CN105227302B - The sharing method of password and the shared system of password - Google Patents

The sharing method of password and the shared system of password Download PDF

Info

Publication number
CN105227302B
CN105227302B CN201510727241.0A CN201510727241A CN105227302B CN 105227302 B CN105227302 B CN 105227302B CN 201510727241 A CN201510727241 A CN 201510727241A CN 105227302 B CN105227302 B CN 105227302B
Authority
CN
China
Prior art keywords
password
user
application program
account name
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510727241.0A
Other languages
Chinese (zh)
Other versions
CN105227302A (en
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510727241.0A priority Critical patent/CN105227302B/en
Publication of CN105227302A publication Critical patent/CN105227302A/en
Priority to PCT/CN2016/093754 priority patent/WO2017071363A1/en
Application granted granted Critical
Publication of CN105227302B publication Critical patent/CN105227302B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides the sharing method and shared system of a kind of password, comprising: when opening the login interface of application program, extracts the identification code of application program;Acquire the biological information of user;Inquiry request is sent to cipher server, the inquiry request includes the biological information of user and the identification code of the application program, to inquire the user matched account name of institute and password in the application program;Receive account name and password from the cipher server;By the account name and Password Input into the login interface of the application program.The present invention realizes that the password of cross-terminal equipment is shared, and quick and safety by storing the biological information of user, the matched account name of identification code and application program institute and password of application program in cipher server.

Description

The sharing method of password and the shared system of password
Technical field
The invention belongs to the shared systems of the sharing method and password of Internet security fields more particularly to a kind of password System.
Background technique
Internet era while network brings great convenience for us, is also increasingly dependent on us all types of Network service.
One of consequent puzzlement, be user need to go to register for different application programs different types of account and Password.Such as: types of applications program such as can only be number, must include capitalization to the different sets requirement that has of account number cipher Letter and symbol constitute or have to be larger than 8 etc. by 6, and then result in the account between different application and password not It can reuse.In addition, the application program that security level is high, such as Bank Account Number, password need to regularly update.
Current cipher management method mainly passes through one cryptogam folder of a main Password Management or password list, And decide whether to open cryptogam folder or password list by the judgement to main password, so that user searches and reads therein Account name and password, however this management method is not only time-consuming and cannot achieve the shared of cryptographic libraries.
Summary of the invention
In view of this, can solve existing the purpose of the present invention is to provide a kind of sharing method of password and shared system The technical issues of cryptographic libraries are shared and manually lookup takes a long time can not be carried out by having in technology.
In order to solve the above technical problems, being set the embodiment of the invention provides a kind of sharing method of password applied to terminal In standby, the sharing method includes:
When opening the login interface of application program, the identification code of application program is extracted;
Acquire the biological information of user;
To cipher server send inquiry request, the inquiry request include user biological information and the application The identification code of program, to inquire the user matched account name of institute and password in the application program;
Receive account name and password from the cipher server;And
By the account name and Password Input into the login interface of the application program.
In order to solve the above technical problems, being applied to password the embodiment of the invention provides a kind of sharing method of password and taking It is engaged in device, the sharing method includes:
Cryptographic libraries are established, application program identification code, account name and the password registered for saving user;
The cryptographic libraries are encrypted by the biological information of user;
Receive the inquiry request from terminal device, the inquiry request includes the biological information of user and described The identification code of application program;
It is inquired by the biological nature information and decrypts matched cryptographic libraries;And
The matched account name of identification code institute and password of the application program are searched in cryptographic libraries after decryption, and are transmitted To the terminal device.
In order to solve the above technical problems, being set the embodiment of the invention provides a kind of shared system of password applied to terminal In standby, the shared system includes:
Application program identification module, for extracting the identification code of application program when opening the login interface of application program;
Physical characteristics collecting module, for acquiring the biological information of user;
Enquiry module, for sending inquiry request to cipher server, the inquiry request includes the biological characteristic of user The identification code of information and the application program, to inquire the user matched account name of institute and close in the application program Code;
Receiving module, for receiving account name and password from the cipher server;And
Login module, for by the account name and Password Input into the login interface of the application program.
In order to solve the above technical problems, being applied to password the embodiment of the invention provides a kind of shared system of password and taking It is engaged in device, the shared system includes:
Cryptographic libraries, application program identification code, account name and the password registered for saving user;
Encrypting module, for receiving the biological information of user, and by the biological information of user to described close Code library is encrypted;
Request module, for receiving the inquiry request from terminal device, the inquiry request includes the biology of user The identification code of characteristic information and the application program;
Matching module, for being inquired by the biological nature information and decrypting matched cryptographic libraries;And
Transmission module, for searching the matched account name of identification code institute of the application program in cryptographic libraries after decryption And password, and it is transmitted to the terminal device.
Compared with the existing technology, the sharing method of password of the invention and the shared system of password, by cryptographic service Stored in device the biological information of user, the matched account name of the identification code of application program and application program institute and Password realizes that the password of cross-terminal equipment is shared, and quick and safety.
Detailed description of the invention
Fig. 1 is the sharing method of password provided by the invention and the application environment schematic diagram of shared system;
Fig. 2 is the flow diagram of the sharing method for the password that the embodiment of the present invention one provides;
Fig. 3 is the module diagram of the shared system of password provided by Embodiment 2 of the present invention;
Fig. 4 is the flow diagram of the sharing method for the password that the embodiment of the present invention three provides;
Fig. 5 is the module diagram of the shared system for the password that the embodiment of the present invention four provides.
Specific embodiment
Please refer to the schema in attached drawing, wherein identical component symbol represents identical component, the principle of the present invention be with Implement to illustrate in a computing environment appropriate.The following description is based on exemplified specific implementation of the invention Example is not construed as the limitation present invention other specific embodiments not detailed herein.
The principle of the invention illustrates that be not represented as a kind of limitation, those skilled in the art can with above-mentioned text Solving plurality of step and operation as described below also may be implemented in hardware.The principle of the present invention uses many other wide usages Or specific purpose operation, communication environment or configuration are operated.
Referring to Fig. 1, for the sharing method of password provided in the present invention and the application environment schematic diagram of shared system.Institute State application environment, including terminal device 10, cipher server 20 and communication network 30.
The terminal device 10, for executing the sharing method of password or the shared system of the installation password.It is specific and Speech, the terminal device are the electronic equipment with physical characteristics collecting module and network savvy, including notebook 01, desktop Brain 02, smart phone 03, smartwatch (not indicating) or intelligent glasses (not indicating) etc..And the physical characteristics collecting module Can be it is embedded or make it is external, as being attached by USB port.
Cipher server 20, application program identification code, account name and the password registered for storing user, and pass through use The biological information at family is encrypted.Wherein cipher server 20 is one of Cloud Server or the terminal device 10 of user, i.e., By the password storage of user in specified local terminal 10.
Communication network 30, including wireless network and cable network.Wherein wireless network includes wireless wide area network, wireless local area One of net, wireless MAN and private wireless network or a variety of combinations.
This case can be applied in the Password Management program based on iris recognition.Please refer to following embodiment, embodiment one, two The sharing method of password is laid particular emphasis on, embodiment three, four lays particular emphasis on the shared of password.Although it is to be understood that each embodiment Stress difference, but its design philosophy is consistent.And the part not being described in detail in certain embodiments, it may refer to specification The detailed description of full text, repeats no more.
Embodiment one
Referring to Fig. 2, showing the flow diagram of the sharing method of password provided in an embodiment of the present invention.The password Sharing method, be commonly executed in terminal device, such as smart phone, computer, smartwatch or intelligent glasses etc., herein It does not enumerate one by one.
Specifically, the sharing method of the password includes:
In step s 201, when opening the login interface of application program, the identification code of application program is extracted.
For example, extracting the identification code of application program: wechat when user opens wechat program;It is objective when opening Netease's news When the end of family, the identification code of application program: Netease is extracted.
In step S202, the biological information of user is acquired.
Specifically, this step includes:
(1) biological characteristic of user is acquired, the biological characteristic includes: iris information, face information, finger print information, the palm Line information, and/or information of acoustic wave;
(2) the type number of biological characteristic collected is judged, wherein (3) are executed, if type if type number is 1 Number is more than or equal to 1 and executes (4);
(3) when type number is 1, biological characteristic of the identification information in 1 biological characteristic as user is extracted Information.
(4) when type number is greater than 1, biological characteristic of the identification information in each biological characteristic as user is extracted respectively Information, so that the cipher server is combined inquiry according to the weight of each biological characteristic.
In step S203, inquiry request is sent to cipher server, the inquiry request includes the biological characteristic of user The identification code of information and the application program, to inquire the user matched account name of institute and close in the application program Code.
In step S204, account name and password from the cipher server are received.
In step S205, judge whether to be properly received the account name and password.Wherein, step is executed if being properly received Rapid S206 thens follow the steps S209 if being not successfully received.
In step S206, judge whether the account name and password are in plain text.Wherein, if thening follow the steps in plain text S207, if ciphertext thens follow the steps S208.
It is understood that the account name and password are usually all ciphertext in order to improve password shared safety.
In step S207, the account name and password are inputted into the login interface of the application program.
It is understood that login can be searched by grabbing the keywords such as user name and password in the background Correspondence window in interface, and the account name and password are inputted respectively.
In step S208, the account and password of ciphertext are decrypted, and by after decryption account name and password it is defeated Enter the login interface to the application program.
Specifically, this step includes:
(1) rule of encryption and decryption is obtained;
(2) account and password of the ciphertext are decrypted according to the rule of the encryption and decryption, after generating decryption Account name and password;And
(3) by after decryption account name and Password Input to the application program login interface.
In step S209, the account name and password of user's input are received, and by the identification code of the application program, described The biological information of user and the account name and password are sent to the cipher server and register.
It is understood that after user does not inquire the matched account name of the application program institute and password, then by account Number name and password are sent to cipher server and are registered, and for inquiry next time and call.
The sharing method of password provided by the invention, by cipher server store user biological information, The matched account name of the identification code of application program and application program institute and password realize that the password of cross-terminal equipment is total It enjoys, and quick and safety.
Embodiment two
Referring to Fig. 3, showing the module diagram of the shared system of password provided in an embodiment of the present invention.The password Shared system 300, be commonly executed in terminal device, such as smart phone, computer, smartwatch or intelligent glasses etc., this Place is not enumerated one by one.
Specifically, the shared system 300 of the password, comprising: application program identification module 31, physical characteristics collecting mould Block 32, enquiry module 33, receiving module 34, deciphering module 35, login module 36 and update module 37.
Application program identification module 31, for extracting the identification of application program when opening the login interface of application program Code.
For example, extracting identification code-wechat of application program when user opens wechat program;It is objective when opening Netease's news When the end of family, identification code-Netease of application program is extracted.
Physical characteristics collecting module 32, for acquiring the biological information of user.
Specifically, the physical characteristics collecting module 32 include: acquisition submodule 321, judging submodule 322 and Extracting sub-module 323.
Wherein, the acquisition submodule 321, for acquiring the biological characteristic of user, the biological characteristic includes: iris letter Breath, face information, finger print information, palm print information, and/or information of acoustic wave.The judging submodule 322, judges life collected The type number of object feature.The extracting sub-module 323, for extracting in 1 biological characteristic when type number is 1 Biological information of the identification information as user;And it when type number is greater than 1, is extracted in each biological characteristic respectively Biological information of the identification information as user, so that the cipher server is combined according to the weight of each biological characteristic Inquiry.
Specifically, the acquisition submodule 321, comprising: video module, for acquiring iris information and face information; Fingerprint module, for acquiring finger print information and palm print information;And/or audio-frequency module, for acquiring information of acoustic wave.Wherein, described Video module, fingerprint module, and/or audio-frequency module are built in the terminal device or external, such as pass through USB interface and carry out Communication connection.
Enquiry module 33 is connected to the application program identification module 31 and the physical characteristics collecting module 32, is used for Inquiry request is sent to cipher server, the inquiry request includes the biological information of user and the knowledge of the application program Other code, to inquire the user matched account name of institute and password in the application program.
It is understood that the enquiry module 33 when sending inquiry request, can carry the terminal device itself Identification code allows the echo message from cipher server to feed back to the terminal device.
Receiving module 34, for receiving account name and password from the cipher server.
Deciphering module 35 is connected to the judgment module 34, for judging whether the account name and password are plaintexts, and Be decrypted when being the account and password of ciphertext, and by after decryption account name and password be transferred to the login module 36。
Specifically, the deciphering module 35 includes: regular submodule 351, decryption submodule 352 and transmission submodule 353。
Wherein, the regular submodule 351, for obtaining the rule of encryption and decryption.The decryption submodule 352 is used for root The account and password of the ciphertext are decrypted according to the rule of the encryption and decryption, to generate the account name and close after decryption Code.Submodule 353 is transmitted, for the account name after decrypting and password to be transferred to the login module 36.
Login module 36 is connected to the deciphering module 35, for by the account name and Password Input to the application In the login interface of program.
It is understood that user passes through 36 hand of login module if receiving module 34 does not receive account name and password It is dynamic to input the matched account name of the application program institute and password, that is, it is registered.
Update module 37 is connected to the receiving module 34, deciphering module 35 and login module 36, receives for judging Whether module 34 is successfully received the account name and password, when not receiving, obtains user's registration by login module 36 When the account name that inputs and password;When receiving, the account name and password that receive are forwarded to deciphering module 35.
Specifically, the update module 37 includes: judging submodule 371, receiving submodule 372 and registration submodule 373。
Wherein, the judging submodule 371 is connected to the receiving module 34, for judging whether described in successful reception Account name and password.Receiving submodule 372 is connected to the judging submodule 371, is used for and when being not successfully received, and passes through Login module receives the account name and password of user's input.Submodule 373 is registered, the receiving submodule 372 is connected to, is used for The identification code of the application program, the biological information of the user and the account name and password are sent to described Cipher server is registered.
It is understood that after user does not inquire the matched account name of the application program institute and password, then by account Number name and password are sent to cipher server and are stored, and for inquiry next time and call.
The shared system of password provided by the invention, by cipher server store user biological information, The matched account name of the identification code of application program and application program institute and password realize that the password of cross-terminal equipment is total It enjoys, and quick and safety.
Embodiment three
Referring to Fig. 4, showing the flow diagram of the sharing method of password provided in an embodiment of the present invention.The password Sharing method, be commonly executed in cipher server.The cipher server, comprising: the server in cloud or user terminal Smart phone, computer, smartwatch or intelligent glasses etc., are not enumerated one by one herein.
The sharing method of the password, comprising:
In step S401, cryptographic libraries are established, for saving the application program identification code that user registered, account name and close Code.
It as shown in table 1, is the schematic diagram of the cryptographic libraries of user 001.Wherein, 001 can also be replaced by user name or Biological information etc..
1 cryptographic libraries schematic diagram of table
The cryptographic libraries are encrypted by the biological information of user in step S402.
It is understood that the step of encryption, comprising:
(1) biological information of the user is obtained;
(2) judge whether the type number of the biological characteristic is greater than 1;
(3) if being not more than 1, the cryptographic libraries are encrypted by unique biological information;Or
(4) if more than 1, then by each biological information the cryptographic libraries are individually encrypted or combined ciphering.Its In, when being combined encryption, further includes: carry out the assignment of weight, for all types of biological characteristics for carrying out group after decryption Close inquiry.
For example, encryption can be combined by iris information and finger print information, to improve security performance.In step S403 In, receive from terminal device inquiry request, the inquiry request include user biological information and the application The identification code of program.
It is understood that the identification code of the terminal device itself can be also carried in the inquiry request, so that coming from The echo message of cipher server can feed back to the terminal device.
In step s 404, it is inquired by the biological nature information and decrypts matched cryptographic libraries.
In one embodiment, the step of matching includes:
(1) biological information of user is obtained;
(2) judge the matching degree of the biological information;
If the matching degree of the iris information of user is 90%, fingerprint matching degree is 80%;
(3) matching primitives are carried out according to the weight of each biological characteristic and matching degree;
Such as the iris assignment 0.7 of 523 assignment of above-mentioned assignment submodule, fingerprint assignment 0.5, the then matching result calculated Are as follows: 0.7*0.9+0.5*0.8=1.03.
(4) judge whether matching result is greater than preset matching threshold, and inquired when being greater than matching threshold.
It is understood that wider range of the matching threshold, if matching threshold value 0.4, means only according to finger Line can be inquired;If matching threshold value is 1, mean at least to need the combination of 2 biological informations can just look into It askes.
In step S405, the matched account name of identification code institute of the application program is searched in cryptographic libraries after decryption And password, and it is transmitted to the terminal device.
It is understood that the decryption is for cryptographic libraries, account name therein and password be can be in plain text or non- The mode of plaintext is transmitted.
The sharing method of password provided by the invention, by cipher server store user biological information, The matched account name of the identification code of application program and application program institute and password realize that the password of cross-terminal equipment is total It enjoys, and quick and safety.
Example IV
Referring to Fig. 5, showing the flow diagram of the shared system of password provided in an embodiment of the present invention.The password Shared system, be usually mounted in cipher server, the cipher server includes: the server or user terminal in cloud Smart phone, computer, smartwatch or intelligent glasses etc., are not enumerated one by one herein.
The shared system 500 of the password, comprising: cryptographic libraries 51, encrypting module 52, request module 53, matching module 54, And transmission module 55.
The cryptographic libraries 51, application program identification code, account name and the password registered for saving user.
The encrypting module 52 for receiving the biological information of user, and passes through the biological information pair of user The cryptographic libraries are encrypted.
Wherein, the encrypting module 52, comprising: type judging submodule 521, unique encryption submodule 522 and multiple groups Encrypt submodule 524.
The type judging submodule 521, for judging whether the type number of biological characteristic is greater than 1;
The unique encryption submodule 521, for passing through unique biological information when type number is not more than 1 The cryptographic libraries are encrypted;
The multiple groups encrypt submodule 522, are used for when type number is greater than 1, by each biological information to described Cryptographic libraries are individually encrypted or combined ciphering.
Wherein, when being combined encryption, further includes: assignment submodule 523, for being carried out for all types of biological characteristics The assignment of weight, for carrying out query composition after decryption.Such as iris assignment 0.7, fingerprint assignment 0.5.The request module 53 is used In receiving the inquiry request from terminal device, the inquiry request includes the biological information of user and described using journey The identification code of sequence.
It is understood that the identification code of the terminal device itself can be also carried in the inquiry request, so that coming from The echo message of cipher server can feed back to the terminal device.
The matching module 54, for being inquired by the biological nature information and decrypting matched cryptographic libraries.
Specifically, the matching module 54 includes: acquisition submodule 541, matching judgment submodule 542, matching primitives Submodule 543 and inquiry submodule 544.
Wherein, the acquisition submodule 541, for obtaining the biological information of user.The matching judgment submodule 542, for judging the matching degree of the biological information.The matching primitives submodule 543, for according to each biological characteristic Weight and matching degree carry out matching primitives.The inquiry submodule 544, for being greater than preset matching threshold when matching result Shi Jinhang inquiry.
The transmission module 55, the identification code institute for searching the application program in cryptographic libraries after decryption are matched Account name and password, and it is transmitted to the terminal device.
Wherein, the transmission module 55, is also used to: receiving application program identification code, the account name and close that user is registered Code, and it is transmitted to the cryptographic libraries 51;The biological information of user is received, and is transmitted to the encrypting module 52;And it connects The inquiry request from terminal device is received, and is transmitted to the request module 53.Details are not described herein again.
The sharing method of password provided by the invention, by cipher server store user biological information, The matched account name of the identification code of application program and application program institute and password realize that the password of cross-terminal equipment is total It enjoys, and quick and safety.
The sharing method of password provided in an embodiment of the present invention and the shared system of password belong to same design, specific real Existing process is detailed in specification full text, and details are not described herein again.
In conclusion although the present invention has been disclosed above in the preferred embodiment, but above preferred embodiment is not to limit The system present invention, those skilled in the art can make various changes and profit without departing from the spirit and scope of the present invention Decorations, therefore protection scope of the present invention subjects to the scope of the claims.

Claims (6)

1. a kind of sharing method of password, be applied in terminal device, which is characterized in that terminal device by communication network with it is close Code server carries out wireless network connection;Physical characteristics collecting module is embedded in terminal device, and the sharing method includes:
Terminal device extracts the identification code of application program when opening the login interface of application program;
Terminal device acquires each biological information of user by physical characteristics collecting module, and extracts each biology respectively Biological information of the identification information as user in feature, the biological information include iris information, face information And finger print information, so that cipher server carries out matching primitives according to the weight and matching degree of each biological characteristic, and when matching knot Fruit is combined inquiry when being greater than matching threshold, and wherein matching primitives include: the matching degree for calculating separately each biological characteristic, calculates The product of each matching degree and respective weights;It sums to each product;The matching threshold includes: single creature feature The matching degree of matching degree or single creature feature is to the open interval of the sum of the matching degree of each biological characteristic;
Terminal device sends inquiry request to cipher server, and the inquiry request includes the identification code of terminal device itself, uses The identification code of the biological information at family and the application program is matched in the application program to inquire the user Account name and password, and make account name from cipher server and cipher feedback to the identification code pair of the terminal device The terminal device answered, the password to realize cross-terminal equipment are shared;
Terminal device receives account name and password from the cipher server;
Judge whether the account name and password are in plain text;
If the account name and password of plaintext, then by the login of the account name of the plaintext and Password Input to the application program In interface;Or
If the account and password of ciphertext, obtain the rule of encryption and decryption;According to the rule of the encryption and decryption to the ciphertext Account and password be decrypted, with generate decryption after account name and password;By after decryption account name and Password Input arrive The login interface of the application program;And
Terminal device is by the account name and Password Input into the login interface of the application program;It include: by backstage Middle crawl user name and password keyword searches the correspondence window in login interface, and inputs the account name respectively And password;
If terminal device is not successfully received the account name and password, the account name and password of user's input are received;
The identification code of the application program, the biological information of the user and the account name and password are sent to The cipher server is registered.
2. sharing method as described in claim 1, which is characterized in that the biological information of the acquisition user, comprising:
Acquire the biological characteristic of user, the biological characteristic further include: palm print information, and/or information of acoustic wave;And
Extract biological information of the identification information in the biological characteristic as user.
3. a kind of sharing method of the password of the sharing method including password as claimed in claim 1 or 2 is applied to password and takes It is engaged in device, which is characterized in that terminal device carries out wireless network connection by communication network and cipher server;The shared side Method includes:
Cipher server establishes cryptographic libraries, application program identification code, account name and the password registered for saving user;
Cipher server encrypts the cryptographic libraries by the biological information of user;
Cipher server receives the inquiry request from terminal device, and the inquiry request includes the identification of terminal device itself The identification code of code, multiple biological informations of user and the application program;The biological information includes multiple and different The biological information of type;
Cipher server carries out matching primitives according to the weight and matching degree of the multiple biological information, and works as matching result It is inquired when greater than matching threshold and decrypts matched cryptographic libraries, wherein matching primitives include: for calculating separately each biological characteristic With degree, the product of each matching degree and respective weights is calculated;It sums to each product;The matching threshold includes: single The matching degree of the matching degree of biological characteristic or single creature feature is to the open interval of the sum of the matching degree of each biological characteristic;And
The matched account name of identification code institute and password of the application program are searched in the cryptographic libraries of cipher server after decryption, And according to the identification code of the terminal device itself, matched account name and password are transmitted to the identification code of the terminal device Corresponding terminal device, the password to realize cross-terminal equipment are shared.
4. a kind of shared system of password, be applied in terminal device, which is characterized in that terminal device by communication network with it is close Code server carries out wireless network connection;Physical characteristics collecting module is embedded in terminal device, and the shared system includes:
Application program identification module, for extracting the identification code of application program when opening the login interface of application program;
Physical characteristics collecting module for acquiring each biological information of user, and extracts the knowledge in each biological characteristic respectively Biological information of the other information as user, the biological information include iris information, face information and finger print information, So that the cipher server carries out matching primitives according to the weight and matching degree of each biological characteristic, and when matching result is greater than institute Inquiry is combined when stating matching threshold, wherein matching primitives include: the matching degree for calculating separately each biological characteristic, calculate each Product with degree with respective weights;It sums to each product;The matching threshold includes: the matching of single creature feature The matching degree of degree or single creature feature is to the open interval of the sum of the matching degree of each biological characteristic;
Enquiry module, for sending inquiry request to cipher server, the inquiry request includes the identification of terminal device itself The identification code of code, the biological information of user and the application program, to inquire the user in the application program The matched account name of institute and password, and make account name from cipher server and cipher feedback to the knowledge of the terminal device The corresponding terminal device of other code, the password to realize cross-terminal equipment are shared;
Receiving module, for receiving account name and password from the cipher server;
Deciphering module is connected between the receiving module and the login module, for judging the account name and password is It is no be in plain text, and be decrypted when being the account and password of ciphertext, and by after decryption account name and password be transferred to institute Login module is stated, so that login module is input to the login interface of the application program;
Wherein, the deciphering module includes:
Regular submodule, for obtaining the rule of encryption and decryption;
Submodule is decrypted, for the account and password of the ciphertext to be decrypted according to the rule of the encryption and decryption, with life At the account name and password after decryption;And
Submodule is transmitted, for the account name after decrypting and password to be transferred to login module;And
Login module, for by the account name and Password Input into the login interface of the application program;Include: by The correspondence window in user name and password keyword lookup login interface is grabbed in backstage, and inputs the account respectively Number name and password;
Judging submodule is connected to the receiving module, is properly received the account name and password for judging whether;
Receiving submodule, is used for and when being not successfully received, and passes through account name and password that login module receives user's input;With And
Submodule is registered, for by the biological information of the identification code of the application program, the user and the account Name and password are sent to the cipher server and are registered.
5. shared system as claimed in claim 4, which is characterized in that the physical characteristics collecting module includes:
Submodule is acquired, for acquiring the biological characteristic of user, the biological characteristic further include: palm print information, and/or sound wave letter Breath;And
Extracting sub-module, for extracting biological information of the identification information in the biological characteristic as user.
6. a kind of shared system of the password of the shared system including password as described in claim 4 or 5 is applied to password and takes It is engaged in device, which is characterized in that terminal device carries out wireless network connection by communication network and cipher server;The shared system System includes:
Cryptographic libraries, application program identification code, account name and the password registered for saving user;
Encrypting module, for receiving the biological information of user, and by the biological information of user to the cryptographic libraries It is encrypted;
Request module, for receiving the inquiry request from terminal device, the inquiry request includes terminal device itself The identification code of identification code, multiple biological informations of user and the application program;The biological information includes multiple Different types of biological information;
Matching module carries out matching primitives for the weight and matching degree according to the multiple biological information, and when matching It inquires when being as a result greater than matching threshold and decrypts matched cryptographic libraries, wherein matching primitives include: to calculate separately each biological characteristic Matching degree, calculate the product of each matching degree and respective weights;It sums to each product;The matching threshold includes: The matching degree of the matching degree of single creature feature or single creature feature is to the open interval of the sum of the matching degree of each biological characteristic; And
Transmission module, for searching the identification code matched account name of institute of the application program and close in cryptographic libraries after decryption Code, and according to the identification code of the terminal device itself, matched account name and password are transmitted to the knowledge of the terminal device The corresponding terminal device of other code, the password to realize cross-terminal equipment are shared.
CN201510727241.0A 2015-10-28 2015-10-28 The sharing method of password and the shared system of password Active CN105227302B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510727241.0A CN105227302B (en) 2015-10-28 2015-10-28 The sharing method of password and the shared system of password
PCT/CN2016/093754 WO2017071363A1 (en) 2015-10-28 2016-08-05 Password sharing method, password sharing system, and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510727241.0A CN105227302B (en) 2015-10-28 2015-10-28 The sharing method of password and the shared system of password

Publications (2)

Publication Number Publication Date
CN105227302A CN105227302A (en) 2016-01-06
CN105227302B true CN105227302B (en) 2019-06-14

Family

ID=54996023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510727241.0A Active CN105227302B (en) 2015-10-28 2015-10-28 The sharing method of password and the shared system of password

Country Status (2)

Country Link
CN (1) CN105227302B (en)
WO (1) WO2017071363A1 (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227302B (en) * 2015-10-28 2019-06-14 Oppo广东移动通信有限公司 The sharing method of password and the shared system of password
CN105915566A (en) * 2016-07-06 2016-08-31 杨炳 Safety system used for real-time account access
CN106293080A (en) * 2016-07-29 2017-01-04 维沃移动通信有限公司 The method of a kind of user profile process and mobile terminal
CN106529318B (en) * 2016-11-21 2019-05-28 Oppo广东移动通信有限公司 The management method and mobile terminal of account and password
CN106778178A (en) * 2016-12-28 2017-05-31 广东虹勤通讯技术有限公司 The call method and device of fingerprint business card
CN107070899A (en) * 2017-03-22 2017-08-18 世纪恒通科技股份有限公司 A kind of account login based on iris recognition
CN106941506A (en) * 2017-05-17 2017-07-11 北京京东尚科信息技术有限公司 Data processing method and device based on biological characteristic
CN107181595A (en) * 2017-07-27 2017-09-19 深圳市泰衡诺科技有限公司 A kind of account method for retrieving and device for retrieving based on intelligent terminal
CN107645495A (en) * 2017-08-24 2018-01-30 上海斐讯数据通信技术有限公司 A kind of wireless network password sharing method and system
CN109842602A (en) * 2017-11-29 2019-06-04 上海荆虹电子科技有限公司 A kind of device and login method based on biological characteristic validation
CN108282331A (en) * 2018-01-02 2018-07-13 金邦达有限公司 Cipher processing method, apparatus and system
CN108647501A (en) * 2018-05-09 2018-10-12 平安科技(深圳)有限公司 Multiple utility program shares password unlocking method, device, equipment and storage medium
CN111466247B (en) * 2020-06-22 2020-09-22 成都信息工程大学 Catalytic bomb control system and launching method
CN111766814A (en) * 2020-07-08 2020-10-13 王善举 Forest resource information acquisition terminal
CN111935816B (en) * 2020-09-23 2021-03-12 广州市玄武无线科技股份有限公司 Application program registration method and device of terminal and electronic equipment
CN114338058B (en) * 2020-09-27 2023-05-09 中国移动通信有限公司研究院 Information processing method, device and storage medium
CN113193956B (en) * 2021-04-27 2023-05-12 维沃移动通信有限公司 Account information processing method and device
CN114973518A (en) * 2022-04-21 2022-08-30 杭州小电科技股份有限公司 Shared charging equipment operation and maintenance method, shared charging equipment, terminal equipment and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098232A (en) * 2007-07-12 2008-01-02 兰州大学 Dynamic password and multiple biological characteristics combined identification authenticating method
CN103401907A (en) * 2013-07-23 2013-11-20 惠州Tcl移动通信有限公司 Synchronous processing method and system for login information of application program

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101383704A (en) * 2008-04-23 2009-03-11 鲁东大学 Cipher module based on finger print recognition technology
CN202502503U (en) * 2012-01-16 2012-10-24 青岛理工大学 Cloud-computing-based fingerprint password management system
CN104184701A (en) * 2013-05-21 2014-12-03 腾讯科技(深圳)有限公司 Third-party application log-in method, device and terminal
CN103402203B (en) * 2013-07-30 2017-08-25 努比亚技术有限公司 Fast access method and device based on bio-identification
CN103685232A (en) * 2013-11-11 2014-03-26 上海乐今通信技术有限公司 Mobile terminal and mobile application login method
CN105207985A (en) * 2015-07-29 2015-12-30 广东欧珀移动通信有限公司 Application program login method and mobile terminal
CN105429949B (en) * 2015-10-28 2017-11-28 广东欧珀移动通信有限公司 The method for pushing and supplying system of password
CN105227302B (en) * 2015-10-28 2019-06-14 Oppo广东移动通信有限公司 The sharing method of password and the shared system of password

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098232A (en) * 2007-07-12 2008-01-02 兰州大学 Dynamic password and multiple biological characteristics combined identification authenticating method
CN103401907A (en) * 2013-07-23 2013-11-20 惠州Tcl移动通信有限公司 Synchronous processing method and system for login information of application program

Also Published As

Publication number Publication date
CN105227302A (en) 2016-01-06
WO2017071363A1 (en) 2017-05-04

Similar Documents

Publication Publication Date Title
CN105227302B (en) The sharing method of password and the shared system of password
US9438412B2 (en) Computer-implemented system and method for multi-party data function computing using discriminative dimensionality-reducing mappings
CN106533669B (en) The methods, devices and systems of equipment identification
JP6180177B2 (en) Encrypted data inquiry method and system capable of protecting privacy
WO2021022717A1 (en) Method and apparatus for analyzing feature correlation in federated learning, and readable storage medium
CN106972927B (en) Encryption method and system for different security levels
CN105429949B (en) The method for pushing and supplying system of password
CN106254324A (en) A kind of encryption method storing file and device
US9197613B2 (en) Document processing method and system
CN106921493B (en) Encryption method and system
CN109766707B (en) Data processing method, device, equipment and medium based on block chain
US20170364691A1 (en) Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal
US20130159695A1 (en) Document processing method and system
CN106911712B (en) Encryption method and system applied to distributed system
US20210234684A1 (en) Information processing system, information processing method, and information processing apparatus
CN102708216A (en) Word-segmentation organizing method and clustering method for ciphertext search
CN104992100A (en) Iris dynamic encryption and decryption system and method for electronic document flowing
JP6557338B2 (en) Concealed similarity search system and similarity concealment search method
CN112231309A (en) Method, device, terminal equipment and medium for removing duplicate of longitudinal federal data statistics
CN108737094B (en) Domain password security detection method and related equipment
CN109815730A (en) It is a kind of support skyline inquire can search for encryption method and system
CN107682303B (en) System and method for encrypting and inquiring personal sensitive information
KR20190077556A (en) Message transmission system, communication terminal, server device, message transmission method and program
CN115525817B (en) Aggregation query method, system, electronic equipment and computer storage medium
CN111414636A (en) Method, device and equipment for updating recognition model and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant