CN108537038A - Custom rule cipher management method, device, terminal device and storage medium - Google Patents
Custom rule cipher management method, device, terminal device and storage medium Download PDFInfo
- Publication number
- CN108537038A CN108537038A CN201810242166.2A CN201810242166A CN108537038A CN 108537038 A CN108537038 A CN 108537038A CN 201810242166 A CN201810242166 A CN 201810242166A CN 108537038 A CN108537038 A CN 108537038A
- Authority
- CN
- China
- Prior art keywords
- rule
- password
- type
- file
- settings
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of custom rule cipher management method, device, terminal device and storage mediums.The custom rule cipher management method, including:It obtains password and generates instruction, generating instruction based on the password obtains goal rule mark and original password;It is identified based on the goal rule, goal rule file corresponding with goal rule mark is obtained from least one rule file, wherein, the goal rule file includes that rule executes logic and at least one rule type, and there are irreversible transformation rule types at least one rule type;Logic is executed according to the rule, the original password is handled using at least one rule type, generates target password.When managing user password using the custom rule cipher management method, the management to multiple account number ciphers can be realized according to the unique original password of user, and ensure the safety of Password Management.
Description
Technical field
The present invention relates to computer realm more particularly to a kind of custom rule cipher management method, device, terminal devices
And storage medium.
Background technology
The current various means of payment, such as the payment of Alipay, wechat and bank card, are generally used the verification of 6 bit digitals
Mode is as payment cipher.But when user all using a set of identical password when, risk is too big, easily causes password
Leakage;If user uses different passwords, and usually forget Password, user password cannot effectively be managed.
Invention content
A kind of custom rule cipher management method of offer of the embodiment of the present invention, device, terminal device and storage medium, with
Solve the problems, such as that active user's password is easy leakage and is decrypted.
In a first aspect, the embodiment of the present invention provides a kind of custom rule cipher management method, including:
It obtains password and generates instruction, generating instruction based on the password obtains goal rule mark and original password;
It is identified, is obtained from least one rule file corresponding with goal rule mark based on the goal rule
Goal rule file, wherein the goal rule file includes that rule executes logic and at least one rule type, at least one
There are irreversible transformation rule types in the kind rule type;
Logic is executed according to the rule, the original password is handled using at least one rule type,
Generate target password.
Second aspect, the embodiment of the present invention provide a kind of custom rule Password Management device, including:
Id password acquisition module generates instruction for obtaining password, and generating instruction based on the password obtains target rule
Then mark and original password;
Goal rule file acquisition module is obtained for being identified based on the goal rule from least one rule file
Take goal rule file corresponding with goal rule mark, wherein the goal rule file includes that rule execution is patrolled
Volume and at least one rule type, there are irreversible transformation rule types at least one rule type;
Target password generation module, for executing logic according to the rule, using at least one rule type pair
The original password is handled, and target password is generated.
The third aspect, the embodiment of the present invention provide a kind of terminal device, including memory, processor and are stored in described
In memory and the computer program that can run on the processor, the processor are realized when executing the computer program
The step of custom rule cipher management method.
Fourth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium
Matter is stored with computer program, and the computer program realizes the custom rule cipher management method when being executed by processor
The step of.
In custom rule cipher management method, device, terminal device and storage medium that the embodiment of the present invention is provided,
Goal rule file corresponding with goal rule mark is obtained from least one rule file based on goal rule mark,
In, goal rule file includes that rule executes logic and at least one rule type, and existing at least one rule type can not
Inverse transformation rule type, rule-based execution logic and at least one rule type, can ensure to be given birth to according to goal rule file
At password diversity and high security, effectively prevent password be easy leakage the problem of.Add at least one rule type
Enter irreversible transformation rule type, it is ensured that the password generated according to rule settings will be unable to by reversely decoding to obtain
The safety that rule settings generate password is greatly improved in original password.Logic is executed according to rule, using at least one Regularia
Type handles original password, generates target password, can ensure the safety of original password, realize effective password pipe
Reason.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention
Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is a flow chart of custom rule cipher management method in the embodiment of the present invention 1.
Fig. 2 is a particular flow sheet of step S10 in Fig. 1.
Fig. 3 is the particular flow sheet before step S20 in Fig. 1.
Fig. 4 is a particular flow sheet of step S21 in Fig. 3.
Fig. 5 is a particular flow sheet of step S22 in Fig. 3.
Fig. 6 is a functional block diagram of custom rule Password Management device in the embodiment of the present invention 2.
Fig. 7 is a schematic diagram of terminal device in the embodiment of the present invention 4.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
Embodiment 1
Fig. 1 shows a flow chart of custom rule cipher management method in the present embodiment.The custom rule password pipe
Reason method can be applicable in application program, can be according to rule file user unique original password and preserved in the database
Password corresponding with rule file is calculated in real time, effectively realizes the Password Management of user, the custom rule Password Management
Method specifically can be applicable in the application program of installation on the terminal device.Wherein, the terminal device be can be with user into pedestrian
The equipment of machine interaction, the including but not limited to equipment such as computer, smart mobile phone and tablet.As shown in Figure 1, the custom rule password
Management method includes the following steps:
S10:It obtains password and generates instruction, generating instruction based on password obtains goal rule mark and original password.
Wherein, it refers to the instruction for obtaining goal rule mark and original password that password, which generates instruction,.Goal rule mark
Knowledge refers to the mark for unique identification goal rule file.Goal rule file refers to that user wants the rule file obtained,
Rule file refers to preserving the memory carrier of rule settings, is preserved in the form of the file (.txt) of text formatting,
The file of text format stores corresponding with rule type by (i.e. rule executes logic) of certain logic sequence combination
Function, for application program by calling rule file, the function in executing rule file realizes the encryption to original password.It is original
Password refer to refer to password that user uniquely uses, in the custom rule cipher management method, user only needs uniquely to remember
Firmly original password is sufficient.
In the present embodiment, in the application program (hereinafter referred to as application program) for realizing custom rule Password Management, answer
Password input by user is obtained with program and generates instruction, can be based on password generation instruction and quickly and conveniently be got target
Rule mark and original password.
In a specific embodiment, it in step S10, as shown in Fig. 2, obtaining password generates instruction, is generated based on password
Instruction obtains goal rule mark and original password, includes the following steps:
S11:Instruction display mark acquisition interface is generated according to password and original password obtains interface.
Wherein, it refers to the interface for obtaining goal rule mark shown in application terminal that mark, which obtains interface,
It refers to the interface for obtaining original password shown on application terminal display that original password, which obtains interface, and mark obtains
It includes but not limited to get corresponding target by modes such as key-press input, voice inputs that interface and original password, which obtain interface,
Rule mark and original password.
In the present embodiment, application program obtains after password input by user generates instruction and shows mark on terminal display
It obtains interface and original password obtains interface, to provide the interface platform for obtaining user's input information, smoothly obtain user's input
Goal rule mark and original password.
S12:Interface and original password interface, which are obtained, by mark obtains goal rule mark and original password.
In the present embodiment, the mode that application program can provide the typings information such as key-press input, voice input passes through mark
It obtains interface and original password interface and obtains goal rule mark input by user and original password.
S20:It is identified based on goal rule, mesh corresponding with goal rule mark is obtained from least one rule file
Mark rule file, wherein goal rule file includes that rule executes logic and at least one rule type, at least one Regularia
There are irreversible transformation rule types in type.
Wherein, it refers to the sequence that the corresponding function of rule type executes in rule settings that rule, which executes logic,.Regularia
Type refers to the type for the operation rule that password is encrypted.From the concept of rule type can naturally, simply understand rule
The concept of setting:Rule settings refer to by least one rule type with self-defined sortord (namely rule executes logic) group
The set of rule type made of conjunction, from from the point of view of development platform creates rule settings, being exactly by least one rule in fact
The operation program that then the corresponding function of type is composed by self-defined sortord.Irreversible transformation rule type refers to passing through
The encrypted value of the rule type is the rule type for being unable to reverse-direction derivation, decoding out value before encrypting.
It in the present embodiment, is identified based on goal rule, such as is identified rule file ID as goal rule, user wants
When logging in safety vehicle insurance, multiple accounts of safety life insurance peace eutocia danger by login password, need to pass through rule in application program
Then file ID (such as safety vehicle insurance, safety life insurance peace eutocia danger) inquiry obtains goal rule file (such as safety vehicle preserved
Dangerous .rule, safety life insurance .rule peace eutocias danger .rule), with according to the goal rule file acquisition rule file ID of acquisition
For safety vehicle insurance, the corresponding login password of account of safety life insurance peace eutocia danger.
In a specific embodiment, in step S20, as shown in figure 3, identified based on goal rule, from least one
In rule file obtain with the step of goal rule mark corresponding goal rule file before, the custom rule password pipe
Reason method further includes:It is pre-created and preserves at least one rule file.
This is pre-created and includes the step of preserving at least one rule file:
S21:At least one rule settings are obtained, each rule settings include that corresponding rule executes logic and at least one
Kind of rule type, there are irreversible transformation rule types at least one rule type.
During creating rule settings, a kind of rule type can be realized and indicated with corresponding function, example
Such as:With the one such rule type of add (pwd, num) function representation, what which indicated is a kind of add operation rule
Then, wherein pwd indicates current password, and num indicates increased numerical value in the add operation, when num takes 123456, i.e. function
When being expressed as add (pwd, 123456), the concrete operation process of the addition rule is pwd+123456 (i.e. in current password
On the basis of plus 123456).
It is to be appreciated that when there are three types of when rule type A (), B () and C (), these three rule types are held according to rule
Row logic (self-defined sequence), which is combined, can obtain 6 kinds of different rule settings.When the operation of rule type is increasingly complex,
When the quantity of rule type is more, the type of rule settings is more various, then calculating the password obtained according to rule settings also gets over
Various, encrypted safety is higher.
Irreversible transformation rule type refer to by the encrypted value of the rule type be unable to reverse-direction derivation, decode out plus
The rule type of value before close, such as:Using the interception method based on md5 encryption, md5 encryption is carried out to original password first, it is false
If original password is 123456, then 32 16 system numbers are represented by using the encrypted value of interception method based on md5 encryption
" E10ADC3949BA59ABBE56E057F20F883E ", interception top ten " E10ADC3949 ", is converted into 10 system numbers
" 966549846345 ", then after intercepting six obtain " 846345 ", be inversely to be reduced to by the value 846345 after intercepting
123456.It is also possible using other irreversible transformation rule types except the interception method based on md5 encryption, such as use
The irreversible transformations rule types such as SHA-1 (one kind in secure hash algorithm) encrypted interception method.
In the present embodiment, at least one rule settings are obtained, which includes that corresponding rule executes logic sum
There is at least one irreversible transformation Regularia at least one rule type of each rule settings at least one rule type
Type illustrates that at least one rule type of the rule settings can be entirely irreversible transformation rule type, can also wrap simultaneously
Include at least one irreversible transformation rule type and other rule types.By it is corresponding rule execute logic (namely to rule
Then type self-defined sequence combination) and at least one rule type acquisition rule settings can ensure to be given birth to according to rule settings
At password have the characteristics that diversity and high security, password can be effectively prevent to reveal the problem of.In at least one rule
There are irreversible transformation rule types in type, it is ensured that according to rule settings generate password can not by reverse-direction derivation,
The mode of decoding obtains original password, and the safety of original password is greatly improved.
In a specific embodiment, in step S21, as shown in figure 4, obtaining at least one rule settings, each rule
Setting includes that corresponding rule executes logic and at least one rule type, and existing at least one rule type can not inversion
Rule type is changed, is included the following steps:
S211:Obtain preset at least one rule type, there are irreversible transformation rule types in rule type.
In the application program for realizing custom rule Password Management, some bases, common Regularia can be pre-set
Type, such as in general, conversion only is encrypted to the original password indicated with 6 bit digitals, and encrypt preceding and add
Password after close is indicated in the form of 6 bit digitals, then rule type can be pre-set accordingly according to the characteristics of 6 bit digital
Operation.Irreversible transformation rule type is any indispensable a kind of rule type of rule settings institute of composition, therefore pre-
If when rule type, similarly needing default irreversible transformation rule type.
In the present embodiment, at least one of acquisition pre-sets and is stored in database rule type, and this is at least
There should be irreversible transformation rule type in a kind of rule type, the default rule can be judged according to default rule type
Whether type meets the needs of rule of combination setting.
S212:If there are the rule types needed for rule of combination setting for preset at least one rule type, to combination
Rule type needed for rule settings carries out self-defined sequence combination, obtains at least one rule settings.
In the present embodiment, after obtaining pre-set at least one rule type, according to the actual demand of rule settings,
Judge preset at least one rule type with the presence or absence of the rule type needed for rule of combination setting.If preset at least one
There are the rule types needed for rule of combination setting for rule type, then are made by oneself to the rule type needed for rule of combination setting
Justice sequence combination, obtains at least one rule settings.Such as:Regular type add (pwd, num), invert (pwd) and MD5
(6) (wherein, invert () refers to inverting op to (pwd) three kinds of rule types, and concrete operation rule is the inverting op herein:
If any numerical value 111111, then inverting op is 1000000-111111;MD5 (6) indicates the interception method based on md5 encryption, finally
The value of interception is latter 6) when, customized sequence can be carried out according to three kinds of rule types and is combined, by
(regulation 0!For 6 kinds of different rule settings 1) can be obtained.Specifically, as using invert (pwd), add (pwd, num) and
The combination operation of MD5 (pwd), works as pwd=888888, and when num=12344, obtained result is " 846345 ", specific to transport
Calculation process is as follows:
1)invert->1000000-888888=111112
2)add 12344->111112+12344=123456
3)MD5(6)123456->846345
It is self-defined by being carried out to the rule type needed for rule of combination setting from preset at least one rule type
Sequence combination, can obtain multiple rule setting, and user can carry out custom rule password pipe according to different rule types
Reason, can realize effective management to password, improve encrypted safety.
It should be noted that rule type is to disclosed in user, user be able to know that rule type be specifically how into
Row cryptographic calculation, user's worry opaque to rule type can be reduced, and user can also be according to disclosed rule
Type carries out operation and inspection, without that by means of application program itself, can further increase the safety of Password Management completely
Property and reliability.
S213:If preset at least one rule type lacks the rule type of rule of combination setting, combination rule are created
Required rule type is then set, and self-defined sequence is carried out to required rule type and is combined, at least one rule is obtained and sets
It is fixed.
In the present embodiment, after obtaining pre-set at least one rule type, according to the actual demand of rule settings,
Judge preset at least one rule type with the presence or absence of the rule type needed for rule of combination setting.If preset at least one
Rule type lacks the rule type of rule of combination setting, for example, rule settings are required to the original password to there is letter
It is handled, it is assumed that original password zls123, then when default rule type such as add (pwd, 123456) is to original password
When operation is encrypted in zls123, zls123+123456 will be unable to handle the letter in password.Therefore, it is necessary to create
It can solve the problems, such as the rule type needed for alphabetical rule of combination setting.It is zls123 for original password, it is desirable that can be right
What letter was handled, new rule type can be directly created, or in rule types such as original add (pwd, 123456)
On the basis of carry out edit-modify after save as the new rule type met needed for rule of combination setting again.For example, in add
On the basis of (pwd, 123456), then add a kind of operation situation:Enable a+1=b, b+1=c ... ..., z+1=a.It is then original close
When code is zls123, anv579 can be obtained by directly carrying out operation to original password zls123 using the new rule type, and
The rule type (including at least one irreversible transformation rule type) for meeting composition rule setting in conjunction with other is made by oneself
Justice sequence combination, can obtain corresponding rule settings.Simply example only has been lifted in the present embodiment, in practical applications could
Original password is encrypted using more complicated, more rule types, to further improve encrypted safety.
In addition, in practical applications, it is more time-consuming to create new rule type every time, therefore in addition to user
Outside in such a way that itself creates rule type, the rule type for meeting demand can also be directly chosen in rule type library,
And it will be in the locally downloading rule type library of the rule type.The rule type library preserves the rule of a large amount of a variety of different demands
Type, for users to use.It can not inversion it should be noted that there are at least one in the rule type set due to composition rule
Rule type is changed, therefore allows user that identical rule settings, the way is used not to cause the leakage of user's original password, energy
Enough improve the flexibility that rule settings use.
It should be noted that " the self-defined sequence combination of rule type " i.e. " rule execution logic " in step S211-S213,
It is to be appreciated that sequence combination self-defined to rule type is equivalent to the corresponding function of rule type in rule settings using journey
The logical order executed when sequence.
S22:Corresponding at least one rule file is created and preserved according at least one rule settings, and gives rule text
The corresponding rule mark of part configuration.
In the present embodiment, corresponding at least one rule file is created according at least one rule settings, by regular text
Part preserves in the database, and gives rule file configuration corresponding rule mark so that user can by application program according to
Rule identifies (mark for being used for unique identification rule file) rapidly calling rule file, and executes encryption according to rule file
Operation.
In a specific embodiment, in step S22, as shown in figure 5, creating and preserving according at least one rule settings
Corresponding at least one rule file, and corresponding rule mark is configured to rule file, include the following steps:
S221:At least one rule file is created according at least one rule settings.
In the present embodiment, according at least one rule settings, corresponding at least one rule file, rule text are created
Part preserves the function corresponding with rule type by the sequence combination of certain logic with clear-text way.
S222:The content of at least one rule file is encrypted, and encrypted at least one rule file is protected
It deposits in the database.
In the present embodiment, although rule type is disclosed to user, other users are not intended to be open
(in addition to what is shared in rule type library), therefore, the corresponding function of the content in rule file, i.e. rule type should be into
Row encryption, the mode that base64 codings may be used in specific encryption mode are realized.If storage rule file is interior
Hold, base64 coding encrypting processes are as follows:
Add (pwd, 123456)
Invert(pwd)
MD5(pwd)
Carry out base64 codings:
It obtains:
“YWRkIO+8iHB3ZO+8jDEyMzQ1Nu+
8iQpJbnZlcnTvvIhwd2TvvIkKTUQ177yIcHdk77yJ”。
Content is stored in rule file after coding, when subsequently using the rule file, as long as carrying out
Base64 decodings can obtain the plaintext for the corresponding function of rule type that the preceding rule file of encryption preserves.It, will in the present embodiment
The content of rule file is encrypted, and can improve the safety of rule file, is stored in rule type in rule file
Corresponding function.
S30:Logic is executed according to rule, original password is handled using at least one rule type, generates target
Password.
Target password refers to that user wants the password obtained.In the present embodiment, target password is the original that user uniquely possesses
Beginning password, according at least one rule type preserved in goal rule file, and according to the corresponding rule of goal rule file
It then executes after logic carries out calculation processing to original password and obtains.Further, which will show in limited time, i.e., one
Needing to regenerate after preset time period can just show, to ensure the safety of password.Need to only it be remembered by user original
The mode of password can mitigate the memory burden of user, improve the efficient management for password.Also, the target password generated
Being can not be by decoding to obtain the original password of user, the original password that should be uniquely possessed based on user, and according to mesh
Rule executes logic in mark rule file and the mode of at least one rule type generation target password ensure that original password
Safety, user do not have to worry that original password leaks out.
Particularly, which only preserves original password of the rule file without preserving user,
Even if rule file is revealed, rule settings are known by other users, and the original password of user can not be also obtained according to rule file,
Therefore it can ensure the safety of Password Management.
In the custom rule cipher management method that the present embodiment is provided, goal rule mark is literary from least one rule
Goal rule file corresponding with goal rule mark is obtained in part, wherein goal rule file includes that rule executes logic
With at least one rule type, there are irreversible transformation rule type, rule-based execution logics at least one rule type
With at least one rule type, it can ensure the diversity and high security of the password according to goal rule file generated, effectively
The problem of preventing password to be easy leakage.Irreversible transformation rule type is added at least one rule type, it is ensured that root
The password generated according to rule settings will be unable to, by reversely decoding to obtain original password, it is close that rule settings generation be greatly improved
The safety of code.In addition, also user is supported to carry out the self-defined establishment of rule type, effective management to password can be realized,
Improve encrypted safety.It is created according at least one rule settings and preserves corresponding at least one rule file, to extremely
The content of a few rule file is encrypted, and encrypted at least one rule file is preserved in the database, near
The content of a few rule file is encrypted, and can improve the safety of rule file, be stored in letter in rule file
The corresponding rule type of number.Logic is executed according to rule, original password is handled using at least one rule type, is generated
Target password only needs under the basis for obtaining goal rule file (including rule executes logic and at least one rule type)
Target password can be generated in real time according to goal rule file by obtaining unique original password, can uniquely be possessed according to user
Original password creates the password of required account, and by way of only preserving rule file without preserving original password, can
Safety when ensureing to be managed password, realizes effective Password Management.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
Embodiment 2
Fig. 6 is shown and the one-to-one custom rule Password Management of custom rule cipher management method in embodiment 1
The functional block diagram of device.As shown in fig. 6, the custom rule Password Management device includes id password acquisition module 10, target
Rule file acquisition module 20 and target password generation module 30.Wherein, id password acquisition module 10, goal rule file obtain
The realization function of modulus block 20 and target password generation module 30 is corresponding with custom rule cipher management method in embodiment 1
Step corresponds, and to avoid repeating, the present embodiment is not described in detail one by one.
Id password acquisition module 10 generates instruction for obtaining password, and generating instruction based on password obtains goal rule
Mark and original password.
Goal rule file acquisition module 20 is obtained for being identified based on goal rule from least one rule file
Goal rule file corresponding with goal rule mark, wherein goal rule file includes that rule executes logic and at least one
Kind of rule type, there are irreversible transformation rule types at least one rule type.
Target password generation module 30, for executing logic according to rule, using at least one rule type to original close
Code is handled, and target password is generated.
Preferably, id password acquisition module 10 includes interface generation unit 11 and id password acquiring unit 12.
Interface generation unit 11, for being generated according to password, instruction display mark obtains interface and original password obtains boundary
Face.
Id password acquiring unit 12 obtains goal rule mark for obtaining interface and original password interface by mark
And original password.
Preferably, which further includes that rule file creates preserving module 40, rule file
It includes that rule settings acquiring unit 41 and rule file create storage unit 42 to create preserving module 40.
Rule settings acquiring unit 41, for obtaining at least one rule settings, each rule settings include corresponding
Rule executes logic and at least one rule type, and there are irreversible transformation rule types at least one rule type.
Rule file create storage unit 42, for created and preserved according at least one rule settings it is corresponding at least
One rule file, and configure corresponding rule mark to rule file.
Preferably, rule settings acquiring unit 41 includes that rule type obtains subelement 411, the first rule settings obtain son
Unit 412 and Second Rule setting obtain subelement 413.
Rule type obtains subelement 411, for obtaining preset at least one rule type, exists not in rule type
Inverible transform rule type.
First rule settings obtain subelement 412, if there are rules of combination to set for preset at least one rule type
Fixed required rule type then carries out self-defined sequence to the rule type needed for rule of combination setting and combines, obtains at least one
Kind rule settings.
Second Rule setting obtains subelement 413, is set if lacking rule of combination for preset at least one rule type
Fixed rule type then creates the rule type needed for rule of combination setting, and carries out self-defined row to required rule type
Sequence combines, and obtains at least one rule settings.
Preferably, it includes that rule file creates subelement 421 and rule file encryption that rule file, which creates storage unit 42,
Saving subunit 422.
Rule file creates subelement 421, for creating at least one rule file according at least one rule settings.
Rule file encrypting storing subelement 422, is encrypted for the content at least one rule file, and will add
At least one rule file after close preserves in the database.
Embodiment 3
The present embodiment provides a computer readable storage medium, computer journey is stored on the computer readable storage medium
Sequence realizes custom rule cipher management method in embodiment 1 when the computer program is executed by processor, to avoid repeating,
Which is not described herein again.Alternatively, realizing that custom rule Password Management fills in embodiment 2 when the computer program is executed by processor
The function of each module/unit in setting, to avoid repeating, which is not described herein again.
Embodiment 4
Fig. 7 is the schematic diagram of terminal device in the present embodiment.As shown in fig. 7, terminal device 50 includes processor 51, storage
Device 52 and it is stored in the computer program 53 that can be run in memory 52 and on processor 51.Processor 51 executes computer
When program 53 realize embodiment 1 in custom rule cipher management method each step, such as step S10 shown in FIG. 1,
S20 and S30.Alternatively, processor 51 realizes that custom rule Password Management device is each in embodiment 2 when executing computer program 53
The function of module/unit, id password acquisition module 10, goal rule file acquisition module 20 and target password as shown in Figure 6
The function of generation module 30.
Illustratively, computer program 53 can be divided into one or more module/units, one or more mould
Block/unit is stored in memory 52, and is executed by processor 51, to complete the present invention.One or more module/units can
To be the series of computation machine program instruction section that can complete specific function, the instruction segment is for describing computer program 53 at end
Implementation procedure in end equipment 50.For example, computer program 53 can be divided into the id password acquisition module in embodiment 2
10, goal rule file acquisition module 20 and target password generation module 30, the concrete function of each module is as described in Example 2,
To avoid repeating, do not repeat one by one herein.
Terminal device 50 can be the computing devices such as desktop PC, notebook, palm PC and cloud server.Eventually
End equipment may include, but be not limited only to, processor 51, memory 52.It will be understood by those skilled in the art that Fig. 7 is only eventually
The example of end equipment 50 does not constitute the restriction to terminal device 50, may include components more more or fewer than diagram, or
Combine certain components or different components, for example, terminal device can also include input-output equipment, network access equipment,
Bus etc..
Alleged processor 51 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit
(Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng.
Memory 52 can be the internal storage unit of terminal device 50, such as the hard disk or memory of terminal device 50.It deposits
Reservoir 52 can also be the plug-in type hard disk being equipped on the External memory equipment of terminal device 50, such as terminal device 50, intelligence
Storage card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card)
Deng.Further, memory 52 can also both include terminal device 50 internal storage unit and also including External memory equipment.It deposits
Reservoir 52 is used to store other programs and the data needed for computer program and terminal device.Memory 52 can be also used for temporarily
When store the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work(
Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion
The all or part of function of description.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can be stored in a computer read/write memory medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of flow in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
May include:Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic of the computer program code can be carried
Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to legislation in jurisdiction and the requirement of patent practice
Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and
Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to aforementioned reality
Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each
Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed
Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of custom rule cipher management method, which is characterized in that including:
It obtains password and generates instruction, generating instruction based on the password obtains goal rule mark and original password;
It is identified based on the goal rule, mesh corresponding with goal rule mark is obtained from least one rule file
Mark rule file, wherein the goal rule file includes that rule executes logic and at least one rule type, at least one institute
State in rule type that there are irreversible transformation rule types;
Logic is executed according to the rule, the original password is handled using at least one rule type, is generated
Target password.
2. custom rule cipher management method according to claim 1, which is characterized in that be based on the target described
Rule mark, the step of acquisition with goal rule mark corresponding goal rule file from least one rule file
Before, the custom rule cipher management method further includes:It is pre-created and preserves at least one rule file;
It is described to be pre-created and include the step of preserving at least one rule file:
At least one rule settings are obtained, each rule settings include that corresponding rule execution logic is advised at least one
Then type, there are irreversible transformation rule types at least one rule type;
Corresponding at least one rule file is created and preserves according at least one rule settings, and to the rule text
The corresponding rule mark of part configuration.
3. custom rule cipher management method according to claim 2, which is characterized in that at least one rule of the acquisition
Then set, including:
Obtain preset at least one rule type, there are irreversible transformation rule types in the rule type;
If there is the rule type combined needed for the rule settings in preset at least one rule type, to combining institute
It states the rule type needed for rule settings and carries out self-defined sequence combination, obtain at least one rule settings;
If preset at least one rule type lacks the rule type combined described in the rule settings, combination is created
Rule type needed for the rule settings, and self-defined sequence is carried out to the required rule type and is combined, it obtains at least
A kind of rule settings.
4. custom rule cipher management method according to claim 2, which is characterized in that described according at least one institute
It states rule settings and creates and preserve corresponding at least one rule file, including:
At least one rule file is created according at least one rule settings;
The content of at least one rule file is encrypted, and encrypted at least one rule file is preserved
In the database.
5. custom rule cipher management method according to claim 1, which is characterized in that described to be given birth to based on the password
Goal rule mark and original password are obtained at instruction, including:
Instruction display mark acquisition interface is generated according to the password and original password obtains interface;
Interface and original password interface, which are obtained, by the mark obtains the goal rule mark and the original password.
6. a kind of custom rule Password Management device, which is characterized in that including:
Id password acquisition module generates instruction for obtaining password, and generating instruction based on the password obtains goal rule mark
Knowledge and original password;
Goal rule file acquisition module, for based on the goal rule identify, from least one rule file obtain with
The goal rule identifies corresponding goal rule file, wherein the goal rule file includes that rule executes logic sum
At least one rule type, there are irreversible transformation rule types at least one rule type;
Target password generation module, for executing logic according to the rule, using at least one rule type to described
Original password is handled, and target password is generated.
7. custom rule Password Management device according to claim 6, which is characterized in that the custom rule password
Managing device further includes that rule file creates preserving module, and the rule file creates preserving module and includes:
Rule settings acquiring unit, for obtaining at least one rule settings, each rule settings include corresponding rule
Then execute logic and at least one rule type, there are irreversible transformation rule types at least one rule type;
Rule file creates storage unit, for being created according at least one rule settings and preserving corresponding at least one
A rule file, and give rule file configuration corresponding rule mark.
8. custom rule Password Management device according to claim 7, which is characterized in that the rule settings obtain single
Member includes:
Preset rules type obtains subelement, for obtaining preset at least one rule type, exists in the rule type
Irreversible transformation rule type;
First rule settings obtain subelement, are set if existing for preset at least one rule type and combining the rule
Fixed required rule type then carries out self-defined sequence combination to combining the rule type needed for the rule settings, obtains extremely
A kind of few rule settings;
Second Rule setting obtains subelement, is set if lacking the combination rule for preset at least one rule type
The fixed rule type, then create the rule type combined needed for the rule settings, and to the required rule type
Self-defined sequence combination is carried out, at least one rule settings are obtained.
9. a kind of terminal device, including memory, processor and it is stored in the memory and can be on the processor
The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 5 when executing the computer program
The step of any one custom rule cipher management method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist
In realization custom rule Password Management as described in any one of claim 1 to 5 when the computer program is executed by processor
The step of method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810242166.2A CN108537038A (en) | 2018-03-22 | 2018-03-22 | Custom rule cipher management method, device, terminal device and storage medium |
PCT/CN2018/094189 WO2019178981A1 (en) | 2018-03-22 | 2018-07-03 | Password management method and device employing customized rules, terminal apparatus, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810242166.2A CN108537038A (en) | 2018-03-22 | 2018-03-22 | Custom rule cipher management method, device, terminal device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108537038A true CN108537038A (en) | 2018-09-14 |
Family
ID=63483709
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810242166.2A Pending CN108537038A (en) | 2018-03-22 | 2018-03-22 | Custom rule cipher management method, device, terminal device and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108537038A (en) |
WO (1) | WO2019178981A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111130774A (en) * | 2019-12-26 | 2020-05-08 | 北京阿尔山区块链联盟科技有限公司 | Password generation method, device and equipment |
CN111597547A (en) * | 2020-05-26 | 2020-08-28 | 中国联合网络通信集团有限公司 | Password management method and system |
CN112115656A (en) * | 2020-09-23 | 2020-12-22 | 恒为科技(上海)股份有限公司 | Method and device for quickly setting memory bank constraint |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102316120A (en) * | 2011-10-17 | 2012-01-11 | 北京信息科技大学 | Dynamic password lock based on network privacy protection |
KR101434447B1 (en) * | 2013-09-13 | 2014-08-27 | 제이슨 준 이 | Apparatus and method for authenticating users using dynamic combinational password |
CN106411516A (en) * | 2016-12-07 | 2017-02-15 | 北京海泰方圆科技股份有限公司 | Fixed password generation method and device and dynamic token |
CN106888086A (en) * | 2017-02-13 | 2017-06-23 | 上海瀚之友信息技术服务有限公司 | A kind of system and method for managing account number cipher |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105989309A (en) * | 2015-02-17 | 2016-10-05 | 汪风珍 | Password |
US20170083699A1 (en) * | 2015-09-23 | 2017-03-23 | Charter Communications Operating, Llc | Dynamic inline assistance messaging |
-
2018
- 2018-03-22 CN CN201810242166.2A patent/CN108537038A/en active Pending
- 2018-07-03 WO PCT/CN2018/094189 patent/WO2019178981A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102316120A (en) * | 2011-10-17 | 2012-01-11 | 北京信息科技大学 | Dynamic password lock based on network privacy protection |
KR101434447B1 (en) * | 2013-09-13 | 2014-08-27 | 제이슨 준 이 | Apparatus and method for authenticating users using dynamic combinational password |
CN106411516A (en) * | 2016-12-07 | 2017-02-15 | 北京海泰方圆科技股份有限公司 | Fixed password generation method and device and dynamic token |
CN106888086A (en) * | 2017-02-13 | 2017-06-23 | 上海瀚之友信息技术服务有限公司 | A kind of system and method for managing account number cipher |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111130774A (en) * | 2019-12-26 | 2020-05-08 | 北京阿尔山区块链联盟科技有限公司 | Password generation method, device and equipment |
CN111597547A (en) * | 2020-05-26 | 2020-08-28 | 中国联合网络通信集团有限公司 | Password management method and system |
CN111597547B (en) * | 2020-05-26 | 2023-04-28 | 中国联合网络通信集团有限公司 | Password management method and system |
CN112115656A (en) * | 2020-09-23 | 2020-12-22 | 恒为科技(上海)股份有限公司 | Method and device for quickly setting memory bank constraint |
Also Published As
Publication number | Publication date |
---|---|
WO2019178981A1 (en) | 2019-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11669637B2 (en) | Decentralized token table generation | |
CN110881063B (en) | Storage method, device, equipment and medium of private data | |
US10129028B2 (en) | Relational encryption for password verification | |
CN107819569B (en) | The encryption method and terminal device of log-on message | |
CN108377189A (en) | User's communication encrypting method, device, terminal device and storage medium on block chain | |
CN107707347B (en) | User key backup method and device and user key importing method and device | |
CN108256340B (en) | Data acquisition method and device, terminal equipment and storage medium | |
CN107612683B (en) | Encryption and decryption method, device, system, equipment and storage medium | |
CN106228076B (en) | A kind of picture validation code guard method and system based on SGX | |
CN108462686A (en) | Acquisition methods, device, terminal device and the storage medium of dynamic key | |
CN109462602A (en) | Log-on message storage method, login validation method, device, equipment and medium | |
CN108696518A (en) | User's communication encrypting method, device, terminal device and storage medium on block chain | |
CN108537038A (en) | Custom rule cipher management method, device, terminal device and storage medium | |
CN104917748B (en) | A kind of method and apparatus for being converted and being handled to encrypted message | |
CN109660534A (en) | Safety certifying method, device, electronic equipment and storage medium based on more trade companies | |
CN107563211A (en) | Safe encryption method and system | |
CN113315745A (en) | Data processing method, device, equipment and medium | |
Shivaramakrishna et al. | A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control | |
US10462113B1 (en) | Systems and methods for securing push authentications | |
CN113904832A (en) | Data encryption method, device, equipment and storage medium | |
WO2019114084A1 (en) | Encrypting/decrypting method for multi-digit number and encrypting/decrypting server | |
US20230259926A1 (en) | Address generation method, blockchain information processing method, and related device | |
CN111127020A (en) | Transaction data confusion method based on block chain and related equipment | |
CN104363099A (en) | Mobile phone security co-processing chip | |
CN111092721B (en) | Method and device for setting access password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180914 |