ES2669536T3 - Sistema de auditoría de contraseñas - Google Patents
Sistema de auditoría de contraseñas Download PDFInfo
- Publication number
- ES2669536T3 ES2669536T3 ES13155372.9T ES13155372T ES2669536T3 ES 2669536 T3 ES2669536 T3 ES 2669536T3 ES 13155372 T ES13155372 T ES 13155372T ES 2669536 T3 ES2669536 T3 ES 2669536T3
- Authority
- ES
- Spain
- Prior art keywords
- passwords
- password
- user
- network
- strength
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP13155372.9A EP2767922B1 (en) | 2013-02-15 | 2013-02-15 | Password audit system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ES2669536T3 true ES2669536T3 (es) | 2018-05-28 |
Family
ID=47826876
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| ES13155372.9T Active ES2669536T3 (es) | 2013-02-15 | 2013-02-15 | Sistema de auditoría de contraseñas |
Country Status (11)
| Country | Link |
|---|---|
| US (1) | US9292681B2 (enExample) |
| EP (1) | EP2767922B1 (enExample) |
| CA (1) | CA2842741C (enExample) |
| DK (1) | DK2767922T3 (enExample) |
| ES (1) | ES2669536T3 (enExample) |
| HR (1) | HRP20180608T1 (enExample) |
| HU (1) | HUE037145T2 (enExample) |
| LT (1) | LT2767922T (enExample) |
| NO (1) | NO2767922T3 (enExample) |
| PL (1) | PL2767922T3 (enExample) |
| PT (1) | PT2767922T (enExample) |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9559848B2 (en) * | 2014-08-25 | 2017-01-31 | Intel Corporation | Method, apparatus, and instructions for safely storing secrets in system memory |
| US20160148211A1 (en) * | 2014-11-20 | 2016-05-26 | Blue Sun Technologies, Inc. | Identity Protection |
| JP7105640B2 (ja) * | 2018-07-10 | 2022-07-25 | キヤノン株式会社 | 画像処理装置、その制御方法、及びプログラム |
| US11163872B1 (en) * | 2019-03-11 | 2021-11-02 | NortonLifeLock Inc. | Systems and methods for identifying cybersecurity status based on an ontology of vault items |
| WO2021015711A1 (en) * | 2019-07-19 | 2021-01-28 | Hewlett-Packard Development Company, L.P. | Automatic password expiration based on password integrity |
| JP7353901B2 (ja) * | 2019-10-03 | 2023-10-02 | 株式会社ロイヤリティマーケティング | 情報処理装置、情報処理方法およびプログラム |
| US11936664B2 (en) * | 2020-03-14 | 2024-03-19 | Microsoft Technology Licensing, Llc | Identity attack detection and blocking |
| CN116055067B (zh) * | 2023-04-01 | 2023-06-30 | 北京江民新科技术有限公司 | 一种弱口令检测的方法、装置、电子设备及介质 |
| CN120090813A (zh) * | 2023-12-01 | 2025-06-03 | 华为技术有限公司 | 一种口令检测方法、服务端、用户端以及口令检测系统 |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW588243B (en) * | 2002-07-31 | 2004-05-21 | Trek 2000 Int Ltd | System and method for authentication |
| US7367053B2 (en) * | 2002-10-11 | 2008-04-29 | Yamatake Corporation | Password strength checking method and apparatus and program and recording medium thereof, password creation assisting method and program thereof, and password creating method and program thereof |
| US7200754B2 (en) * | 2003-03-03 | 2007-04-03 | International Business Machines Corporation | Variable expiration of passwords |
| US7581245B2 (en) * | 2004-03-05 | 2009-08-25 | Sap Ag | Technique for evaluating computer system passwords |
| US20080052525A1 (en) * | 2006-08-28 | 2008-02-28 | Tableau, Llc | Password recovery |
| US7929707B1 (en) | 2007-09-06 | 2011-04-19 | Elcomsoft Co. Ltd. | Use of graphics processors as parallel math co-processors for password recovery |
| US8332918B2 (en) * | 2007-12-06 | 2012-12-11 | Novell, Inc. | Techniques for real-time adaptive password policies |
| US8930775B2 (en) * | 2011-11-28 | 2015-01-06 | International Business Machines Corporation | Preventing disturbance induced failure in a computer system |
| US8819443B2 (en) * | 2012-02-14 | 2014-08-26 | Western Digital Technologies, Inc. | Methods and devices for authentication and data encryption |
| US8973116B2 (en) * | 2012-04-10 | 2015-03-03 | Dropbox, Inc. | Pattern entropy password strength estimator |
-
2013
- 2013-02-15 LT LTEP13155372.9T patent/LT2767922T/lt unknown
- 2013-02-15 PL PL13155372T patent/PL2767922T3/pl unknown
- 2013-02-15 ES ES13155372.9T patent/ES2669536T3/es active Active
- 2013-02-15 DK DK13155372.9T patent/DK2767922T3/en active
- 2013-02-15 PT PT131553729T patent/PT2767922T/pt unknown
- 2013-02-15 NO NO13155372A patent/NO2767922T3/no unknown
- 2013-02-15 HU HUE13155372A patent/HUE037145T2/hu unknown
- 2013-02-15 EP EP13155372.9A patent/EP2767922B1/en active Active
-
2014
- 2014-02-11 CA CA2842741A patent/CA2842741C/en active Active
- 2014-02-12 US US14/178,706 patent/US9292681B2/en active Active
-
2018
- 2018-04-17 HR HRP20180608TT patent/HRP20180608T1/hr unknown
Also Published As
| Publication number | Publication date |
|---|---|
| EP2767922B1 (en) | 2018-04-04 |
| HRP20180608T1 (hr) | 2018-06-01 |
| CA2842741C (en) | 2021-02-16 |
| PL2767922T3 (pl) | 2018-07-31 |
| NO2767922T3 (enExample) | 2018-09-01 |
| US9292681B2 (en) | 2016-03-22 |
| US20140237566A1 (en) | 2014-08-21 |
| HUE037145T2 (hu) | 2018-08-28 |
| DK2767922T3 (en) | 2018-05-22 |
| EP2767922A1 (en) | 2014-08-20 |
| CA2842741A1 (en) | 2014-08-15 |
| LT2767922T (lt) | 2018-05-25 |
| PT2767922T (pt) | 2018-05-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ES2669536T3 (es) | Sistema de auditoría de contraseñas | |
| CN111819561B (zh) | 集成电路数据保护 | |
| Mohamed et al. | Android vs iOS security: A comparative study | |
| US9514300B2 (en) | Systems and methods for enhanced security in wireless communication | |
| US20190028273A1 (en) | Method for saving data with multi-layer protection, in particular log-on data and passwords | |
| US10142343B2 (en) | Unauthorized access detecting system and unauthorized access detecting method | |
| CN100416446C (zh) | 检测对受保护计算机资源攻击的方法和系统 | |
| US9288199B1 (en) | Network access control with compliance policy check | |
| US12155683B2 (en) | System and method to manage security | |
| WO2024137118A1 (en) | Protection of cloud storage devices from anomalous encryption operations | |
| US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
| CN114070571B (zh) | 一种建立连接的方法、装置、终端及存储介质 | |
| KR20180122249A (ko) | 안전 저장소 접근정보를 보호하는 위치고정형 사물인터넷 기기 및 위치고정형 사물인터넷 기기의 안전 저장소 접근정보를 보호하는 방법 | |
| CN100483297C (zh) | 用于保护和监控受保护的数据的设备和方法 | |
| CN113454968A (zh) | 用于安全交易的方法和系统 | |
| Ezirim et al. | Trusted platform module–a survey | |
| Sampemane | Internal access controls | |
| Drake et al. | Designing a User-Experience-First, Privacy-Respectful, high-security mutual-multifactor authentication solution | |
| CN117521052A (zh) | 一种服务器隐私的保护认证方法、装置、计算机设备及介质 | |
| Alert | Advanced persistent threat compromise of government agencies, critical infrastructure, and private sector organizations | |
| Jøsang | Cybersecurity | |
| US11100215B2 (en) | Management of a display of a view of an application on a screen of an electronic data entry device, corresponding method, device and computer program product | |
| Kamoru et al. | Computer security Measures, tools and best practices | |
| Čisar et al. | Overview of Some Security Aspectsof Smart Phones | |
| Alsaidi | Protect Sensitive Data in Public Cloud from an Theft Attack and detect Abnormal Client Behavior |