Cipher Strength Weak password is detected as the strong password of Cipher Strength, and the strong password of Cipher Strength is detected as the feelings of the weak password of Cipher Strength Condition effectively reduces Cipher Strength detection and the probability judged by accident occurs, has the characteristics that high reliablity, can be the peace of password setting Full property provides preferable ensure.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be in embodiment or description of the prior art Required attached drawing is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore It is not construed as the restriction to range, for those of ordinary skill in the art, in the premise not made the creative labor Under, it can also be obtained according to these attached drawings other relevant attached drawings.
Fig. 1 is a kind of implementation process schematic diagram of Cipher Strength detection method provided in an embodiment of the present invention;
Fig. 2 is a kind of specific implementation flow signal of Cipher Strength detection method step 101 provided in an embodiment of the present invention Figure;
Fig. 3 is a kind of the first specific implementation flow of Cipher Strength detection method step 102 provided in an embodiment of the present invention Schematic diagram;
Fig. 4 is a kind of the second specific implementation flow of Cipher Strength detection method step 102 provided in an embodiment of the present invention Schematic diagram;
Fig. 5 is the generating process schematic diagram of fuzzy controller provided in an embodiment of the present invention;
Fig. 6 is the schematic diagram of S π membership function provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of Cipher Strength detection device provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.Based on the embodiment of the present invention, those skilled in the art are in the premise for not making creative work Under every other embodiment obtained, shall fall within the protection scope of the present invention.
When carrying out Cipher Strength detection due to canonical check addition, examination criteria is excessively single, is generally only suitable for pure digi-tal The password of the password of character or pure alphabetic character carries out Cipher Strength detection, will for the password comprising multiple types character The Cipher Strength of password can not be accurately calculated, be easy to appear and the weak password of Cipher Strength is detected as strong close of Cipher Strength Code, and the strong password of Cipher Strength is detected as the weak password of Cipher Strength, with the high problem of Cipher Strength detection False Rate.
In the embodiment of the present invention, by analyzing password to be detected, a variety of cryptographic properties information of password are obtained, And the corresponding overall score score value of the password and Cipher Strength are calculated according to the cryptographic properties information and default computation rule Total weight;Then, the fuzzy controller that the overall score score value and the total weight input of the Cipher Strength is pre-generated, by institute It states fuzzy controller and the corresponding password of the password is obtained according to the overall score score value and the total weight calculation of the Cipher Strength Intensity;So that the Cipher Strength is accurately calculated;Also, due to the fuzzy controller be according to it is gathered in advance Know the corresponding overall score score value sample data of password, the total weight samples data of the corresponding Cipher Strength of the known password and institute The fuzzy controller that the corresponding Cipher Strength sample data of password known to stating generates, and the corresponding Cipher Strength of the known password Sample data is the data obtained by multiple practice summary, therefore, can greatly improve the accuracy of Cipher Strength detection, no It will appear and the weak password of Cipher Strength is detected as the strong password of Cipher Strength, and the strong password of Cipher Strength is detected as password The case where intensity weak password, effectively reduces Cipher Strength detection and the probability judged by accident occurs, has the characteristics that high reliablity, energy Safety enough for password setting provides preferable guarantee.
A kind of implementation process schematic diagram of Cipher Strength detection method provided in an embodiment of the present invention as shown in figure 1, should Method is applied to terminal, can be executed by the Cipher Strength detection device configured in terminal, suitable for that need to carry out Cipher Strength inspection The situation of survey, including step 101 is to step 103.
Step 101, password to be detected is received, and the password is analyzed, obtains cryptographic properties information;
The password to be detected can carry out the password of input when Account Registration for user;The password is generally used to protect The account safety of user, and the password of the higher Cipher Strength of setting is usually required, just it is avoided that other people easily realize password It cracks.Therefore, when user carries out Password Input, the detection of Cipher Strength can be carried out, to the password that user inputs with verifying The safety of the password of user's input.
Optionally, in certain embodiments of the present invention, in above-mentioned steps 101, character analysis is carried out to the password, Cryptographic properties information is obtained, may include: that character analysis is carried out to the password, obtain total number of characters, the number of the password The total number of characters of character, the total number of characters of consecutive identical numerical character, the total number of characters of alphabetic character, the total character of consecutive identical alphabetic character One of number, the total number of characters of spcial character and consecutive identical spcial character character number or a variety of cryptographic properties information.
Specifically, as shown in Fig. 2, it is described to the password carry out character analysis, obtain cryptographic properties information, can wrap It includes: step 201 to step 203.
Step 201, each character in the password is matched with the character in preset characters library respectively, and according to Matching result determines the character types of each character in the password.
In the embodiment of the present invention, the character types include numerical character, alphabetic character and spcial character.The predetermined word Fu Ku is previously stored with all numerical characters (for example, 0~9), all alphabetic characters (such as capitalization A~Z and small letter Alphabetical a~z) and all spcial characters (for example, punctuation mark, oeprator etc.).
In the embodiment of the present invention, by the way that each character in the password is carried out with the character in preset characters library respectively Matching can determine that the corresponding character types of each character in the password.
Step 202, according to the character types of character each in the password, the numerical character that statistics obtains the password is total Number of characters, the total number of characters of consecutive identical numerical character, the total number of characters of alphabetic character, the total number of characters of consecutive identical alphabetic character, spy The different total number of characters of character and consecutive identical spcial character character number.
For example, when the password of user's input is " 01m5da!It, can be by by the first character of the password when gh9990 " Symbol is matched with character in preset characters library, determines that the first character of the password is numerical character;It then, will be described close Second character of code is matched with character in the preset characters library, determines that second character of the password is also number Character, and so on, the character types of each character of the password can be determined, so as to according to each in the password The character types of character, statistics obtain the total number of characters of numerical character, the total number of characters of consecutive identical numerical character, word of the password The total number of characters of alphabetic character, the total number of characters of consecutive identical alphabetic character, the total number of characters of spcial character and consecutive identical special character word Accord with number.
Step 203, to the total number of characters of the numerical character, the total number of characters of the alphabetic character and the total word of the spcial character Symbol number is added up to obtain total number of characters of the password.
Since the password can be made of numerical character, alphabetic character and spcial character, obtaining the password Total number of characters when, can be according to the total number of characters of the numerical character, the total word of the alphabetic character counted in step 202 Symbol number and the total number of characters of the spcial character are added up to obtain.
It should be noted that being herein only that the cryptographic properties information of password is illustrated, it is not expressed as to this The restriction of invention protection scope, in certain embodiments of the present invention, the cryptographic properties information of the password can also include Other cryptographic properties information.For example, it is also possible to include the total number of characters of continuous number character, that is, what numerical character continuously occurred Number;It can also include the total number of characters of contiguous alphabet character, that is, the number that alphabetic character continuously occurs;Etc..
Wherein, the spcial character refers to the character in addition to the numerical character, alphabetic character.For example, character "!" etc. Deng.
Step 102, the corresponding overall score of the password is calculated according to the cryptographic properties information and default computation rule Score value and the total weight of Cipher Strength.
It, can be according to institute after obtaining the corresponding cryptographic properties information of password to be detected in the embodiment of the present invention It states cryptographic properties information and default computation rule calculates the corresponding overall score score value of the password to be detected and Cipher Strength Total weight.
Optionally, as shown in figure 3, described calculate the password according to the cryptographic properties information and default computation rule Corresponding overall score score value may include step 301 to step 305.
Step 301, corresponding first score value of total number of characters of the password is determined using the first default computation rule.
Step 302, determine that the numerical character for including in the password is second point corresponding using the second default computation rule Value.
Step 303, computation rule is preset using third determine the corresponding third point of the alphabetic character for including in the password Value.
Step 304, determine that the spcial character for including in the password is 4th point corresponding using the 4th default computation rule Value.
Step 305, it adds up, obtains described close to first score value, the second score value, third score value and quartile The corresponding overall score score value of code.
It should be noted that in embodiments of the present invention, above-mentioned first default computation rule, the second default calculate are advised Then, third is preset computation rule and the 4th default computation rule and can be preset according to practical application scene, also, In other embodiments of the invention, above-mentioned overall score score value can also be obtained by the way that more or fewer scoring score values are cumulative.
For example, the first default computation rule are as follows:
The second default computation rule are as follows:
Scoring score value-numerical character deduction score value of the total number of characters of the second score value=number.
The third presets computation rule are as follows:
Scoring score value-alphabetic character deduction score value of the total number of characters of the third score value=letter.
The 4th default computation rule are as follows:
The quartile=spcial character sum scoring score value-spcial character deduction score value.
It should be noted that in embodiments of the present invention, above-mentioned first default computation rule, the second default calculate are advised Then, the division that third presets computation rule and the 4th default each score value of computation rule can be set according to practical application scene It is fixed.
Optionally, as shown in figure 4, described determine the password according to the cryptographic properties information and default computation rule The corresponding total weight of Cipher Strength may include: step 401 to step 402.
Step 401, numerical character accounting, alphabetic character accounting and the spcial character accounting in the password are calculated separately;
Wherein, the numerical character accounting M in the password1Total number of characters of the total number of characters/password of=numerical character;It is described Alphabetic character accounting M in password2Total number of characters of the total number of characters/password of=alphabetic character;Spcial character in the password Accounting M3Total number of characters of the total number of characters/password of=spcial character.
Step 402, according to preset digital weight, alphabetical weight and spcial character weight to the numerical character accounting, Alphabetic character accounting and spcial character accounting add up, and obtain the total weight of the corresponding Cipher Strength of the password.
The preset digital weight, alphabetical weight and spcial character weight can be set according to practical application scene It is fixed.
For example, the preset digital weight w1It is 1/5, the preset alphabetical weight w2It is 2/5, the preset spy Different character weight w3Be 2/5, it is described according to preset digital weight, alphabetical weight and spcial character weight to the numerical character Accounting, alphabetic character accounting and spcial character accounting add up, and obtaining the total weight of the corresponding Cipher Strength of the password is P= M1w1+M2w2+M3w3
Step 103, the fuzzy controller that the overall score score value and the total weight input of the Cipher Strength is pre-generated, It is corresponding that the password obtained according to the overall score score value and the total weight calculation of the Cipher Strength by the fuzzy controller Cipher Strength;The fuzzy controller is according to the corresponding overall score score value sample data of known password gathered in advance, described The total weight samples data of the corresponding Cipher Strength of known password and the corresponding Cipher Strength sample data of the known password are raw At.
The process that the fuzzy controller implements fuzzy control mainly includes fuzzy inputing method, fuzzy reasoning and deblurring Change.
Wherein, fuzzy inputing method refers to that an actual value by input variable in a basic domain is converted to linguistic variable Conversion process.
Fuzzy reasoning refers to the reasoning process for carrying out that output is calculated to the input according to fuzzy control rule, at this In inventive embodiments, the fuzzy control rule is that basis repeatedly practices the obtained Cipher Strength code of points.
Optionally, as shown in figure 5, the generating process of the fuzzy controller may include: step 501 to step 504.
Step 501, the corresponding overall score score value sample data of known password gathered in advance is determined as the Fuzzy Control First input variable Q of device processedr, the corresponding total weight samples data of Cipher Strength of the known password are determined as described fuzzy Second input variable Q of controllers, the corresponding Cipher Strength sample data of the known password is determined as the fuzzy control The output variable T of device.
Wherein, the corresponding overall score score value sample data of the known password, the corresponding Cipher Strength of the known password Total weight samples data and the corresponding Cipher Strength sample data of the known password can be obtained by practice.
For example, multiple passwords are arranged, and carry out different modes respectively to the multiple password by practice process The multiple password is determined as the very big password of Cipher Strength, password according to password cracking difficulty size by multiple password cracking The password of the medium password of the big password of intensity, Cipher Strength, Cipher Strength small password and Cipher Strength very little, and calculate The corresponding overall score score value of each password and the total weight of Cipher Strength, and then obtain the corresponding overall score score value of the known password Sample data, the total weight samples data of the corresponding Cipher Strength of the known password and the corresponding password of the known password are strong Spend sample data.
Step 502, according to the corresponding overall score score value sample data of known password gathered in advance, the known password pair Described in the total weight samples data of the Cipher Strength answered and the corresponding Cipher Strength sample data of the known password determine respectively First input variable, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and Quantizing factor.
For example, described according to the corresponding overall score score value sample data of known password gathered in advance, the known password The corresponding total weight samples data of Cipher Strength and the corresponding Cipher Strength sample data of the known password determine institute respectively State the first input variable, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset It include: according to the corresponding overall score score value sample data of the known password gathered in advance, described known close with quantizing factor Described in the total weight samples data of the corresponding Cipher Strength of code and the corresponding Cipher Strength sample data of the known password determine The basic domain of first input variable is [0, first threshold], the fuzzy domain of first input variable be [0, first threshold/ R1, first threshold * 2/R1, first threshold * 3/R1 ..., first threshold], the fuzzy subset be [very little (VS), it is small (S), in Deng (Z), big (B), very big (VB)], quantizing factor 1;According to the corresponding overall score score value of the known password gathered in advance Sample data, the total weight samples data of the corresponding Cipher Strength of the known password and the corresponding password of the known password are strong Degree sample data determines that the basic domain of second input variable is [0, second threshold], and second input variable obscures Domain is [0, second threshold/R2, second threshold * 2/R2, second threshold * 3/R2 ..., second threshold], and the fuzzy subset is [very little (VS), small (S), medium (Z), big (B), very big (VB)], quantizing factor 1;According to described gathered in advance known close The corresponding overall score score value sample data of code, the total weight samples data of the corresponding Cipher Strength of the known password and it is described Know that the corresponding Cipher Strength sample data of password determines that the basic domain of the third input variable is [0, third threshold value], it is described The fuzzy domain of third input variable be [0, third threshold value/R3, third threshold value * 2/R3, third threshold value * 3/R3 ..., third threshold Value], the fuzzy subset is [very little (VS), small (S), medium (Z), big (L), very big (VL)], quantizing factor 1.
Wherein, the first threshold, second threshold, third threshold value can respectively correspond the known password gathered in advance The maximum value of corresponding overall score score value sample data, the total weight samples data of the known corresponding Cipher Strength of password are most The maximum value of big value and the corresponding Cipher Strength of the known password.For example, the first threshold can be 100, described the Two threshold values can be 1, and the third threshold value can be 1, and R1, R2 and R3 can be calculated according to practical experience.
Step 503, according to the known corresponding overall score score value sample data of password gathered in advance, described known close The total weight samples data of the corresponding Cipher Strength of code, the known corresponding Cipher Strength sample data of password and described first Input variable, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and Quantizing factor establishes the first membership function of first input variable respectively, the second of second input variable is subordinate to letter The third membership function of the several and described output variable.
The membership function of fuzzy controller generally comprises: Gauss π membership function, generalized bell membership function, S type are subordinate to Function, trapezoidal membership function, triangular membership and Z-shaped membership function.
In practical applications, by the practical experience of expert it is found that S π membership function can efficiently solve Cipher Strength The problem of detection.Therefore, as shown in fig. 6, first membership function for establishing first input variable respectively, described second Second membership function of input variable and the third membership function of the output variable may include: to establish described first respectively S π membership function F (x)=1/ (1+e of input variable, second input variable and the third input variable-a(x-c)), In, the value of first membership function, the second membership function and third membership function corresponding a and c can basis The corresponding overall score score value sample data of the known password gathered in advance, the known corresponding Cipher Strength of password are always weighed It is same notebook data, the known corresponding Cipher Strength sample data of password and first input variable, described second defeated Enter variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and quantizing factor are fitted examination It tests to obtain.
Corresponding Linguistic Value between input variable and output variable may be implemented by the membership function.Step 504, according to The corresponding overall score score value sample data of known password gathered in advance, the total weight sample of the known corresponding Cipher Strength of password Notebook data and the known corresponding Cipher Strength sample data of password establish first input variable, second input Cipher Strength code of points between variable and the output variable, and be subordinate to according to the Cipher Strength code of points, first Function, the second membership function and third membership function establish the fuzzy controller.
For example, corresponding obtaining the corresponding overall score score value sample data of a large amount of known password, the known password The total weight samples data of Cipher Strength and the known corresponding Cipher Strength sample data of password after, can establish as Cipher Strength code of points shown in following table one:
Table one:
It, can be according to the Cipher Strength after establishing above-mentioned Cipher Strength code of points in the embodiment of the present invention Code of points and first membership function, the second membership function and third membership function complete the generation of fuzzy controller Journey, and input variable is made inferences using the fuzzy controller to obtain corresponding output variable.
It should be noted that the parameters of above-mentioned generation fuzzy controller are to be obtained according to practical experience, in this hair In bright some embodiments, above-mentioned parameters can be finely adjusted according to different application scenarios.
In the embodiment of the present invention, by carrying out character analysis to the password, a variety of cryptographic properties information are obtained, and according to Corresponding score score value and deduction score value is calculated in the corresponding default computation rule of a variety of cryptographic properties information, and The corresponding overall score score value of the password and the total weight of Cipher Strength are finally obtained, and then fuzzy as what is pre-generated The input of controller, the corresponding Cipher Strength of the password is calculated by the fuzzy controller, so that the password is strong Degree is accurately calculated;Also, since the fuzzy controller is according to the corresponding overall score of known password gathered in advance Score value sample data, the total weight samples data of the corresponding Cipher Strength of the known password and the known password are corresponding close Code intensity sample data generates, and the known corresponding Cipher Strength sample data of password is obtained by multiple practice summary Therefore the data arrived can greatly improve the accuracy of Cipher Strength detection, be not in the password detection that Cipher Strength is weak For the strong password of Cipher Strength, and the case where the strong password of Cipher Strength is detected as Cipher Strength weak password, it is effectively reduced There is the probability judged by accident in Cipher Strength detection, can objectively avoid the standards of grading because of alphabetic character, numerical character, special word Continuous occur of symbol and caused by score loophole, have the characteristics that high reliablity, the safety being arranged for password provides preferable guarantor Barrier.
In embodiments of the present invention, when detecting that the corresponding Cipher Strength of password is very little, is small or medium, output phase is answered Prompt information, so that user is according to the prompt information Modify password.
It is illustrated in figure 7 the embodiment of the present invention and a kind of structural schematic diagram of Cipher Strength detection device 700 is provided, it is described close Code intensity detecting device 700 may include: analytical unit 701, computing unit 702 and detection unit 703.
The analytical unit 701 is analyzed for receiving password to be detected, and to the password, obtains password category Property information;
The computing unit 702, for calculating the password according to the cryptographic properties information and default computation rule Corresponding overall score score value and the total weight of Cipher Strength;
The detection unit 703, it is pre-generated for inputting the overall score score value and the total weight of the Cipher Strength Fuzzy controller, institute is obtained according to the overall score score value and the total weight calculation of the Cipher Strength by the fuzzy controller State the corresponding Cipher Strength of password;The fuzzy controller is according to the corresponding overall score score value sample of known password gathered in advance Notebook data, the total weight samples data of the corresponding Cipher Strength of the known password and the corresponding Cipher Strength of the known password What sample data generated.
Optionally, the analytical unit 701, also particularly useful for:
Each character in the password is matched with the character in preset characters library respectively, and according to matching result Determine the character types of each character in the password;
According to the character types of character each in the password, statistics obtain the password the total number of characters of numerical character, The total number of characters of consecutive identical numerical character, the total number of characters of alphabetic character, the total number of characters of consecutive identical alphabetic character, spcial character are total Number of characters and consecutive identical spcial character character number;
The total number of characters of the numerical character, the total number of characters of the alphabetic character and the total number of characters of the spcial character are carried out It is cumulative to obtain total number of characters of the password.
Optionally, the computing unit 702, also particularly useful for:
Corresponding first score value of total number of characters of the password is determined using the first default computation rule;
Corresponding second score value of numerical character for including in the password is determined using the second default computation rule;
Computation rule, which is preset, using third determines the corresponding third score value of alphabetic character for including in the password;
The corresponding quartile of spcial character for including in the password is determined using the 4th default computation rule;
It adds up to first score value, the second score value, third score value and quartile, it is corresponding to obtain the password Overall score score value.
Optionally, the computing unit 702, also particularly useful for:
Calculate separately numerical character accounting, alphabetic character accounting and the spcial character accounting in the password;
According to preset digital weight, alphabetical weight and spcial character weight to the numerical character accounting, alphabetic character Accounting and spcial character accounting add up, and obtain the total weight of the corresponding Cipher Strength of the password.
Optionally, the Cipher Strength detection device 700 can also include the generation unit of fuzzy controller, the generation Unit is specifically used for:
The corresponding overall score score value sample data of known password gathered in advance is determined as the of the fuzzy controller The corresponding total weight samples data of Cipher Strength of the known password are determined as the of the fuzzy controller by one input variable Two input variables become the output that the corresponding Cipher Strength sample data of the known password is determined as the fuzzy controller Amount;
According to the corresponding overall score score value sample data of known password gathered in advance, the corresponding password of the known password The total weight samples data of intensity and the known corresponding Cipher Strength sample data of password determine first input respectively Variable, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and quantization because Son;
It is corresponding according to the corresponding overall score score value sample data of the known password gathered in advance, the known password The total weight samples data of Cipher Strength, the known corresponding Cipher Strength sample data of password and first input become Amount, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and quantization because Son, establish respectively the first membership function of first input variable, the second membership function of second input variable and The third membership function of the output variable;
It is corresponding according to the corresponding overall score score value sample data of the known password gathered in advance, the known password The total weight samples data of Cipher Strength and the known corresponding Cipher Strength sample data of password establish first input Cipher Strength code of points between variable, second input variable and the output variable, and according to the Cipher Strength Code of points, the first membership function, the second membership function and third membership function establish the fuzzy controller.
Optionally, the generation unit, also particularly useful for:
It is corresponding according to the corresponding overall score score value sample data of the known password gathered in advance, the known password The total weight samples data of Cipher Strength and the known corresponding Cipher Strength sample data of password determine first input The basic domain of variable is [0, first threshold], the fuzzy domain of first input variable be [0, first threshold/R1, first Threshold value * 2/R1, first threshold * 3/R1 ..., first threshold], the fuzzy subset is [very little, small, medium, greatly, very greatly], amount Changing the factor is 1;
It is corresponding according to the corresponding overall score score value sample data of the known password gathered in advance, the known password The total weight samples data of Cipher Strength and the known corresponding Cipher Strength sample data of password determine second input The basic domain of variable is [0, second threshold], the fuzzy domain of second input variable be [0, second threshold/R2, second Threshold value * 2/R2, second threshold * 3/R2 ..., second threshold], the fuzzy subset is [very little, small, medium, greatly, very greatly], amount Changing the factor is 1;
It is corresponding according to the corresponding overall score score value sample data of the known password gathered in advance, the known password The total weight samples data of Cipher Strength and the known corresponding Cipher Strength sample data of password determine the third input The basic domain of variable is [0, third threshold value], the fuzzy domain of the third input variable be [0, third threshold value/R3, third Threshold value * 2/R3, third threshold value * 3/R3 ..., third threshold value], the fuzzy subset is [very little, small, medium, greatly, very greatly], amount Changing the factor is 1.
Optionally, the generation unit, also particularly useful for: first input variable, second input are established respectively The S π membership function of variable and the third input variable.
It should be noted that for convenience and simplicity of description, the specific work of the Cipher Strength detection device 700 of foregoing description Make process, the corresponding process of Fig. 1 and Fig. 6 the method can be referred to, details are not described herein.
Fig. 8 is the schematic diagram of terminal provided in an embodiment of the present invention.As shown in figure 8, the terminal 8 includes: processor 80, deposits Reservoir 81 and it is stored in the computer program 82 that can be run in the memory 81 and on the processor 80, such as password Intensity detection program.The processor 80 realizes that above-mentioned each Cipher Strength detection method is real when executing the computer program 82 Apply the step in example, such as step 101 shown in FIG. 1 is to 103.Alternatively, the processor 80 executes the computer program 82 The function of each module/unit in the above-mentioned each Installation practice of Shi Shixian, such as the function of unit 701 to 703 shown in Fig. 7.
The computer program can be divided into one or more module/units, one or more of modules/mono- Member is stored in the memory 81, and is executed by the processor 80, to complete the present invention.One or more of moulds Block/unit can be the series of computation machine program instruction section that can complete specific function, the instruction segment by describe it is described based on Implementation procedure of the calculation machine program in the terminal.For example, the computer program can be divided into analytical unit, calculate list Member and detection unit, each unit concrete function are as follows: analytical unit, for receiving password to be detected, and to the password into Row analysis, obtains cryptographic properties information;Computing unit, for being calculated according to the cryptographic properties information and default computation rule The corresponding overall score score value of the password and the total weight of Cipher Strength;Detection unit, for by the overall score score value and described The pre-generated fuzzy controller of the total weight input of Cipher Strength, by the fuzzy controller according to the overall score score value and institute It states the total weight calculation of Cipher Strength and obtains the corresponding Cipher Strength of the password;The fuzzy controller is according to gathered in advance The corresponding overall score score value sample data of known password, the total weight samples data of the corresponding Cipher Strength of the known password and The corresponding Cipher Strength sample data of password known to described generates.
The terminal can be the mobile terminals such as smart phone or desktop PC, notebook, palm PC and Cloud server etc. calculates equipment.The terminal may include, but be not limited only to, processor 80, memory 81.Those skilled in the art For member it is appreciated that Fig. 8 is only the example of terminal, the not restriction of structure paired terminal may include more more or less than illustrating Component, perhaps combine certain components or different components, such as the terminal can also include input-output equipment, net Network access device, bus etc..
Alleged processor 80 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 81 can be the internal storage unit of the terminal, such as the hard disk or memory of terminal.It is described to deposit Reservoir 81 is also possible to the plug-in type hard disk being equipped on the External memory equipment of the terminal, such as the terminal, intelligent storage Block (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc.. Further, the memory 81 can also both including the terminal internal storage unit and also including External memory equipment.Institute Memory 81 is stated for other programs and data needed for storing the computer program and the terminal.The memory 81 It can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal and method can pass through Other modes are realized.For example, device/terminal embodiment described above is only schematical, for example, the module or The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute Display or the mutual coupling or direct-coupling or communication connection discussed can be through some interfaces, device or unit INDIRECT COUPLING or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that the meter The content that calculation machine readable medium includes can carry out increase and decrease appropriate according to the requirement made laws in jurisdiction with patent practice, It such as does not include electric carrier signal and telecommunications according to legislation and patent practice, computer-readable medium in certain jurisdictions Signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of Cipher Strength detection method characterized by comprising
Password to be detected is received, and the password is analyzed, obtains cryptographic properties information;
The corresponding overall score score value of the password is calculated according to the cryptographic properties information and default computation rule and password is strong Spend total weight;
By the pre-generated fuzzy controller of the overall score score value and the total weight input of the Cipher Strength, by the Fuzzy Control Device processed obtains the corresponding Cipher Strength of the password according to the overall score score value and the total weight calculation of the Cipher Strength;It is described Fuzzy controller is corresponding according to the corresponding overall score score value sample data of known password gathered in advance, the known password What the total weight samples data of Cipher Strength and the corresponding Cipher Strength sample data of the known password generated.
2. Cipher Strength detection method as described in claim 1, which is characterized in that it is described that the password is analyzed, it obtains To cryptographic properties information, comprising: each character in the password is matched with the character in preset characters library respectively, and The character types of each character in the password are determined according to matching result;
According to the character types of character each in the password, statistics obtains the total number of characters of numerical character, continuous of the password The total number of characters of same numbers character, the total number of characters of alphabetic character, the total number of characters of consecutive identical alphabetic character, the total character of spcial character Several and consecutive identical spcial character character number;
It adds up to the total number of characters of the numerical character, the total number of characters of the alphabetic character and the total number of characters of the spcial character Obtain total number of characters of the password.
3. Cipher Strength detection method as claimed in claim 1 or 2, which is characterized in that described to be believed according to the cryptographic properties Breath and default computation rule calculate the corresponding overall score score value of the password, comprising:
Corresponding first score value of total number of characters of the password is determined using the first default computation rule;
Corresponding second score value of numerical character for including in the password is determined using the second default computation rule;
Computation rule, which is preset, using third determines the corresponding third score value of alphabetic character for including in the password;
The corresponding quartile of spcial character for including in the password is determined using the 4th default computation rule;
It adds up to first score value, the second score value, third score value and quartile, obtains the corresponding general comment of the password Divide score value.
4. Cipher Strength detection method as claimed in claim 1 or 2, which is characterized in that described to be believed according to the cryptographic properties Breath and default computation rule determine the total weight of the corresponding Cipher Strength of the password, comprising:
Calculate separately numerical character accounting, alphabetic character accounting and the spcial character accounting in the password;
According to preset digital weight, alphabetical weight and spcial character weight to the numerical character accounting, alphabetic character accounting It adds up with spcial character accounting, obtains the total weight of the corresponding Cipher Strength of the password.
5. Cipher Strength detection method as described in claim 1, which is characterized in that the generation of the fuzzy controller includes:
The corresponding overall score score value sample data of known password gathered in advance is determined as the first defeated of the fuzzy controller Enter variable, the corresponding total weight samples data of Cipher Strength of the known password are determined as the second defeated of the fuzzy controller Enter variable, the corresponding Cipher Strength sample data of the known password is determined as to the output variable of the fuzzy controller;
According to the corresponding overall score score value sample data of the known password gathered in advance, the corresponding password of the known password The total weight samples data of intensity and the known corresponding Cipher Strength sample data of password determine first input respectively Variable, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and quantization because Son;
According to the corresponding overall score score value sample data of the known password gathered in advance, the corresponding password of the known password The total weight samples data of intensity, the known corresponding Cipher Strength sample data of password and first input variable, institute The second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and quantizing factor are stated, point The first membership function of first input variable, the second membership function of second input variable and described defeated are not established The third membership function of variable out;
According to the corresponding overall score score value sample data of the known password gathered in advance, the corresponding password of the known password The total weight samples data of intensity and the known corresponding Cipher Strength sample data of password establish first input variable, Cipher Strength code of points between second input variable and the output variable, and scored and advised according to the Cipher Strength Then, the first membership function, the second membership function and third membership function establish the fuzzy controller.
6. Cipher Strength detection method as claimed in claim 5, which is characterized in that described according to known password gathered in advance Corresponding overall score score value sample data, total weight samples data of the known corresponding Cipher Strength of password and described known The corresponding Cipher Strength sample data of password determines first input variable, second input variable and the output respectively The corresponding basic domain of variable, fuzzy domain, fuzzy subset and quantizing factor include:
According to the corresponding overall score score value sample data of the known password gathered in advance, the corresponding password of the known password The total weight samples data of intensity and the known corresponding Cipher Strength sample data of password determine first input variable Basic domain be [0, first threshold], the fuzzy domain of first input variable be [0, first threshold/R1, first threshold * 2/R1, first threshold * 3/R1 ..., first threshold], the fuzzy subset is [very little, small, medium, greatly, very greatly], quantizing factor It is 1;
According to the corresponding overall score score value sample data of the known password gathered in advance, the corresponding password of the known password The total weight samples data of intensity and the known corresponding Cipher Strength sample data of password determine second input variable Basic domain be [0, second threshold], the fuzzy domain of second input variable be [0, second threshold/R2, second threshold * 2/R2, second threshold * 3/R2 ..., second threshold], the fuzzy subset is [very little, small, medium, greatly, very greatly], quantizing factor It is 1;
According to the corresponding overall score score value sample data of the known password gathered in advance, the corresponding password of the known password The total weight samples data of intensity and the known corresponding Cipher Strength sample data of password determine the third input variable Basic domain be [0, third threshold value], the fuzzy domain of the third input variable be [0, third threshold value/R3, third threshold value * 2/R3, third threshold value * 3/R3 ..., third threshold value], the fuzzy subset is [very little, small, medium, greatly, very greatly], quantizing factor It is 1.
7. Cipher Strength detection method as claimed in claim 5, which is characterized in that described to establish the first input change respectively The first membership function, the second membership function of second input variable and the third membership function of the output variable of amount Include:
The S π membership function of first input variable, second input variable and the third input variable is established respectively.
8. a kind of Cipher Strength detection device characterized by comprising
Analytical unit is analyzed for receiving password to be detected, and to the password, obtains cryptographic properties information;
Computing unit, for calculating the corresponding overall score of the password according to the cryptographic properties information and default computation rule Score value and the total weight of Cipher Strength;
Detection unit, for the fuzzy control that the overall score score value and the total weight input of the Cipher Strength is pre-generated Device obtains the password according to the overall score score value and the total weight calculation of the Cipher Strength by the fuzzy controller and corresponds to Cipher Strength;The fuzzy controller is according to the corresponding overall score score value sample data of known password gathered in advance, institute State the total weight samples data of the corresponding Cipher Strength of known password and the corresponding Cipher Strength sample data of the known password It generates.
9. a kind of terminal, including memory, processor and storage can be run in the memory and on the processor Computer program, which is characterized in that the processor is realized when executing the computer program as any in claim 1-7 The step of one the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of realization any one of such as claim 1-7 the method.
CN201910433513.4A 2019-05-21 2019-05-21 Method, device, terminal and computer readable storage medium for detecting password strength Active CN110245488B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910433513.4A CN110245488B (en) 2019-05-21 2019-05-21 Method, device, terminal and computer readable storage medium for detecting password strength

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910433513.4A CN110245488B (en) 2019-05-21 2019-05-21 Method, device, terminal and computer readable storage medium for detecting password strength

Publications (2)

Publication Number Publication Date
CN110245488A true CN110245488A (en) 2019-09-17
CN110245488B CN110245488B (en) 2023-11-17

Family

ID=67884906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910433513.4A Active CN110245488B (en) 2019-05-21 2019-05-21 Method, device, terminal and computer readable storage medium for detecting password strength

Country Status (1)

Country Link
CN (1) CN110245488B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807476A (en) * 2019-10-17 2020-02-18 新华三信息安全技术有限公司 Password security level classification method and device and electronic equipment
CN111786796A (en) * 2020-07-02 2020-10-16 南开大学 Password strength evaluation method based on password reuse, character jump and separation
CN112651017A (en) * 2020-12-31 2021-04-13 成都知道创宇信息技术有限公司 Password intensity estimation method, model training method and related device
CN113132380A (en) * 2021-04-18 2021-07-16 重庆化工职业学院 Security evaluation system, method, device and medium for cryptographic algorithm
CN113162774A (en) * 2021-05-19 2021-07-23 深圳市怡化时代科技有限公司 Weak password detection method and device for encryption keyboard, self-service equipment and storage medium
CN113312611A (en) * 2021-07-30 2021-08-27 北京华云安信息技术有限公司 Password detection method, device, equipment and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090313696A1 (en) * 2008-06-12 2009-12-17 International Business Machines Corporation Calculating a password strength score based upon character proximity and relative position upon an input device
CN104715189A (en) * 2012-06-29 2015-06-17 北京奇虎科技有限公司 Method and device for prompting password safety of form filling assembly
CN105718787A (en) * 2016-02-15 2016-06-29 上海斐讯数据通信技术有限公司 Router password complexity calibration method
CN108256317A (en) * 2017-12-05 2018-07-06 西安交大捷普网络科技有限公司 A kind of weak password detection method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090313696A1 (en) * 2008-06-12 2009-12-17 International Business Machines Corporation Calculating a password strength score based upon character proximity and relative position upon an input device
CN104715189A (en) * 2012-06-29 2015-06-17 北京奇虎科技有限公司 Method and device for prompting password safety of form filling assembly
CN105718787A (en) * 2016-02-15 2016-06-29 上海斐讯数据通信技术有限公司 Router password complexity calibration method
CN108256317A (en) * 2017-12-05 2018-07-06 西安交大捷普网络科技有限公司 A kind of weak password detection method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807476A (en) * 2019-10-17 2020-02-18 新华三信息安全技术有限公司 Password security level classification method and device and electronic equipment
CN110807476B (en) * 2019-10-17 2022-11-18 新华三信息安全技术有限公司 Password security level classification method and device and electronic equipment
CN111786796A (en) * 2020-07-02 2020-10-16 南开大学 Password strength evaluation method based on password reuse, character jump and separation
CN111786796B (en) * 2020-07-02 2021-10-12 南开大学 Password strength evaluation method based on password reuse, character jump and separation
CN112651017A (en) * 2020-12-31 2021-04-13 成都知道创宇信息技术有限公司 Password intensity estimation method, model training method and related device
CN113132380A (en) * 2021-04-18 2021-07-16 重庆化工职业学院 Security evaluation system, method, device and medium for cryptographic algorithm
CN113162774A (en) * 2021-05-19 2021-07-23 深圳市怡化时代科技有限公司 Weak password detection method and device for encryption keyboard, self-service equipment and storage medium
CN113312611A (en) * 2021-07-30 2021-08-27 北京华云安信息技术有限公司 Password detection method, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN110245488B (en) 2023-11-17

Similar Documents

Publication Publication Date Title
CN110245488A (en) Cipher Strength detection method, device, terminal and computer readable storage medium
CN112100295A (en) User data classification method, device, equipment and medium based on federal learning
CN109815657A (en) A kind of identity identifying method and terminal device based on alliance's chain
CN103593609B (en) Trustworthy behavior recognition method and device
CN111786950B (en) Network security monitoring method, device, equipment and medium based on situation awareness
CN107168854A (en) Detection method, device, equipment and readable storage medium storing program for executing are clicked in Internet advertising extremely
US20170339187A1 (en) Intrusion detection and prevention system and method for generating detection rules and taking countermeasures
CN108229679A (en) Convolutional neural networks de-redundancy method and device, electronic equipment and storage medium
CN105956469B (en) File security recognition methods and device
CN109740630A (en) Method for processing abnormal data and device
CN107315955A (en) File security recognition methods and device
CN109213857A (en) A kind of fraud recognition methods and device
CN108090351A (en) For handling the method and apparatus of request message
CN112468658B (en) Voice quality detection method and device, computer equipment and storage medium
CN113726784A (en) Network data security monitoring method, device, equipment and storage medium
CN112039730B (en) Performance evaluation method of encryption algorithm and storage medium
CN110109888A (en) A kind of document handling method and device
CN111680167A (en) Service request response method and server
CN115776401B (en) Method and device for tracing network attack event based on less sample learning
Li et al. Web application attack detection based on attention and gated convolution networks
CN109714342A (en) The guard method of a kind of electronic equipment and device
CN110782117A (en) Driving risk detection method and device, storage medium and electronic equipment
CN110096868A (en) Auditing method, device, equipment and the computer readable storage medium of operation code
CN115589339A (en) Network attack type identification method, device, equipment and storage medium
CN108062576A (en) For the method and apparatus of output data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20231024

Address after: Room 2, Floor 11, Unit 2, Building 2, Baiyi South Bank, south of Binhe Avenue, Liuwu Avenue, Liuwu New District, Lhasa, Xizang Autonomous Region, 850000

Applicant after: Guoxin Jinhong Information Consulting Co.,Ltd.

Address before: 518000 Room 202, block B, aerospace micromotor building, No.7, Langshan No.2 Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: Shenzhen LIAN intellectual property service center

Effective date of registration: 20231024

Address after: 518000 Room 202, block B, aerospace micromotor building, No.7, Langshan No.2 Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen LIAN intellectual property service center

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: PING AN PUHUI ENTERPRISE MANAGEMENT Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant