CN105227302B - The sharing method of password and the shared system of password - Google Patents
The sharing method of password and the shared system of password Download PDFInfo
- Publication number
- CN105227302B CN105227302B CN201510727241.0A CN201510727241A CN105227302B CN 105227302 B CN105227302 B CN 105227302B CN 201510727241 A CN201510727241 A CN 201510727241A CN 105227302 B CN105227302 B CN 105227302B
- Authority
- CN
- China
- Prior art keywords
- password
- user
- application program
- account name
- terminal device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Collating Specific Patterns (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides the sharing method and shared system of a kind of password, comprising: when opening the login interface of application program, extracts the identification code of application program;Acquire the biological information of user;Inquiry request is sent to cipher server, the inquiry request includes the biological information of user and the identification code of the application program, to inquire the user matched account name of institute and password in the application program;Receive account name and password from the cipher server;By the account name and Password Input into the login interface of the application program.The present invention realizes that the password of cross-terminal equipment is shared, and quick and safety by storing the biological information of user, the matched account name of identification code and application program institute and password of application program in cipher server.
Description
Technical field
The invention belongs to the shared systems of the sharing method and password of Internet security fields more particularly to a kind of password
System.
Background technique
Internet era while network brings great convenience for us, is also increasingly dependent on us all types of
Network service.
One of consequent puzzlement, be user need to go to register for different application programs different types of account and
Password.Such as: types of applications program such as can only be number, must include capitalization to the different sets requirement that has of account number cipher
Letter and symbol constitute or have to be larger than 8 etc. by 6, and then result in the account between different application and password not
It can reuse.In addition, the application program that security level is high, such as Bank Account Number, password need to regularly update.
Current cipher management method mainly passes through one cryptogam folder of a main Password Management or password list,
And decide whether to open cryptogam folder or password list by the judgement to main password, so that user searches and reads therein
Account name and password, however this management method is not only time-consuming and cannot achieve the shared of cryptographic libraries.
Summary of the invention
In view of this, can solve existing the purpose of the present invention is to provide a kind of sharing method of password and shared system
The technical issues of cryptographic libraries are shared and manually lookup takes a long time can not be carried out by having in technology.
In order to solve the above technical problems, being set the embodiment of the invention provides a kind of sharing method of password applied to terminal
In standby, the sharing method includes:
When opening the login interface of application program, the identification code of application program is extracted;
Acquire the biological information of user;
To cipher server send inquiry request, the inquiry request include user biological information and the application
The identification code of program, to inquire the user matched account name of institute and password in the application program;
Receive account name and password from the cipher server;And
By the account name and Password Input into the login interface of the application program.
In order to solve the above technical problems, being applied to password the embodiment of the invention provides a kind of sharing method of password and taking
It is engaged in device, the sharing method includes:
Cryptographic libraries are established, application program identification code, account name and the password registered for saving user;
The cryptographic libraries are encrypted by the biological information of user;
Receive the inquiry request from terminal device, the inquiry request includes the biological information of user and described
The identification code of application program;
It is inquired by the biological nature information and decrypts matched cryptographic libraries;And
The matched account name of identification code institute and password of the application program are searched in cryptographic libraries after decryption, and are transmitted
To the terminal device.
In order to solve the above technical problems, being set the embodiment of the invention provides a kind of shared system of password applied to terminal
In standby, the shared system includes:
Application program identification module, for extracting the identification code of application program when opening the login interface of application program;
Physical characteristics collecting module, for acquiring the biological information of user;
Enquiry module, for sending inquiry request to cipher server, the inquiry request includes the biological characteristic of user
The identification code of information and the application program, to inquire the user matched account name of institute and close in the application program
Code;
Receiving module, for receiving account name and password from the cipher server;And
Login module, for by the account name and Password Input into the login interface of the application program.
In order to solve the above technical problems, being applied to password the embodiment of the invention provides a kind of shared system of password and taking
It is engaged in device, the shared system includes:
Cryptographic libraries, application program identification code, account name and the password registered for saving user;
Encrypting module, for receiving the biological information of user, and by the biological information of user to described close
Code library is encrypted;
Request module, for receiving the inquiry request from terminal device, the inquiry request includes the biology of user
The identification code of characteristic information and the application program;
Matching module, for being inquired by the biological nature information and decrypting matched cryptographic libraries;And
Transmission module, for searching the matched account name of identification code institute of the application program in cryptographic libraries after decryption
And password, and it is transmitted to the terminal device.
Compared with the existing technology, the sharing method of password of the invention and the shared system of password, by cryptographic service
Stored in device the biological information of user, the matched account name of the identification code of application program and application program institute and
Password realizes that the password of cross-terminal equipment is shared, and quick and safety.
Detailed description of the invention
Fig. 1 is the sharing method of password provided by the invention and the application environment schematic diagram of shared system;
Fig. 2 is the flow diagram of the sharing method for the password that the embodiment of the present invention one provides;
Fig. 3 is the module diagram of the shared system of password provided by Embodiment 2 of the present invention;
Fig. 4 is the flow diagram of the sharing method for the password that the embodiment of the present invention three provides;
Fig. 5 is the module diagram of the shared system for the password that the embodiment of the present invention four provides.
Specific embodiment
Please refer to the schema in attached drawing, wherein identical component symbol represents identical component, the principle of the present invention be with
Implement to illustrate in a computing environment appropriate.The following description is based on exemplified specific implementation of the invention
Example is not construed as the limitation present invention other specific embodiments not detailed herein.
The principle of the invention illustrates that be not represented as a kind of limitation, those skilled in the art can with above-mentioned text
Solving plurality of step and operation as described below also may be implemented in hardware.The principle of the present invention uses many other wide usages
Or specific purpose operation, communication environment or configuration are operated.
Referring to Fig. 1, for the sharing method of password provided in the present invention and the application environment schematic diagram of shared system.Institute
State application environment, including terminal device 10, cipher server 20 and communication network 30.
The terminal device 10, for executing the sharing method of password or the shared system of the installation password.It is specific and
Speech, the terminal device are the electronic equipment with physical characteristics collecting module and network savvy, including notebook 01, desktop
Brain 02, smart phone 03, smartwatch (not indicating) or intelligent glasses (not indicating) etc..And the physical characteristics collecting module
Can be it is embedded or make it is external, as being attached by USB port.
Cipher server 20, application program identification code, account name and the password registered for storing user, and pass through use
The biological information at family is encrypted.Wherein cipher server 20 is one of Cloud Server or the terminal device 10 of user, i.e.,
By the password storage of user in specified local terminal 10.
Communication network 30, including wireless network and cable network.Wherein wireless network includes wireless wide area network, wireless local area
One of net, wireless MAN and private wireless network or a variety of combinations.
This case can be applied in the Password Management program based on iris recognition.Please refer to following embodiment, embodiment one, two
The sharing method of password is laid particular emphasis on, embodiment three, four lays particular emphasis on the shared of password.Although it is to be understood that each embodiment
Stress difference, but its design philosophy is consistent.And the part not being described in detail in certain embodiments, it may refer to specification
The detailed description of full text, repeats no more.
Embodiment one
Referring to Fig. 2, showing the flow diagram of the sharing method of password provided in an embodiment of the present invention.The password
Sharing method, be commonly executed in terminal device, such as smart phone, computer, smartwatch or intelligent glasses etc., herein
It does not enumerate one by one.
Specifically, the sharing method of the password includes:
In step s 201, when opening the login interface of application program, the identification code of application program is extracted.
For example, extracting the identification code of application program: wechat when user opens wechat program;It is objective when opening Netease's news
When the end of family, the identification code of application program: Netease is extracted.
In step S202, the biological information of user is acquired.
Specifically, this step includes:
(1) biological characteristic of user is acquired, the biological characteristic includes: iris information, face information, finger print information, the palm
Line information, and/or information of acoustic wave;
(2) the type number of biological characteristic collected is judged, wherein (3) are executed, if type if type number is 1
Number is more than or equal to 1 and executes (4);
(3) when type number is 1, biological characteristic of the identification information in 1 biological characteristic as user is extracted
Information.
(4) when type number is greater than 1, biological characteristic of the identification information in each biological characteristic as user is extracted respectively
Information, so that the cipher server is combined inquiry according to the weight of each biological characteristic.
In step S203, inquiry request is sent to cipher server, the inquiry request includes the biological characteristic of user
The identification code of information and the application program, to inquire the user matched account name of institute and close in the application program
Code.
In step S204, account name and password from the cipher server are received.
In step S205, judge whether to be properly received the account name and password.Wherein, step is executed if being properly received
Rapid S206 thens follow the steps S209 if being not successfully received.
In step S206, judge whether the account name and password are in plain text.Wherein, if thening follow the steps in plain text
S207, if ciphertext thens follow the steps S208.
It is understood that the account name and password are usually all ciphertext in order to improve password shared safety.
In step S207, the account name and password are inputted into the login interface of the application program.
It is understood that login can be searched by grabbing the keywords such as user name and password in the background
Correspondence window in interface, and the account name and password are inputted respectively.
In step S208, the account and password of ciphertext are decrypted, and by after decryption account name and password it is defeated
Enter the login interface to the application program.
Specifically, this step includes:
(1) rule of encryption and decryption is obtained;
(2) account and password of the ciphertext are decrypted according to the rule of the encryption and decryption, after generating decryption
Account name and password;And
(3) by after decryption account name and Password Input to the application program login interface.
In step S209, the account name and password of user's input are received, and by the identification code of the application program, described
The biological information of user and the account name and password are sent to the cipher server and register.
It is understood that after user does not inquire the matched account name of the application program institute and password, then by account
Number name and password are sent to cipher server and are registered, and for inquiry next time and call.
The sharing method of password provided by the invention, by cipher server store user biological information,
The matched account name of the identification code of application program and application program institute and password realize that the password of cross-terminal equipment is total
It enjoys, and quick and safety.
Embodiment two
Referring to Fig. 3, showing the module diagram of the shared system of password provided in an embodiment of the present invention.The password
Shared system 300, be commonly executed in terminal device, such as smart phone, computer, smartwatch or intelligent glasses etc., this
Place is not enumerated one by one.
Specifically, the shared system 300 of the password, comprising: application program identification module 31, physical characteristics collecting mould
Block 32, enquiry module 33, receiving module 34, deciphering module 35, login module 36 and update module 37.
Application program identification module 31, for extracting the identification of application program when opening the login interface of application program
Code.
For example, extracting identification code-wechat of application program when user opens wechat program;It is objective when opening Netease's news
When the end of family, identification code-Netease of application program is extracted.
Physical characteristics collecting module 32, for acquiring the biological information of user.
Specifically, the physical characteristics collecting module 32 include: acquisition submodule 321, judging submodule 322 and
Extracting sub-module 323.
Wherein, the acquisition submodule 321, for acquiring the biological characteristic of user, the biological characteristic includes: iris letter
Breath, face information, finger print information, palm print information, and/or information of acoustic wave.The judging submodule 322, judges life collected
The type number of object feature.The extracting sub-module 323, for extracting in 1 biological characteristic when type number is 1
Biological information of the identification information as user;And it when type number is greater than 1, is extracted in each biological characteristic respectively
Biological information of the identification information as user, so that the cipher server is combined according to the weight of each biological characteristic
Inquiry.
Specifically, the acquisition submodule 321, comprising: video module, for acquiring iris information and face information;
Fingerprint module, for acquiring finger print information and palm print information;And/or audio-frequency module, for acquiring information of acoustic wave.Wherein, described
Video module, fingerprint module, and/or audio-frequency module are built in the terminal device or external, such as pass through USB interface and carry out
Communication connection.
Enquiry module 33 is connected to the application program identification module 31 and the physical characteristics collecting module 32, is used for
Inquiry request is sent to cipher server, the inquiry request includes the biological information of user and the knowledge of the application program
Other code, to inquire the user matched account name of institute and password in the application program.
It is understood that the enquiry module 33 when sending inquiry request, can carry the terminal device itself
Identification code allows the echo message from cipher server to feed back to the terminal device.
Receiving module 34, for receiving account name and password from the cipher server.
Deciphering module 35 is connected to the judgment module 34, for judging whether the account name and password are plaintexts, and
Be decrypted when being the account and password of ciphertext, and by after decryption account name and password be transferred to the login module
36。
Specifically, the deciphering module 35 includes: regular submodule 351, decryption submodule 352 and transmission submodule
353。
Wherein, the regular submodule 351, for obtaining the rule of encryption and decryption.The decryption submodule 352 is used for root
The account and password of the ciphertext are decrypted according to the rule of the encryption and decryption, to generate the account name and close after decryption
Code.Submodule 353 is transmitted, for the account name after decrypting and password to be transferred to the login module 36.
Login module 36 is connected to the deciphering module 35, for by the account name and Password Input to the application
In the login interface of program.
It is understood that user passes through 36 hand of login module if receiving module 34 does not receive account name and password
It is dynamic to input the matched account name of the application program institute and password, that is, it is registered.
Update module 37 is connected to the receiving module 34, deciphering module 35 and login module 36, receives for judging
Whether module 34 is successfully received the account name and password, when not receiving, obtains user's registration by login module 36
When the account name that inputs and password;When receiving, the account name and password that receive are forwarded to deciphering module 35.
Specifically, the update module 37 includes: judging submodule 371, receiving submodule 372 and registration submodule
373。
Wherein, the judging submodule 371 is connected to the receiving module 34, for judging whether described in successful reception
Account name and password.Receiving submodule 372 is connected to the judging submodule 371, is used for and when being not successfully received, and passes through
Login module receives the account name and password of user's input.Submodule 373 is registered, the receiving submodule 372 is connected to, is used for
The identification code of the application program, the biological information of the user and the account name and password are sent to described
Cipher server is registered.
It is understood that after user does not inquire the matched account name of the application program institute and password, then by account
Number name and password are sent to cipher server and are stored, and for inquiry next time and call.
The shared system of password provided by the invention, by cipher server store user biological information,
The matched account name of the identification code of application program and application program institute and password realize that the password of cross-terminal equipment is total
It enjoys, and quick and safety.
Embodiment three
Referring to Fig. 4, showing the flow diagram of the sharing method of password provided in an embodiment of the present invention.The password
Sharing method, be commonly executed in cipher server.The cipher server, comprising: the server in cloud or user terminal
Smart phone, computer, smartwatch or intelligent glasses etc., are not enumerated one by one herein.
The sharing method of the password, comprising:
In step S401, cryptographic libraries are established, for saving the application program identification code that user registered, account name and close
Code.
It as shown in table 1, is the schematic diagram of the cryptographic libraries of user 001.Wherein, 001 can also be replaced by user name or
Biological information etc..
1 cryptographic libraries schematic diagram of table
The cryptographic libraries are encrypted by the biological information of user in step S402.
It is understood that the step of encryption, comprising:
(1) biological information of the user is obtained;
(2) judge whether the type number of the biological characteristic is greater than 1;
(3) if being not more than 1, the cryptographic libraries are encrypted by unique biological information;Or
(4) if more than 1, then by each biological information the cryptographic libraries are individually encrypted or combined ciphering.Its
In, when being combined encryption, further includes: carry out the assignment of weight, for all types of biological characteristics for carrying out group after decryption
Close inquiry.
For example, encryption can be combined by iris information and finger print information, to improve security performance.In step S403
In, receive from terminal device inquiry request, the inquiry request include user biological information and the application
The identification code of program.
It is understood that the identification code of the terminal device itself can be also carried in the inquiry request, so that coming from
The echo message of cipher server can feed back to the terminal device.
In step s 404, it is inquired by the biological nature information and decrypts matched cryptographic libraries.
In one embodiment, the step of matching includes:
(1) biological information of user is obtained;
(2) judge the matching degree of the biological information;
If the matching degree of the iris information of user is 90%, fingerprint matching degree is 80%;
(3) matching primitives are carried out according to the weight of each biological characteristic and matching degree;
Such as the iris assignment 0.7 of 523 assignment of above-mentioned assignment submodule, fingerprint assignment 0.5, the then matching result calculated
Are as follows: 0.7*0.9+0.5*0.8=1.03.
(4) judge whether matching result is greater than preset matching threshold, and inquired when being greater than matching threshold.
It is understood that wider range of the matching threshold, if matching threshold value 0.4, means only according to finger
Line can be inquired;If matching threshold value is 1, mean at least to need the combination of 2 biological informations can just look into
It askes.
In step S405, the matched account name of identification code institute of the application program is searched in cryptographic libraries after decryption
And password, and it is transmitted to the terminal device.
It is understood that the decryption is for cryptographic libraries, account name therein and password be can be in plain text or non-
The mode of plaintext is transmitted.
The sharing method of password provided by the invention, by cipher server store user biological information,
The matched account name of the identification code of application program and application program institute and password realize that the password of cross-terminal equipment is total
It enjoys, and quick and safety.
Example IV
Referring to Fig. 5, showing the flow diagram of the shared system of password provided in an embodiment of the present invention.The password
Shared system, be usually mounted in cipher server, the cipher server includes: the server or user terminal in cloud
Smart phone, computer, smartwatch or intelligent glasses etc., are not enumerated one by one herein.
The shared system 500 of the password, comprising: cryptographic libraries 51, encrypting module 52, request module 53, matching module 54,
And transmission module 55.
The cryptographic libraries 51, application program identification code, account name and the password registered for saving user.
The encrypting module 52 for receiving the biological information of user, and passes through the biological information pair of user
The cryptographic libraries are encrypted.
Wherein, the encrypting module 52, comprising: type judging submodule 521, unique encryption submodule 522 and multiple groups
Encrypt submodule 524.
The type judging submodule 521, for judging whether the type number of biological characteristic is greater than 1;
The unique encryption submodule 521, for passing through unique biological information when type number is not more than 1
The cryptographic libraries are encrypted;
The multiple groups encrypt submodule 522, are used for when type number is greater than 1, by each biological information to described
Cryptographic libraries are individually encrypted or combined ciphering.
Wherein, when being combined encryption, further includes: assignment submodule 523, for being carried out for all types of biological characteristics
The assignment of weight, for carrying out query composition after decryption.Such as iris assignment 0.7, fingerprint assignment 0.5.The request module 53 is used
In receiving the inquiry request from terminal device, the inquiry request includes the biological information of user and described using journey
The identification code of sequence.
It is understood that the identification code of the terminal device itself can be also carried in the inquiry request, so that coming from
The echo message of cipher server can feed back to the terminal device.
The matching module 54, for being inquired by the biological nature information and decrypting matched cryptographic libraries.
Specifically, the matching module 54 includes: acquisition submodule 541, matching judgment submodule 542, matching primitives
Submodule 543 and inquiry submodule 544.
Wherein, the acquisition submodule 541, for obtaining the biological information of user.The matching judgment submodule
542, for judging the matching degree of the biological information.The matching primitives submodule 543, for according to each biological characteristic
Weight and matching degree carry out matching primitives.The inquiry submodule 544, for being greater than preset matching threshold when matching result
Shi Jinhang inquiry.
The transmission module 55, the identification code institute for searching the application program in cryptographic libraries after decryption are matched
Account name and password, and it is transmitted to the terminal device.
Wherein, the transmission module 55, is also used to: receiving application program identification code, the account name and close that user is registered
Code, and it is transmitted to the cryptographic libraries 51;The biological information of user is received, and is transmitted to the encrypting module 52;And it connects
The inquiry request from terminal device is received, and is transmitted to the request module 53.Details are not described herein again.
The sharing method of password provided by the invention, by cipher server store user biological information,
The matched account name of the identification code of application program and application program institute and password realize that the password of cross-terminal equipment is total
It enjoys, and quick and safety.
The sharing method of password provided in an embodiment of the present invention and the shared system of password belong to same design, specific real
Existing process is detailed in specification full text, and details are not described herein again.
In conclusion although the present invention has been disclosed above in the preferred embodiment, but above preferred embodiment is not to limit
The system present invention, those skilled in the art can make various changes and profit without departing from the spirit and scope of the present invention
Decorations, therefore protection scope of the present invention subjects to the scope of the claims.
Claims (6)
1. a kind of sharing method of password, be applied in terminal device, which is characterized in that terminal device by communication network with it is close
Code server carries out wireless network connection;Physical characteristics collecting module is embedded in terminal device, and the sharing method includes:
Terminal device extracts the identification code of application program when opening the login interface of application program;
Terminal device acquires each biological information of user by physical characteristics collecting module, and extracts each biology respectively
Biological information of the identification information as user in feature, the biological information include iris information, face information
And finger print information, so that cipher server carries out matching primitives according to the weight and matching degree of each biological characteristic, and when matching knot
Fruit is combined inquiry when being greater than matching threshold, and wherein matching primitives include: the matching degree for calculating separately each biological characteristic, calculates
The product of each matching degree and respective weights;It sums to each product;The matching threshold includes: single creature feature
The matching degree of matching degree or single creature feature is to the open interval of the sum of the matching degree of each biological characteristic;
Terminal device sends inquiry request to cipher server, and the inquiry request includes the identification code of terminal device itself, uses
The identification code of the biological information at family and the application program is matched in the application program to inquire the user
Account name and password, and make account name from cipher server and cipher feedback to the identification code pair of the terminal device
The terminal device answered, the password to realize cross-terminal equipment are shared;
Terminal device receives account name and password from the cipher server;
Judge whether the account name and password are in plain text;
If the account name and password of plaintext, then by the login of the account name of the plaintext and Password Input to the application program
In interface;Or
If the account and password of ciphertext, obtain the rule of encryption and decryption;According to the rule of the encryption and decryption to the ciphertext
Account and password be decrypted, with generate decryption after account name and password;By after decryption account name and Password Input arrive
The login interface of the application program;And
Terminal device is by the account name and Password Input into the login interface of the application program;It include: by backstage
Middle crawl user name and password keyword searches the correspondence window in login interface, and inputs the account name respectively
And password;
If terminal device is not successfully received the account name and password, the account name and password of user's input are received;
The identification code of the application program, the biological information of the user and the account name and password are sent to
The cipher server is registered.
2. sharing method as described in claim 1, which is characterized in that the biological information of the acquisition user, comprising:
Acquire the biological characteristic of user, the biological characteristic further include: palm print information, and/or information of acoustic wave;And
Extract biological information of the identification information in the biological characteristic as user.
3. a kind of sharing method of the password of the sharing method including password as claimed in claim 1 or 2 is applied to password and takes
It is engaged in device, which is characterized in that terminal device carries out wireless network connection by communication network and cipher server;The shared side
Method includes:
Cipher server establishes cryptographic libraries, application program identification code, account name and the password registered for saving user;
Cipher server encrypts the cryptographic libraries by the biological information of user;
Cipher server receives the inquiry request from terminal device, and the inquiry request includes the identification of terminal device itself
The identification code of code, multiple biological informations of user and the application program;The biological information includes multiple and different
The biological information of type;
Cipher server carries out matching primitives according to the weight and matching degree of the multiple biological information, and works as matching result
It is inquired when greater than matching threshold and decrypts matched cryptographic libraries, wherein matching primitives include: for calculating separately each biological characteristic
With degree, the product of each matching degree and respective weights is calculated;It sums to each product;The matching threshold includes: single
The matching degree of the matching degree of biological characteristic or single creature feature is to the open interval of the sum of the matching degree of each biological characteristic;And
The matched account name of identification code institute and password of the application program are searched in the cryptographic libraries of cipher server after decryption,
And according to the identification code of the terminal device itself, matched account name and password are transmitted to the identification code of the terminal device
Corresponding terminal device, the password to realize cross-terminal equipment are shared.
4. a kind of shared system of password, be applied in terminal device, which is characterized in that terminal device by communication network with it is close
Code server carries out wireless network connection;Physical characteristics collecting module is embedded in terminal device, and the shared system includes:
Application program identification module, for extracting the identification code of application program when opening the login interface of application program;
Physical characteristics collecting module for acquiring each biological information of user, and extracts the knowledge in each biological characteristic respectively
Biological information of the other information as user, the biological information include iris information, face information and finger print information,
So that the cipher server carries out matching primitives according to the weight and matching degree of each biological characteristic, and when matching result is greater than institute
Inquiry is combined when stating matching threshold, wherein matching primitives include: the matching degree for calculating separately each biological characteristic, calculate each
Product with degree with respective weights;It sums to each product;The matching threshold includes: the matching of single creature feature
The matching degree of degree or single creature feature is to the open interval of the sum of the matching degree of each biological characteristic;
Enquiry module, for sending inquiry request to cipher server, the inquiry request includes the identification of terminal device itself
The identification code of code, the biological information of user and the application program, to inquire the user in the application program
The matched account name of institute and password, and make account name from cipher server and cipher feedback to the knowledge of the terminal device
The corresponding terminal device of other code, the password to realize cross-terminal equipment are shared;
Receiving module, for receiving account name and password from the cipher server;
Deciphering module is connected between the receiving module and the login module, for judging the account name and password is
It is no be in plain text, and be decrypted when being the account and password of ciphertext, and by after decryption account name and password be transferred to institute
Login module is stated, so that login module is input to the login interface of the application program;
Wherein, the deciphering module includes:
Regular submodule, for obtaining the rule of encryption and decryption;
Submodule is decrypted, for the account and password of the ciphertext to be decrypted according to the rule of the encryption and decryption, with life
At the account name and password after decryption;And
Submodule is transmitted, for the account name after decrypting and password to be transferred to login module;And
Login module, for by the account name and Password Input into the login interface of the application program;Include: by
The correspondence window in user name and password keyword lookup login interface is grabbed in backstage, and inputs the account respectively
Number name and password;
Judging submodule is connected to the receiving module, is properly received the account name and password for judging whether;
Receiving submodule, is used for and when being not successfully received, and passes through account name and password that login module receives user's input;With
And
Submodule is registered, for by the biological information of the identification code of the application program, the user and the account
Name and password are sent to the cipher server and are registered.
5. shared system as claimed in claim 4, which is characterized in that the physical characteristics collecting module includes:
Submodule is acquired, for acquiring the biological characteristic of user, the biological characteristic further include: palm print information, and/or sound wave letter
Breath;And
Extracting sub-module, for extracting biological information of the identification information in the biological characteristic as user.
6. a kind of shared system of the password of the shared system including password as described in claim 4 or 5 is applied to password and takes
It is engaged in device, which is characterized in that terminal device carries out wireless network connection by communication network and cipher server;The shared system
System includes:
Cryptographic libraries, application program identification code, account name and the password registered for saving user;
Encrypting module, for receiving the biological information of user, and by the biological information of user to the cryptographic libraries
It is encrypted;
Request module, for receiving the inquiry request from terminal device, the inquiry request includes terminal device itself
The identification code of identification code, multiple biological informations of user and the application program;The biological information includes multiple
Different types of biological information;
Matching module carries out matching primitives for the weight and matching degree according to the multiple biological information, and when matching
It inquires when being as a result greater than matching threshold and decrypts matched cryptographic libraries, wherein matching primitives include: to calculate separately each biological characteristic
Matching degree, calculate the product of each matching degree and respective weights;It sums to each product;The matching threshold includes:
The matching degree of the matching degree of single creature feature or single creature feature is to the open interval of the sum of the matching degree of each biological characteristic;
And
Transmission module, for searching the identification code matched account name of institute of the application program and close in cryptographic libraries after decryption
Code, and according to the identification code of the terminal device itself, matched account name and password are transmitted to the knowledge of the terminal device
The corresponding terminal device of other code, the password to realize cross-terminal equipment are shared.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510727241.0A CN105227302B (en) | 2015-10-28 | 2015-10-28 | The sharing method of password and the shared system of password |
PCT/CN2016/093754 WO2017071363A1 (en) | 2015-10-28 | 2016-08-05 | Password sharing method, password sharing system, and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510727241.0A CN105227302B (en) | 2015-10-28 | 2015-10-28 | The sharing method of password and the shared system of password |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105227302A CN105227302A (en) | 2016-01-06 |
CN105227302B true CN105227302B (en) | 2019-06-14 |
Family
ID=54996023
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510727241.0A Active CN105227302B (en) | 2015-10-28 | 2015-10-28 | The sharing method of password and the shared system of password |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105227302B (en) |
WO (1) | WO2017071363A1 (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105227302B (en) * | 2015-10-28 | 2019-06-14 | Oppo广东移动通信有限公司 | The sharing method of password and the shared system of password |
CN105915566A (en) * | 2016-07-06 | 2016-08-31 | 杨炳 | Safety system used for real-time account access |
CN106293080A (en) * | 2016-07-29 | 2017-01-04 | 维沃移动通信有限公司 | The method of a kind of user profile process and mobile terminal |
CN106529318B (en) * | 2016-11-21 | 2019-05-28 | Oppo广东移动通信有限公司 | The management method and mobile terminal of account and password |
CN106778178A (en) * | 2016-12-28 | 2017-05-31 | 广东虹勤通讯技术有限公司 | The call method and device of fingerprint business card |
CN107070899A (en) * | 2017-03-22 | 2017-08-18 | 世纪恒通科技股份有限公司 | A kind of account login based on iris recognition |
CN106941506A (en) * | 2017-05-17 | 2017-07-11 | 北京京东尚科信息技术有限公司 | Data processing method and device based on biological characteristic |
CN107181595A (en) * | 2017-07-27 | 2017-09-19 | 深圳市泰衡诺科技有限公司 | A kind of account method for retrieving and device for retrieving based on intelligent terminal |
CN107645495A (en) * | 2017-08-24 | 2018-01-30 | 上海斐讯数据通信技术有限公司 | A kind of wireless network password sharing method and system |
CN109842602A (en) * | 2017-11-29 | 2019-06-04 | 上海荆虹电子科技有限公司 | A kind of device and login method based on biological characteristic validation |
CN108282331A (en) * | 2018-01-02 | 2018-07-13 | 金邦达有限公司 | Cipher processing method, apparatus and system |
CN108647501A (en) * | 2018-05-09 | 2018-10-12 | 平安科技(深圳)有限公司 | Multiple utility program shares password unlocking method, device, equipment and storage medium |
CN111466247B (en) * | 2020-06-22 | 2020-09-22 | 成都信息工程大学 | Catalytic bomb control system and launching method |
CN111766814A (en) * | 2020-07-08 | 2020-10-13 | 王善举 | Forest resource information acquisition terminal |
CN111935816B (en) * | 2020-09-23 | 2021-03-12 | 广州市玄武无线科技股份有限公司 | Application program registration method and device of terminal and electronic equipment |
CN114338058B (en) * | 2020-09-27 | 2023-05-09 | 中国移动通信有限公司研究院 | Information processing method, device and storage medium |
CN113193956B (en) * | 2021-04-27 | 2023-05-12 | 维沃移动通信有限公司 | Account information processing method and device |
CN114973518A (en) * | 2022-04-21 | 2022-08-30 | 杭州小电科技股份有限公司 | Shared charging equipment operation and maintenance method, shared charging equipment, terminal equipment and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101098232A (en) * | 2007-07-12 | 2008-01-02 | 兰州大学 | Dynamic password and multiple biological characteristics combined identification authenticating method |
CN103401907A (en) * | 2013-07-23 | 2013-11-20 | 惠州Tcl移动通信有限公司 | Synchronous processing method and system for login information of application program |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101383704A (en) * | 2008-04-23 | 2009-03-11 | 鲁东大学 | Cipher module based on finger print recognition technology |
CN202502503U (en) * | 2012-01-16 | 2012-10-24 | 青岛理工大学 | Cloud-computing-based fingerprint password management system |
CN104184701A (en) * | 2013-05-21 | 2014-12-03 | 腾讯科技(深圳)有限公司 | Third-party application log-in method, device and terminal |
CN103402203B (en) * | 2013-07-30 | 2017-08-25 | 努比亚技术有限公司 | Fast access method and device based on bio-identification |
CN103685232A (en) * | 2013-11-11 | 2014-03-26 | 上海乐今通信技术有限公司 | Mobile terminal and mobile application login method |
CN105207985A (en) * | 2015-07-29 | 2015-12-30 | 广东欧珀移动通信有限公司 | Application program login method and mobile terminal |
CN105429949B (en) * | 2015-10-28 | 2017-11-28 | 广东欧珀移动通信有限公司 | The method for pushing and supplying system of password |
CN105227302B (en) * | 2015-10-28 | 2019-06-14 | Oppo广东移动通信有限公司 | The sharing method of password and the shared system of password |
-
2015
- 2015-10-28 CN CN201510727241.0A patent/CN105227302B/en active Active
-
2016
- 2016-08-05 WO PCT/CN2016/093754 patent/WO2017071363A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101098232A (en) * | 2007-07-12 | 2008-01-02 | 兰州大学 | Dynamic password and multiple biological characteristics combined identification authenticating method |
CN103401907A (en) * | 2013-07-23 | 2013-11-20 | 惠州Tcl移动通信有限公司 | Synchronous processing method and system for login information of application program |
Also Published As
Publication number | Publication date |
---|---|
CN105227302A (en) | 2016-01-06 |
WO2017071363A1 (en) | 2017-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105227302B (en) | The sharing method of password and the shared system of password | |
US9438412B2 (en) | Computer-implemented system and method for multi-party data function computing using discriminative dimensionality-reducing mappings | |
CN106533669B (en) | The methods, devices and systems of equipment identification | |
JP6180177B2 (en) | Encrypted data inquiry method and system capable of protecting privacy | |
WO2021022717A1 (en) | Method and apparatus for analyzing feature correlation in federated learning, and readable storage medium | |
CN106972927B (en) | Encryption method and system for different security levels | |
CN105429949B (en) | The method for pushing and supplying system of password | |
CN106254324A (en) | A kind of encryption method storing file and device | |
US9197613B2 (en) | Document processing method and system | |
CN106921493B (en) | Encryption method and system | |
CN109766707B (en) | Data processing method, device, equipment and medium based on block chain | |
US20170364691A1 (en) | Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal | |
US20130159695A1 (en) | Document processing method and system | |
CN106911712B (en) | Encryption method and system applied to distributed system | |
US20210234684A1 (en) | Information processing system, information processing method, and information processing apparatus | |
CN102708216A (en) | Word-segmentation organizing method and clustering method for ciphertext search | |
CN104992100A (en) | Iris dynamic encryption and decryption system and method for electronic document flowing | |
JP6557338B2 (en) | Concealed similarity search system and similarity concealment search method | |
CN112231309A (en) | Method, device, terminal equipment and medium for removing duplicate of longitudinal federal data statistics | |
CN108737094B (en) | Domain password security detection method and related equipment | |
CN109815730A (en) | It is a kind of support skyline inquire can search for encryption method and system | |
CN107682303B (en) | System and method for encrypting and inquiring personal sensitive information | |
KR20190077556A (en) | Message transmission system, communication terminal, server device, message transmission method and program | |
CN115525817B (en) | Aggregation query method, system, electronic equipment and computer storage medium | |
CN111414636A (en) | Method, device and equipment for updating recognition model and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: Guangdong OPPO Mobile Communications Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |