CN108537038A - Custom rule cipher management method, device, terminal device and storage medium - Google Patents

Custom rule cipher management method, device, terminal device and storage medium Download PDF

Info

Publication number
CN108537038A
CN108537038A CN201810242166.2A CN201810242166A CN108537038A CN 108537038 A CN108537038 A CN 108537038A CN 201810242166 A CN201810242166 A CN 201810242166A CN 108537038 A CN108537038 A CN 108537038A
Authority
CN
China
Prior art keywords
rule
password
type
file
settings
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810242166.2A
Other languages
Chinese (zh)
Inventor
周泓宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810242166.2A priority Critical patent/CN108537038A/en
Priority to PCT/CN2018/094189 priority patent/WO2019178981A1/en
Publication of CN108537038A publication Critical patent/CN108537038A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of custom rule cipher management method, device, terminal device and storage mediums.The custom rule cipher management method, including:It obtains password and generates instruction, generating instruction based on the password obtains goal rule mark and original password;It is identified based on the goal rule, goal rule file corresponding with goal rule mark is obtained from least one rule file, wherein, the goal rule file includes that rule executes logic and at least one rule type, and there are irreversible transformation rule types at least one rule type;Logic is executed according to the rule, the original password is handled using at least one rule type, generates target password.When managing user password using the custom rule cipher management method, the management to multiple account number ciphers can be realized according to the unique original password of user, and ensure the safety of Password Management.

Description

Custom rule cipher management method, device, terminal device and storage medium
Technical field
The present invention relates to computer realm more particularly to a kind of custom rule cipher management method, device, terminal devices And storage medium.
Background technology
The current various means of payment, such as the payment of Alipay, wechat and bank card, are generally used the verification of 6 bit digitals Mode is as payment cipher.But when user all using a set of identical password when, risk is too big, easily causes password Leakage;If user uses different passwords, and usually forget Password, user password cannot effectively be managed.
Invention content
A kind of custom rule cipher management method of offer of the embodiment of the present invention, device, terminal device and storage medium, with Solve the problems, such as that active user's password is easy leakage and is decrypted.
In a first aspect, the embodiment of the present invention provides a kind of custom rule cipher management method, including:
It obtains password and generates instruction, generating instruction based on the password obtains goal rule mark and original password;
It is identified, is obtained from least one rule file corresponding with goal rule mark based on the goal rule Goal rule file, wherein the goal rule file includes that rule executes logic and at least one rule type, at least one There are irreversible transformation rule types in the kind rule type;
Logic is executed according to the rule, the original password is handled using at least one rule type, Generate target password.
Second aspect, the embodiment of the present invention provide a kind of custom rule Password Management device, including:
Id password acquisition module generates instruction for obtaining password, and generating instruction based on the password obtains target rule Then mark and original password;
Goal rule file acquisition module is obtained for being identified based on the goal rule from least one rule file Take goal rule file corresponding with goal rule mark, wherein the goal rule file includes that rule execution is patrolled Volume and at least one rule type, there are irreversible transformation rule types at least one rule type;
Target password generation module, for executing logic according to the rule, using at least one rule type pair The original password is handled, and target password is generated.
The third aspect, the embodiment of the present invention provide a kind of terminal device, including memory, processor and are stored in described In memory and the computer program that can run on the processor, the processor are realized when executing the computer program The step of custom rule cipher management method.
Fourth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium Matter is stored with computer program, and the computer program realizes the custom rule cipher management method when being executed by processor The step of.
In custom rule cipher management method, device, terminal device and storage medium that the embodiment of the present invention is provided, Goal rule file corresponding with goal rule mark is obtained from least one rule file based on goal rule mark, In, goal rule file includes that rule executes logic and at least one rule type, and existing at least one rule type can not Inverse transformation rule type, rule-based execution logic and at least one rule type, can ensure to be given birth to according to goal rule file At password diversity and high security, effectively prevent password be easy leakage the problem of.Add at least one rule type Enter irreversible transformation rule type, it is ensured that the password generated according to rule settings will be unable to by reversely decoding to obtain The safety that rule settings generate password is greatly improved in original password.Logic is executed according to rule, using at least one Regularia Type handles original password, generates target password, can ensure the safety of original password, realize effective password pipe Reason.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is a flow chart of custom rule cipher management method in the embodiment of the present invention 1.
Fig. 2 is a particular flow sheet of step S10 in Fig. 1.
Fig. 3 is the particular flow sheet before step S20 in Fig. 1.
Fig. 4 is a particular flow sheet of step S21 in Fig. 3.
Fig. 5 is a particular flow sheet of step S22 in Fig. 3.
Fig. 6 is a functional block diagram of custom rule Password Management device in the embodiment of the present invention 2.
Fig. 7 is a schematic diagram of terminal device in the embodiment of the present invention 4.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Embodiment 1
Fig. 1 shows a flow chart of custom rule cipher management method in the present embodiment.The custom rule password pipe Reason method can be applicable in application program, can be according to rule file user unique original password and preserved in the database Password corresponding with rule file is calculated in real time, effectively realizes the Password Management of user, the custom rule Password Management Method specifically can be applicable in the application program of installation on the terminal device.Wherein, the terminal device be can be with user into pedestrian The equipment of machine interaction, the including but not limited to equipment such as computer, smart mobile phone and tablet.As shown in Figure 1, the custom rule password Management method includes the following steps:
S10:It obtains password and generates instruction, generating instruction based on password obtains goal rule mark and original password.
Wherein, it refers to the instruction for obtaining goal rule mark and original password that password, which generates instruction,.Goal rule mark Knowledge refers to the mark for unique identification goal rule file.Goal rule file refers to that user wants the rule file obtained, Rule file refers to preserving the memory carrier of rule settings, is preserved in the form of the file (.txt) of text formatting, The file of text format stores corresponding with rule type by (i.e. rule executes logic) of certain logic sequence combination Function, for application program by calling rule file, the function in executing rule file realizes the encryption to original password.It is original Password refer to refer to password that user uniquely uses, in the custom rule cipher management method, user only needs uniquely to remember Firmly original password is sufficient.
In the present embodiment, in the application program (hereinafter referred to as application program) for realizing custom rule Password Management, answer Password input by user is obtained with program and generates instruction, can be based on password generation instruction and quickly and conveniently be got target Rule mark and original password.
In a specific embodiment, it in step S10, as shown in Fig. 2, obtaining password generates instruction, is generated based on password Instruction obtains goal rule mark and original password, includes the following steps:
S11:Instruction display mark acquisition interface is generated according to password and original password obtains interface.
Wherein, it refers to the interface for obtaining goal rule mark shown in application terminal that mark, which obtains interface, It refers to the interface for obtaining original password shown on application terminal display that original password, which obtains interface, and mark obtains It includes but not limited to get corresponding target by modes such as key-press input, voice inputs that interface and original password, which obtain interface, Rule mark and original password.
In the present embodiment, application program obtains after password input by user generates instruction and shows mark on terminal display It obtains interface and original password obtains interface, to provide the interface platform for obtaining user's input information, smoothly obtain user's input Goal rule mark and original password.
S12:Interface and original password interface, which are obtained, by mark obtains goal rule mark and original password.
In the present embodiment, the mode that application program can provide the typings information such as key-press input, voice input passes through mark It obtains interface and original password interface and obtains goal rule mark input by user and original password.
S20:It is identified based on goal rule, mesh corresponding with goal rule mark is obtained from least one rule file Mark rule file, wherein goal rule file includes that rule executes logic and at least one rule type, at least one Regularia There are irreversible transformation rule types in type.
Wherein, it refers to the sequence that the corresponding function of rule type executes in rule settings that rule, which executes logic,.Regularia Type refers to the type for the operation rule that password is encrypted.From the concept of rule type can naturally, simply understand rule The concept of setting:Rule settings refer to by least one rule type with self-defined sortord (namely rule executes logic) group The set of rule type made of conjunction, from from the point of view of development platform creates rule settings, being exactly by least one rule in fact The operation program that then the corresponding function of type is composed by self-defined sortord.Irreversible transformation rule type refers to passing through The encrypted value of the rule type is the rule type for being unable to reverse-direction derivation, decoding out value before encrypting.
It in the present embodiment, is identified based on goal rule, such as is identified rule file ID as goal rule, user wants When logging in safety vehicle insurance, multiple accounts of safety life insurance peace eutocia danger by login password, need to pass through rule in application program Then file ID (such as safety vehicle insurance, safety life insurance peace eutocia danger) inquiry obtains goal rule file (such as safety vehicle preserved Dangerous .rule, safety life insurance .rule peace eutocias danger .rule), with according to the goal rule file acquisition rule file ID of acquisition For safety vehicle insurance, the corresponding login password of account of safety life insurance peace eutocia danger.
In a specific embodiment, in step S20, as shown in figure 3, identified based on goal rule, from least one In rule file obtain with the step of goal rule mark corresponding goal rule file before, the custom rule password pipe Reason method further includes:It is pre-created and preserves at least one rule file.
This is pre-created and includes the step of preserving at least one rule file:
S21:At least one rule settings are obtained, each rule settings include that corresponding rule executes logic and at least one Kind of rule type, there are irreversible transformation rule types at least one rule type.
During creating rule settings, a kind of rule type can be realized and indicated with corresponding function, example Such as:With the one such rule type of add (pwd, num) function representation, what which indicated is a kind of add operation rule Then, wherein pwd indicates current password, and num indicates increased numerical value in the add operation, when num takes 123456, i.e. function When being expressed as add (pwd, 123456), the concrete operation process of the addition rule is pwd+123456 (i.e. in current password On the basis of plus 123456).
It is to be appreciated that when there are three types of when rule type A (), B () and C (), these three rule types are held according to rule Row logic (self-defined sequence), which is combined, can obtain 6 kinds of different rule settings.When the operation of rule type is increasingly complex, When the quantity of rule type is more, the type of rule settings is more various, then calculating the password obtained according to rule settings also gets over Various, encrypted safety is higher.
Irreversible transformation rule type refer to by the encrypted value of the rule type be unable to reverse-direction derivation, decode out plus The rule type of value before close, such as:Using the interception method based on md5 encryption, md5 encryption is carried out to original password first, it is false If original password is 123456, then 32 16 system numbers are represented by using the encrypted value of interception method based on md5 encryption " E10ADC3949BA59ABBE56E057F20F883E ", interception top ten " E10ADC3949 ", is converted into 10 system numbers " 966549846345 ", then after intercepting six obtain " 846345 ", be inversely to be reduced to by the value 846345 after intercepting 123456.It is also possible using other irreversible transformation rule types except the interception method based on md5 encryption, such as use The irreversible transformations rule types such as SHA-1 (one kind in secure hash algorithm) encrypted interception method.
In the present embodiment, at least one rule settings are obtained, which includes that corresponding rule executes logic sum There is at least one irreversible transformation Regularia at least one rule type of each rule settings at least one rule type Type illustrates that at least one rule type of the rule settings can be entirely irreversible transformation rule type, can also wrap simultaneously Include at least one irreversible transformation rule type and other rule types.By it is corresponding rule execute logic (namely to rule Then type self-defined sequence combination) and at least one rule type acquisition rule settings can ensure to be given birth to according to rule settings At password have the characteristics that diversity and high security, password can be effectively prevent to reveal the problem of.In at least one rule There are irreversible transformation rule types in type, it is ensured that according to rule settings generate password can not by reverse-direction derivation, The mode of decoding obtains original password, and the safety of original password is greatly improved.
In a specific embodiment, in step S21, as shown in figure 4, obtaining at least one rule settings, each rule Setting includes that corresponding rule executes logic and at least one rule type, and existing at least one rule type can not inversion Rule type is changed, is included the following steps:
S211:Obtain preset at least one rule type, there are irreversible transformation rule types in rule type.
In the application program for realizing custom rule Password Management, some bases, common Regularia can be pre-set Type, such as in general, conversion only is encrypted to the original password indicated with 6 bit digitals, and encrypt preceding and add Password after close is indicated in the form of 6 bit digitals, then rule type can be pre-set accordingly according to the characteristics of 6 bit digital Operation.Irreversible transformation rule type is any indispensable a kind of rule type of rule settings institute of composition, therefore pre- If when rule type, similarly needing default irreversible transformation rule type.
In the present embodiment, at least one of acquisition pre-sets and is stored in database rule type, and this is at least There should be irreversible transformation rule type in a kind of rule type, the default rule can be judged according to default rule type Whether type meets the needs of rule of combination setting.
S212:If there are the rule types needed for rule of combination setting for preset at least one rule type, to combination Rule type needed for rule settings carries out self-defined sequence combination, obtains at least one rule settings.
In the present embodiment, after obtaining pre-set at least one rule type, according to the actual demand of rule settings, Judge preset at least one rule type with the presence or absence of the rule type needed for rule of combination setting.If preset at least one There are the rule types needed for rule of combination setting for rule type, then are made by oneself to the rule type needed for rule of combination setting Justice sequence combination, obtains at least one rule settings.Such as:Regular type add (pwd, num), invert (pwd) and MD5 (6) (wherein, invert () refers to inverting op to (pwd) three kinds of rule types, and concrete operation rule is the inverting op herein: If any numerical value 111111, then inverting op is 1000000-111111;MD5 (6) indicates the interception method based on md5 encryption, finally The value of interception is latter 6) when, customized sequence can be carried out according to three kinds of rule types and is combined, by (regulation 0!For 6 kinds of different rule settings 1) can be obtained.Specifically, as using invert (pwd), add (pwd, num) and The combination operation of MD5 (pwd), works as pwd=888888, and when num=12344, obtained result is " 846345 ", specific to transport Calculation process is as follows:
1)invert->1000000-888888=111112
2)add 12344->111112+12344=123456
3)MD5(6)123456->846345
It is self-defined by being carried out to the rule type needed for rule of combination setting from preset at least one rule type Sequence combination, can obtain multiple rule setting, and user can carry out custom rule password pipe according to different rule types Reason, can realize effective management to password, improve encrypted safety.
It should be noted that rule type is to disclosed in user, user be able to know that rule type be specifically how into Row cryptographic calculation, user's worry opaque to rule type can be reduced, and user can also be according to disclosed rule Type carries out operation and inspection, without that by means of application program itself, can further increase the safety of Password Management completely Property and reliability.
S213:If preset at least one rule type lacks the rule type of rule of combination setting, combination rule are created Required rule type is then set, and self-defined sequence is carried out to required rule type and is combined, at least one rule is obtained and sets It is fixed.
In the present embodiment, after obtaining pre-set at least one rule type, according to the actual demand of rule settings, Judge preset at least one rule type with the presence or absence of the rule type needed for rule of combination setting.If preset at least one Rule type lacks the rule type of rule of combination setting, for example, rule settings are required to the original password to there is letter It is handled, it is assumed that original password zls123, then when default rule type such as add (pwd, 123456) is to original password When operation is encrypted in zls123, zls123+123456 will be unable to handle the letter in password.Therefore, it is necessary to create It can solve the problems, such as the rule type needed for alphabetical rule of combination setting.It is zls123 for original password, it is desirable that can be right What letter was handled, new rule type can be directly created, or in rule types such as original add (pwd, 123456) On the basis of carry out edit-modify after save as the new rule type met needed for rule of combination setting again.For example, in add On the basis of (pwd, 123456), then add a kind of operation situation:Enable a+1=b, b+1=c ... ..., z+1=a.It is then original close When code is zls123, anv579 can be obtained by directly carrying out operation to original password zls123 using the new rule type, and The rule type (including at least one irreversible transformation rule type) for meeting composition rule setting in conjunction with other is made by oneself Justice sequence combination, can obtain corresponding rule settings.Simply example only has been lifted in the present embodiment, in practical applications could Original password is encrypted using more complicated, more rule types, to further improve encrypted safety.
In addition, in practical applications, it is more time-consuming to create new rule type every time, therefore in addition to user Outside in such a way that itself creates rule type, the rule type for meeting demand can also be directly chosen in rule type library, And it will be in the locally downloading rule type library of the rule type.The rule type library preserves the rule of a large amount of a variety of different demands Type, for users to use.It can not inversion it should be noted that there are at least one in the rule type set due to composition rule Rule type is changed, therefore allows user that identical rule settings, the way is used not to cause the leakage of user's original password, energy Enough improve the flexibility that rule settings use.
It should be noted that " the self-defined sequence combination of rule type " i.e. " rule execution logic " in step S211-S213, It is to be appreciated that sequence combination self-defined to rule type is equivalent to the corresponding function of rule type in rule settings using journey The logical order executed when sequence.
S22:Corresponding at least one rule file is created and preserved according at least one rule settings, and gives rule text The corresponding rule mark of part configuration.
In the present embodiment, corresponding at least one rule file is created according at least one rule settings, by regular text Part preserves in the database, and gives rule file configuration corresponding rule mark so that user can by application program according to Rule identifies (mark for being used for unique identification rule file) rapidly calling rule file, and executes encryption according to rule file Operation.
In a specific embodiment, in step S22, as shown in figure 5, creating and preserving according at least one rule settings Corresponding at least one rule file, and corresponding rule mark is configured to rule file, include the following steps:
S221:At least one rule file is created according at least one rule settings.
In the present embodiment, according at least one rule settings, corresponding at least one rule file, rule text are created Part preserves the function corresponding with rule type by the sequence combination of certain logic with clear-text way.
S222:The content of at least one rule file is encrypted, and encrypted at least one rule file is protected It deposits in the database.
In the present embodiment, although rule type is disclosed to user, other users are not intended to be open (in addition to what is shared in rule type library), therefore, the corresponding function of the content in rule file, i.e. rule type should be into Row encryption, the mode that base64 codings may be used in specific encryption mode are realized.If storage rule file is interior Hold, base64 coding encrypting processes are as follows:
Add (pwd, 123456)
Invert(pwd)
MD5(pwd)
Carry out base64 codings:
It obtains:
“YWRkIO+8iHB3ZO+8jDEyMzQ1Nu+ 8iQpJbnZlcnTvvIhwd2TvvIkKTUQ177yIcHdk77yJ”。
Content is stored in rule file after coding, when subsequently using the rule file, as long as carrying out Base64 decodings can obtain the plaintext for the corresponding function of rule type that the preceding rule file of encryption preserves.It, will in the present embodiment The content of rule file is encrypted, and can improve the safety of rule file, is stored in rule type in rule file Corresponding function.
S30:Logic is executed according to rule, original password is handled using at least one rule type, generates target Password.
Target password refers to that user wants the password obtained.In the present embodiment, target password is the original that user uniquely possesses Beginning password, according at least one rule type preserved in goal rule file, and according to the corresponding rule of goal rule file It then executes after logic carries out calculation processing to original password and obtains.Further, which will show in limited time, i.e., one Needing to regenerate after preset time period can just show, to ensure the safety of password.Need to only it be remembered by user original The mode of password can mitigate the memory burden of user, improve the efficient management for password.Also, the target password generated Being can not be by decoding to obtain the original password of user, the original password that should be uniquely possessed based on user, and according to mesh Rule executes logic in mark rule file and the mode of at least one rule type generation target password ensure that original password Safety, user do not have to worry that original password leaks out.
Particularly, which only preserves original password of the rule file without preserving user, Even if rule file is revealed, rule settings are known by other users, and the original password of user can not be also obtained according to rule file, Therefore it can ensure the safety of Password Management.
In the custom rule cipher management method that the present embodiment is provided, goal rule mark is literary from least one rule Goal rule file corresponding with goal rule mark is obtained in part, wherein goal rule file includes that rule executes logic With at least one rule type, there are irreversible transformation rule type, rule-based execution logics at least one rule type With at least one rule type, it can ensure the diversity and high security of the password according to goal rule file generated, effectively The problem of preventing password to be easy leakage.Irreversible transformation rule type is added at least one rule type, it is ensured that root The password generated according to rule settings will be unable to, by reversely decoding to obtain original password, it is close that rule settings generation be greatly improved The safety of code.In addition, also user is supported to carry out the self-defined establishment of rule type, effective management to password can be realized, Improve encrypted safety.It is created according at least one rule settings and preserves corresponding at least one rule file, to extremely The content of a few rule file is encrypted, and encrypted at least one rule file is preserved in the database, near The content of a few rule file is encrypted, and can improve the safety of rule file, be stored in letter in rule file The corresponding rule type of number.Logic is executed according to rule, original password is handled using at least one rule type, is generated Target password only needs under the basis for obtaining goal rule file (including rule executes logic and at least one rule type) Target password can be generated in real time according to goal rule file by obtaining unique original password, can uniquely be possessed according to user Original password creates the password of required account, and by way of only preserving rule file without preserving original password, can Safety when ensureing to be managed password, realizes effective Password Management.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Embodiment 2
Fig. 6 is shown and the one-to-one custom rule Password Management of custom rule cipher management method in embodiment 1 The functional block diagram of device.As shown in fig. 6, the custom rule Password Management device includes id password acquisition module 10, target Rule file acquisition module 20 and target password generation module 30.Wherein, id password acquisition module 10, goal rule file obtain The realization function of modulus block 20 and target password generation module 30 is corresponding with custom rule cipher management method in embodiment 1 Step corresponds, and to avoid repeating, the present embodiment is not described in detail one by one.
Id password acquisition module 10 generates instruction for obtaining password, and generating instruction based on password obtains goal rule Mark and original password.
Goal rule file acquisition module 20 is obtained for being identified based on goal rule from least one rule file Goal rule file corresponding with goal rule mark, wherein goal rule file includes that rule executes logic and at least one Kind of rule type, there are irreversible transformation rule types at least one rule type.
Target password generation module 30, for executing logic according to rule, using at least one rule type to original close Code is handled, and target password is generated.
Preferably, id password acquisition module 10 includes interface generation unit 11 and id password acquiring unit 12.
Interface generation unit 11, for being generated according to password, instruction display mark obtains interface and original password obtains boundary Face.
Id password acquiring unit 12 obtains goal rule mark for obtaining interface and original password interface by mark And original password.
Preferably, which further includes that rule file creates preserving module 40, rule file It includes that rule settings acquiring unit 41 and rule file create storage unit 42 to create preserving module 40.
Rule settings acquiring unit 41, for obtaining at least one rule settings, each rule settings include corresponding Rule executes logic and at least one rule type, and there are irreversible transformation rule types at least one rule type.
Rule file create storage unit 42, for created and preserved according at least one rule settings it is corresponding at least One rule file, and configure corresponding rule mark to rule file.
Preferably, rule settings acquiring unit 41 includes that rule type obtains subelement 411, the first rule settings obtain son Unit 412 and Second Rule setting obtain subelement 413.
Rule type obtains subelement 411, for obtaining preset at least one rule type, exists not in rule type Inverible transform rule type.
First rule settings obtain subelement 412, if there are rules of combination to set for preset at least one rule type Fixed required rule type then carries out self-defined sequence to the rule type needed for rule of combination setting and combines, obtains at least one Kind rule settings.
Second Rule setting obtains subelement 413, is set if lacking rule of combination for preset at least one rule type Fixed rule type then creates the rule type needed for rule of combination setting, and carries out self-defined row to required rule type Sequence combines, and obtains at least one rule settings.
Preferably, it includes that rule file creates subelement 421 and rule file encryption that rule file, which creates storage unit 42, Saving subunit 422.
Rule file creates subelement 421, for creating at least one rule file according at least one rule settings.
Rule file encrypting storing subelement 422, is encrypted for the content at least one rule file, and will add At least one rule file after close preserves in the database.
Embodiment 3
The present embodiment provides a computer readable storage medium, computer journey is stored on the computer readable storage medium Sequence realizes custom rule cipher management method in embodiment 1 when the computer program is executed by processor, to avoid repeating, Which is not described herein again.Alternatively, realizing that custom rule Password Management fills in embodiment 2 when the computer program is executed by processor The function of each module/unit in setting, to avoid repeating, which is not described herein again.
Embodiment 4
Fig. 7 is the schematic diagram of terminal device in the present embodiment.As shown in fig. 7, terminal device 50 includes processor 51, storage Device 52 and it is stored in the computer program 53 that can be run in memory 52 and on processor 51.Processor 51 executes computer When program 53 realize embodiment 1 in custom rule cipher management method each step, such as step S10 shown in FIG. 1, S20 and S30.Alternatively, processor 51 realizes that custom rule Password Management device is each in embodiment 2 when executing computer program 53 The function of module/unit, id password acquisition module 10, goal rule file acquisition module 20 and target password as shown in Figure 6 The function of generation module 30.
Illustratively, computer program 53 can be divided into one or more module/units, one or more mould Block/unit is stored in memory 52, and is executed by processor 51, to complete the present invention.One or more module/units can To be the series of computation machine program instruction section that can complete specific function, the instruction segment is for describing computer program 53 at end Implementation procedure in end equipment 50.For example, computer program 53 can be divided into the id password acquisition module in embodiment 2 10, goal rule file acquisition module 20 and target password generation module 30, the concrete function of each module is as described in Example 2, To avoid repeating, do not repeat one by one herein.
Terminal device 50 can be the computing devices such as desktop PC, notebook, palm PC and cloud server.Eventually End equipment may include, but be not limited only to, processor 51, memory 52.It will be understood by those skilled in the art that Fig. 7 is only eventually The example of end equipment 50 does not constitute the restriction to terminal device 50, may include components more more or fewer than diagram, or Combine certain components or different components, for example, terminal device can also include input-output equipment, network access equipment, Bus etc..
Alleged processor 51 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng.
Memory 52 can be the internal storage unit of terminal device 50, such as the hard disk or memory of terminal device 50.It deposits Reservoir 52 can also be the plug-in type hard disk being equipped on the External memory equipment of terminal device 50, such as terminal device 50, intelligence Storage card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) Deng.Further, memory 52 can also both include terminal device 50 internal storage unit and also including External memory equipment.It deposits Reservoir 52 is used to store other programs and the data needed for computer program and terminal device.Memory 52 can be also used for temporarily When store the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work( Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion The all or part of function of description.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can be stored in a computer read/write memory medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of flow in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium May include:Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic of the computer program code can be carried Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to legislation in jurisdiction and the requirement of patent practice Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to aforementioned reality Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of custom rule cipher management method, which is characterized in that including:
It obtains password and generates instruction, generating instruction based on the password obtains goal rule mark and original password;
It is identified based on the goal rule, mesh corresponding with goal rule mark is obtained from least one rule file Mark rule file, wherein the goal rule file includes that rule executes logic and at least one rule type, at least one institute State in rule type that there are irreversible transformation rule types;
Logic is executed according to the rule, the original password is handled using at least one rule type, is generated Target password.
2. custom rule cipher management method according to claim 1, which is characterized in that be based on the target described Rule mark, the step of acquisition with goal rule mark corresponding goal rule file from least one rule file Before, the custom rule cipher management method further includes:It is pre-created and preserves at least one rule file;
It is described to be pre-created and include the step of preserving at least one rule file:
At least one rule settings are obtained, each rule settings include that corresponding rule execution logic is advised at least one Then type, there are irreversible transformation rule types at least one rule type;
Corresponding at least one rule file is created and preserves according at least one rule settings, and to the rule text The corresponding rule mark of part configuration.
3. custom rule cipher management method according to claim 2, which is characterized in that at least one rule of the acquisition Then set, including:
Obtain preset at least one rule type, there are irreversible transformation rule types in the rule type;
If there is the rule type combined needed for the rule settings in preset at least one rule type, to combining institute It states the rule type needed for rule settings and carries out self-defined sequence combination, obtain at least one rule settings;
If preset at least one rule type lacks the rule type combined described in the rule settings, combination is created Rule type needed for the rule settings, and self-defined sequence is carried out to the required rule type and is combined, it obtains at least A kind of rule settings.
4. custom rule cipher management method according to claim 2, which is characterized in that described according at least one institute It states rule settings and creates and preserve corresponding at least one rule file, including:
At least one rule file is created according at least one rule settings;
The content of at least one rule file is encrypted, and encrypted at least one rule file is preserved In the database.
5. custom rule cipher management method according to claim 1, which is characterized in that described to be given birth to based on the password Goal rule mark and original password are obtained at instruction, including:
Instruction display mark acquisition interface is generated according to the password and original password obtains interface;
Interface and original password interface, which are obtained, by the mark obtains the goal rule mark and the original password.
6. a kind of custom rule Password Management device, which is characterized in that including:
Id password acquisition module generates instruction for obtaining password, and generating instruction based on the password obtains goal rule mark Knowledge and original password;
Goal rule file acquisition module, for based on the goal rule identify, from least one rule file obtain with The goal rule identifies corresponding goal rule file, wherein the goal rule file includes that rule executes logic sum At least one rule type, there are irreversible transformation rule types at least one rule type;
Target password generation module, for executing logic according to the rule, using at least one rule type to described Original password is handled, and target password is generated.
7. custom rule Password Management device according to claim 6, which is characterized in that the custom rule password Managing device further includes that rule file creates preserving module, and the rule file creates preserving module and includes:
Rule settings acquiring unit, for obtaining at least one rule settings, each rule settings include corresponding rule Then execute logic and at least one rule type, there are irreversible transformation rule types at least one rule type;
Rule file creates storage unit, for being created according at least one rule settings and preserving corresponding at least one A rule file, and give rule file configuration corresponding rule mark.
8. custom rule Password Management device according to claim 7, which is characterized in that the rule settings obtain single Member includes:
Preset rules type obtains subelement, for obtaining preset at least one rule type, exists in the rule type Irreversible transformation rule type;
First rule settings obtain subelement, are set if existing for preset at least one rule type and combining the rule Fixed required rule type then carries out self-defined sequence combination to combining the rule type needed for the rule settings, obtains extremely A kind of few rule settings;
Second Rule setting obtains subelement, is set if lacking the combination rule for preset at least one rule type The fixed rule type, then create the rule type combined needed for the rule settings, and to the required rule type Self-defined sequence combination is carried out, at least one rule settings are obtained.
9. a kind of terminal device, including memory, processor and it is stored in the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 5 when executing the computer program The step of any one custom rule cipher management method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist In realization custom rule Password Management as described in any one of claim 1 to 5 when the computer program is executed by processor The step of method.
CN201810242166.2A 2018-03-22 2018-03-22 Custom rule cipher management method, device, terminal device and storage medium Pending CN108537038A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810242166.2A CN108537038A (en) 2018-03-22 2018-03-22 Custom rule cipher management method, device, terminal device and storage medium
PCT/CN2018/094189 WO2019178981A1 (en) 2018-03-22 2018-07-03 Password management method and device employing customized rules, terminal apparatus, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810242166.2A CN108537038A (en) 2018-03-22 2018-03-22 Custom rule cipher management method, device, terminal device and storage medium

Publications (1)

Publication Number Publication Date
CN108537038A true CN108537038A (en) 2018-09-14

Family

ID=63483709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810242166.2A Pending CN108537038A (en) 2018-03-22 2018-03-22 Custom rule cipher management method, device, terminal device and storage medium

Country Status (2)

Country Link
CN (1) CN108537038A (en)
WO (1) WO2019178981A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111130774A (en) * 2019-12-26 2020-05-08 北京阿尔山区块链联盟科技有限公司 Password generation method, device and equipment
CN111597547A (en) * 2020-05-26 2020-08-28 中国联合网络通信集团有限公司 Password management method and system
CN112115656A (en) * 2020-09-23 2020-12-22 恒为科技(上海)股份有限公司 Method and device for quickly setting memory bank constraint

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316120A (en) * 2011-10-17 2012-01-11 北京信息科技大学 Dynamic password lock based on network privacy protection
KR101434447B1 (en) * 2013-09-13 2014-08-27 제이슨 준 이 Apparatus and method for authenticating users using dynamic combinational password
CN106411516A (en) * 2016-12-07 2017-02-15 北京海泰方圆科技股份有限公司 Fixed password generation method and device and dynamic token
CN106888086A (en) * 2017-02-13 2017-06-23 上海瀚之友信息技术服务有限公司 A kind of system and method for managing account number cipher

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989309A (en) * 2015-02-17 2016-10-05 汪风珍 Password
US20170083699A1 (en) * 2015-09-23 2017-03-23 Charter Communications Operating, Llc Dynamic inline assistance messaging

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316120A (en) * 2011-10-17 2012-01-11 北京信息科技大学 Dynamic password lock based on network privacy protection
KR101434447B1 (en) * 2013-09-13 2014-08-27 제이슨 준 이 Apparatus and method for authenticating users using dynamic combinational password
CN106411516A (en) * 2016-12-07 2017-02-15 北京海泰方圆科技股份有限公司 Fixed password generation method and device and dynamic token
CN106888086A (en) * 2017-02-13 2017-06-23 上海瀚之友信息技术服务有限公司 A kind of system and method for managing account number cipher

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111130774A (en) * 2019-12-26 2020-05-08 北京阿尔山区块链联盟科技有限公司 Password generation method, device and equipment
CN111597547A (en) * 2020-05-26 2020-08-28 中国联合网络通信集团有限公司 Password management method and system
CN111597547B (en) * 2020-05-26 2023-04-28 中国联合网络通信集团有限公司 Password management method and system
CN112115656A (en) * 2020-09-23 2020-12-22 恒为科技(上海)股份有限公司 Method and device for quickly setting memory bank constraint

Also Published As

Publication number Publication date
WO2019178981A1 (en) 2019-09-26

Similar Documents

Publication Publication Date Title
US11669637B2 (en) Decentralized token table generation
CN110881063B (en) Storage method, device, equipment and medium of private data
US10129028B2 (en) Relational encryption for password verification
CN107819569B (en) The encryption method and terminal device of log-on message
CN108377189A (en) User's communication encrypting method, device, terminal device and storage medium on block chain
CN107707347B (en) User key backup method and device and user key importing method and device
CN108256340B (en) Data acquisition method and device, terminal equipment and storage medium
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
CN106228076B (en) A kind of picture validation code guard method and system based on SGX
CN108462686A (en) Acquisition methods, device, terminal device and the storage medium of dynamic key
CN109462602A (en) Log-on message storage method, login validation method, device, equipment and medium
CN108696518A (en) User's communication encrypting method, device, terminal device and storage medium on block chain
CN108537038A (en) Custom rule cipher management method, device, terminal device and storage medium
CN104917748B (en) A kind of method and apparatus for being converted and being handled to encrypted message
CN109660534A (en) Safety certifying method, device, electronic equipment and storage medium based on more trade companies
CN107563211A (en) Safe encryption method and system
CN113315745A (en) Data processing method, device, equipment and medium
Shivaramakrishna et al. A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control
US10462113B1 (en) Systems and methods for securing push authentications
CN113904832A (en) Data encryption method, device, equipment and storage medium
WO2019114084A1 (en) Encrypting/decrypting method for multi-digit number and encrypting/decrypting server
US20230259926A1 (en) Address generation method, blockchain information processing method, and related device
CN111127020A (en) Transaction data confusion method based on block chain and related equipment
CN104363099A (en) Mobile phone security co-processing chip
CN111092721B (en) Method and device for setting access password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180914