CN106789043A - A kind of method for generating cipher code, method of password authentication and relevant apparatus - Google Patents
A kind of method for generating cipher code, method of password authentication and relevant apparatus Download PDFInfo
- Publication number
- CN106789043A CN106789043A CN201710090444.2A CN201710090444A CN106789043A CN 106789043 A CN106789043 A CN 106789043A CN 201710090444 A CN201710090444 A CN 201710090444A CN 106789043 A CN106789043 A CN 106789043A
- Authority
- CN
- China
- Prior art keywords
- password
- key
- server
- user
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of method for generating cipher code, method of password authentication and relevant apparatus, can determine that user's server to be accessed, and the identification information of the server and the key of user input can be obtained, and, can be based on default operation rule, according to the key and the identification information, computing generates the login password for logging in the server.Compared to prior art, in embodiments of the present invention, the login password for ultimately generating is to carry out corresponding computing according to the identification information of the simple key of user input and the user server to be accessed to obtain, simple key than user input is increasingly complex, thus with security and uniqueness higher;And, user can only be input into the simple key of easy memory, and then also ensure the convenience and high efficiency of login service device in login service device.
Description
Technical field
The present invention relates to field of encryption, more particularly to a kind of method for generating cipher code, method of password authentication and relevant apparatus.
Background technology
At present, during APP (Application, application program) of the user in registration terminal equipment, it is often necessary to which input is used
Name in an account book and login password, due to being usually mounted with multiple APP on terminal device, in order to ensure the safety of information in terminal device
Property, user generally also needs to set multiple login passwords, and so, user is in the multiple login passwords of memory, it is easy to produce
Raw mixed meat and fish dishes.Therefore, user generally prefers that and the login password of conventional APP is arranged to unanimously, so can not only be beneficial to memory, also
Can the corresponding login efficiency of lifting.But, in this case, as long as the login password for having an APP is stolen, it is possible to lose
Lose all information in terminal device.
That is, there is relatively low security or convenience and less efficient in existing method for generating cipher code.
The content of the invention
A kind of method for generating cipher code, method of password authentication and relevant apparatus are the embodiment of the invention provides, is used to solve now
Security existing for some method for generating cipher code is relatively low or convenience and less efficient problem.
A kind of method for generating cipher code is the embodiment of the invention provides, including:
Determine user's server to be accessed;
Obtain the identification information of the server and the key of user input;
Based on default operation rule, according to the key and the identification information, computing is generated for logging in the clothes
The login password of business device.
A kind of method of password authentication is the embodiment of the invention provides, including:
Obtain the key of user input;
Based on default operation rule, according to the key and the identification information of the user server to be accessed,
Computing generates the login password for logging in the server;
If it is determined that the login password is default login password, then it is proved to be successful.
A kind of password generating apparatus are the embodiment of the invention provides, including:
Determining module, for determining user's server to be accessed;
Acquisition module, for obtaining the identification information of the server and the key of user input;
Secret generation module, for based on default operation rule, according to the key and the identification information, computing life
Into the login password for logging in the server.
A kind of password authentication device is the embodiment of the invention provides, including:
Acquiring unit, the key for obtaining user input;
Password generation unit, for based on default operation rule, to be accessed according to the key and the user
The identification information of server, computing generates the login password for logging in the server;
Authentication unit, for if it is determined that the login password is then proved to be successful to preset login password.
The present invention has the beneficial effect that:
The embodiment of the invention provides a kind of method for generating cipher code, method of password authentication and relevant apparatus, it may be determined that user
The server to be accessed, and the identification information of the server and the key of user input can be obtained, and, can be based on pre-
If operation rule, according to the key and the identification information, computing generates the login password for logging in the server.
Compared to prior art, in embodiments of the present invention, the login password for ultimately generating be according to the simple key of user input and
The identification information of user's server to be accessed carries out what corresponding computing was obtained, and the simple key than user input is more multiple
It is miscellaneous, thus with security and uniqueness higher;And, user can only be input into the letter of easy memory in login service device
Single key, and then also ensure the convenience and high efficiency of login service device.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for embodiment description
Accompanying drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill in field, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 show a kind of schematic flow sheet of the method for generating cipher code provided in the embodiment of the present invention one;
Fig. 2 show a kind of actual flow chart of the method for generating cipher code provided in the embodiment of the present invention one;
Fig. 3 show a kind of structural representation of the password generating apparatus provided in the embodiment of the present invention two;
Fig. 4 show a kind of schematic flow sheet of the method for password authentication provided in the embodiment of the present invention three;
Fig. 5 show a kind of structural representation of the password authentication device provided in the embodiment of the present invention four.
Specific embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made into
One step ground is described in detail, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole implementation
Example.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made
All other embodiment, belongs to the scope of protection of the invention.
Embodiment one:
In order to solve relatively low security existing for existing method for generating cipher code or convenience and less efficient ask
Topic, the embodiment of the present invention one provides a kind of method for generating cipher code, as shown in figure 1, it is described in the embodiment of the present invention one
The schematic flow sheet of method for generating cipher code.Specifically, as shown in Figure 1, the method for generating cipher code may include following steps:
Step 101:Determine user's server to be accessed;
Step 102:Obtain the identification information of the server and the key of user input;
Step 103:Based on default operation rule, according to the key and the identification information, computing is generated for stepping on
Record the login password of the server.
, wherein it is desired to explanation, the default operation rule can flexibly be set according to the actual requirements, as long as ensure that
The security of the login password that computing is obtained is higher, and the embodiment of the present invention is not limited in any way to this.
That is, in embodiments of the present invention, it may be determined that user's server to be accessed, and the service can be obtained
The identification information of device and the key of user input, and, can be based on default operation rule, according to the key and the mark
Knowledge information, computing generates the login password for logging in the server.Compared to prior art, in embodiments of the present invention,
The login password for ultimately generating is entered according to the identification information of the simple key of user input and the user server to be accessed
The corresponding computing of row is obtained, and the simple key than user input is increasingly complex, thus with security higher and unique
Property;And, user can only be input into the simple key of easy memory, and then also ensure login service device in login service device
Convenience and high efficiency.So as to improve security, convenience and the login efficiency of login password, this is not repeated.
It should be noted that the executive agent of the method for generating cipher code described in the embodiment of the present invention generally can be corresponding
Password generating apparatus, the password generating apparatus can be used as an integrating device and be integrated in the terminal device, can also make
It is a self-contained unit independently of the terminal device.In addition, when the password generating apparatus are integrating device, the password life
Into the device concretely interior safety box such as terminal device, for intercepting the input method on terminal device, and then know that user is defeated
The key for entering, does not repeat this.
Furthermore, it is necessary to explanation, the server described in the embodiment of the present invention at least may include can be installed in corresponding
On terminal device and need user input key log in APP (Application, application program), such as can be QQ, mailbox, patch
, forum, wechat, microblogging and Alipay etc., the embodiment of the present invention is not limited in any way to this.
Alternatively, the identification information at least may include any one or more in title, version number, sequence number.When
So, the identification information can also be the information such as login account, user's pet name, or, the identification information is alternatively according to above-mentioned
The other information that information is converted to, if can server described in unique mark, this is not construed as limiting.
For example, it is assumed that user's server to be accessed be QQ, then the identification information of QQ at least can for " QQ " (i.e. title),
" 8.7.19113.0 " (i.e. version number), " 5A421GH1D5GB3 " (i.e. sequence number) etc., certainly, the identification information of QQ can also be
" 532147745 " (i.e. login account), " amusing moonlight " (i.e. pet name) etc.;
Again for example, it is assumed that user's server to be accessed is 163 mailboxes, then the identification information of 163 mailboxes at least can be
" 163 mailbox " (i.e. title), " 163Email " (i.e. title), " 5.0 " (i.e. version number), " 52A1D0W332101 " (i.e. sequence
Number) etc., certainly, the identification information of 163 mailboxes can also be " ABCD " (i.e. login account), " giggle cry of surprise " (i.e. the pet name) etc.;
Again for example, it is assumed that user's server to be accessed is Baidu's mhkc, then the identification information of Baidu's mhkc at least may be used
It is " 15623125485 " (i.e. title), " 7.3.4 " (i.e. version number), " 12W6F13GM " (i.e. sequence number), certainly, Baidu's mhkc
Identification information can also be for " aa " (i.e. login account), " small A " (i.e. pet name) etc., the embodiment of the present invention is not repeated this.
Preferably, the key at least may include any one or more in password, fingerprint, iris and face.When
So, it is necessary to explanation, the key can be also pattern etc., and the embodiment of the present invention is not limited in any way to this.
As shown in the above, the password generating apparatus described in the embodiment of the present invention can according to the key of user input with
And identification information, the login password for logging in respective server is obtained, password " 123456 " kimonos such as according to user input
The identification information " Sina weibo " of business device obtains login password " 34X56L78 ", or according to the password " 123456 " of user input
Login password " 98W7654X " is obtained with the identification information " wechat " of server, or according to the password " 123456 " of user input
Identification information " Baidu's mhkc " with server obtains login password " 64B4D8TB0 " etc..So, user needs memory
Key can be only simply " 123456 ", the login password of actual synthesis but can for " 34X56L78 ", " 98W7654X " and
" 64B4D8TB0 " etc., so as to ensure that the convenience and high efficiency of login service device, it is therefore prevented that hacker robs and takes user input
Key can invade the risk in terminal device, and this is not repeated.
It should be noted that when the key of user input is for fingerprint, iris or face etc., the login password also may be used
Fingerprint including user input and the combination of the identification information, the combination of the iris of user input and the identification information or
The combination of the face of user input and the identification information, the embodiment of the present invention is not limited in any way to this.
Below, citing is introduced the specific steps of the method for generating cipher code described in the embodiment of the present invention in detail
(as shown in Figure 2):
S1, determine user's server to be accessed.
For example, it is assumed that the user APP to be logged in is wechat, then can determine that user's server to be accessed is wechat;
Assuming that the user APP to be logged in is QQ, then can determine that user's server to be accessed is QQ;Assuming that what user to be logged in
APP is Alipay, then can determine that user's server to be accessed, for Alipay, is not repeated this.
S2, the identification information for determining the server.
So that user's server to be accessed is as wechat as an example, the identification information of the server can for " wechat ",
" WeChat " etc., is not construed as limiting to this.
S3, determine user for the server input key.
Still so that user's server to be accessed is as wechat as an example, it is assumed that in password box of the user in wechat login page
123456 are have input, then the input method of terminal device can be intercepted by the safety box in password generating apparatus, so that it is determined that user
The information of input, and then determine the key of user input, i.e., " 123456 ".
S4, computing generation login password.
It is the mark that the key of " wechat ", user input is " 123456 ", wechat still with user's server to be accessed
Information is for as a example by " WeChat ", it is assumed that the operation rule for computing generation login password is permutation and combination principle, then can basis
The key and the identification information, computing generate corresponding login password, such as the key can be placed on into the mark
Before information, generate login password " 123456WeChat ", the key is placed on after the identification information, generation is logged in
Password " WeChat123456 ", by the key intersect be placed on the identification information before, generate login password
" 1W2e3C4h5a6t " and key intersection is placed on after the identification information, generates login password
“W1e2C3h4a5t6”;
Further, it is assumed that the operation rule for computing generation login password is summation principle, then can be according to described close
Key and the identification information, computing generate corresponding login password, as that can calculate the key and the identification information
ASCII (American Standard Code for Information Interchange, ASCII American Standard Code for Information Interchange generation
Code), and ASCII to the key and the identification information calculates, and the information that will be calculated is used as corresponding
Login password, by taking hexadecimal ASCII as an example, due to the ASCII of " 1 ", " 2 ", " 3 ", " 4 ", " 5 " and " 6 " be respectively " 31 ",
" 32 ", " 33 ", " 34 ", " 35 " and " 36 ", the ASCII of " W ", " e ", " C ", " h ", " a " and " t " be respectively " 57 ", " 65 ",
" 43 ", " 68 ", " 61 " and " 74 ", then can generate login password " 889777029710 ";Certainly, it is necessary to explanation, is used for
The operation rule of computing generation login password can be also Else Rule, such as can be to ask poor principle, quadrature principle and seek business's principle,
Certainly, or other principles for combining of any of the above principle, as long as ensure that the uniqueness of the login password for drawing
And complexity such that it is able to lift the security of user profile.
The embodiment of the present invention one provides a kind of method for generating cipher code, it may be determined that user's server to be accessed, and can
The identification information of the server and the key of user input are obtained, and, can be based on default operation rule, according to described close
Key and the identification information, computing generate the login password for logging in the server.Compared to prior art, in this hair
In bright embodiment, the login password for ultimately generating is according to the simple key of user input and the user server to be accessed
Identification information carries out what corresponding computing was obtained, and the simple key than user input is increasingly complex, thus with safety higher
Property and uniqueness;And, user can only be input into the simple key of easy memory in login service device, and then also ensure and step on
Record the convenience and high efficiency of server.
Embodiment two:
Based on the identical inventive concept of the embodiment of the present invention one, the embodiment of the present invention two provide a kind of password generate dress
Put, as shown in figure 3, it is the structural representation of the password generating apparatus described in the embodiment of the present invention two.From the figure 3, it may be seen that institute
Stating password generating apparatus may include:
Determining module 31, can be used to determine user's server to be accessed;
Acquisition module 32, can be used to obtain the identification information of the server and the key of user input;
Secret generation module 33, can be used for based on default operation rule, according to the key and the identification information, fortune
Generation is calculated for logging in the login password of the server.
That is, in embodiments of the present invention, it may include for determining user's server to be accessed cover half really
The acquisition module of the key of block, the identification information for obtaining the server and user input and for based on default
Operation rule, according to the key and the identification information, computing generates the login password for logging in the server
Secret generation module.Compared to prior art, in embodiments of the present invention, the login password for ultimately generating is according to user input
Simple key and the identification information of user's server to be accessed carry out what corresponding computing was obtained, than the letter of user input
Single key is increasingly complex, thus with security and uniqueness higher;And, user can only be input into login service device
The simple key easily remembered, and then also ensure the convenience and high efficiency of login service device.
Alternatively, the identification information at least may include any one or more in title, version number, sequence number.
Preferably, the key at least may include any one or more in password, fingerprint, iris and face.
The embodiment of the present invention two provides a kind of password generating apparatus, it may include for determining user's service to be accessed
Acquisition module, the Yi Jiyong of the key of the determining module of device, the identification information for obtaining the server and user input
In based on default operation rule, according to the key and the identification information, computing is generated for logging in the server
The secret generation module of login password.Compared to prior art, in embodiments of the present invention, the login password for ultimately generating is root
Carry out what corresponding computing was obtained according to the identification information of simple key and the user server to be accessed of user input, than with
The simple key of family input is increasingly complex, thus with security and uniqueness higher;And, user is in login service device
When, the simple key of easy memory can be only input into, and then also ensure the convenience and high efficiency of login service device.
Embodiment three:
A kind of method of password authentication is provided in the embodiment of the present invention three, as shown in figure 4, during it is the embodiment of the present invention three
The schematic flow sheet of the method for password authentication of offer.Specifically, as shown in Figure 4, the method for password authentication may include following step
Suddenly:
Step 401:Obtain the key of user input;
Step 402:Based on default operation rule, according to the key and the mark of the user server to be accessed
Knowledge information, computing generates the login password for logging in the server;
Step 403:If it is determined that the login password is default login password, then it is proved to be successful.
Wherein, the default login password is the identification information of the key and server being input into first according to user
Computing generation.And, the default login password can generally be stored in corresponding password authentication device (institute in the embodiment of the present invention
The executive agent of the method for password authentication stated) in, or can be stored in the server corresponding with the password authentication device,
This is not repeated.
That is, in the embodiment of the present invention, the key of user input can be obtained, and can be based on default operation rule, root
According to the key and the identification information of the user server to be accessed, computing is generated for logging in the server
Login password, and if it is determined that the login password is then proved to be successful to preset login password.Compared to prior art, at this
In inventive embodiments, user can only be input into simple key in login service device, and this allows for user and easily remembers described close
Key, and then also ensure the convenience and high efficiency of login service device;And, the login password for ultimately generating is defeated according to user
The identification information of simple key and the user server to be accessed for entering carries out what corresponding computing was obtained, than user input
Simple key is increasingly complex, thus with security and uniqueness higher.
It should be noted that the password authentication device can be used as an integrating device is integrated in what user to be accessed
In server, this can also not repeated as a self-contained unit independently of the server.
Further, the method for password authentication may also include:
If it is determined that the login password is not the default login password, then authentication failed.
It should be noted that when it is determined that the login password is not the default login password, the password authentification dress
Put can also issue the prompt message that user's instruction user re-enters key to corresponding terminal device, and this is not repeated.
The embodiment of the present invention three provides a kind of method of password authentication, can obtain the key of user input, and can be based on pre-
If operation rule, according to the key and the identification information of the user server to be accessed, computing is generated for stepping on
The login password of the server is recorded, and if it is determined that the login password is then proved to be successful to preset login password.Compared to
Prior art, in embodiments of the present invention, user can only be input into simple key in login service device, and this allows for user's appearance
Easily remember the key, and then also ensure the convenience and high efficiency of login service device;And, the login password for ultimately generating
It is to carry out corresponding computing according to the identification information of the simple key of user input and the user server to be accessed to obtain,
Simple key than user input is increasingly complex, thus with security and uniqueness higher.
Example IV:
Based on the identical inventive concept of the embodiment of the present invention three, the embodiment of the present invention four there is provided a kind of password authentification fill
Put, as shown in figure 5, it is the structural representation of the password authentication device described in the embodiment of the present invention four.Specifically, by Fig. 5
Understand, the password authentication device may include:
Acquiring unit 51, can be used to obtain the key of user input;
Password generation unit 52, can be used to, based on default operation rule, be visited according to the key and the user
The identification information of the server asked, computing generates the login password for logging in the server;
Authentication unit 53, can be used for if it is determined that the login password is then proved to be successful to preset login password.
That is, in embodiments of the present invention, it may include for obtaining the acquiring unit of the key of user input, being used for
Based on default operation rule, according to the key and the identification information of the user server to be accessed, computing generation
Password generation unit for logging in the login password of the server, and, for if it is determined that the login password is default
Login password, the then authentication unit being proved to be successful.Compared to prior art, in embodiments of the present invention, user is in login service
During device, simple key can be only input into, this allows for user and easily remembers the key, and then also ensures login service device just
Profit and high efficiency;And, the login password for ultimately generating is accessed according to the simple key of user input and user
The identification information of server carries out what corresponding computing was obtained, and the simple key than user input is increasingly complex, thus with more
Security and uniqueness high.
Further, the authentication unit 43, it may also be used for if it is determined that the login password is not for the default login is close
Code, then authentication failed.
It should be noted that when it is determined that the login password is not the default login password, the authentication unit 43
Also the prompt message that user's instruction user re-enters key can be issued to corresponding terminal device, this is not repeated.
The embodiment of the present invention four provides a kind of password authentication device, it may include the key for obtaining user input is obtained
Take unit, for based on default operation rule, the mark letter according to the key and the user server to be accessed
Breath, computing generates the password generation unit of the login password for logging in the server, and, for if it is determined that the login
Password is default login password, the then authentication unit being proved to be successful.Compared to prior art, in embodiments of the present invention, user
In login service device, simple key can be only input into, this allows for user and easily remembers the key, and then also ensures login
The convenience and high efficiency of server;And, the login password for ultimately generating is the simple key and user according to user input
The identification information of the server to be accessed carries out what corresponding computing was obtained, and the simple key than user input is increasingly complex,
Thus there is security and uniqueness higher.
It will be understood by those skilled in the art that embodiments of the invention can be provided as method, device (equipment) or computer journey
Sequence product.Therefore, in terms of the present invention can be using complete hardware embodiment, complete software embodiment or combination software and hardware
The form of embodiment.And, the present invention can be used and wherein include the calculating of computer usable program code at one or more
The computer program implemented in machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow chart with reference to method according to embodiments of the present invention, device (equipment) and computer program product
And/or block diagram is described.It should be understood that each flow during flow chart and/or block diagram can be realized by computer program instructions
And/or the combination of the flow and/or square frame in square frame and flow chart and/or block diagram.These computer programs can be provided to refer to
The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is made to produce
One machine so that produced for realizing by the instruction of computer or the computing device of other programmable data processing devices
The device of the function of being specified in one flow of flow chart or multiple one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing devices with spy
In determining the computer-readable memory that mode works so that instruction of the storage in the computer-readable memory is produced and include finger
Make the manufacture of device, the command device realize in one flow of flow chart or multiple one square frame of flow and/or block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented treatment, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been described
Property concept, then can make other change and modification to these embodiments.So, appended claims are intended to be construed to include excellent
Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out various changes and modification without deviating from essence of the invention to the present invention
God and scope.So, if these modifications of the invention and modification belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising these changes and modification.
Claims (10)
1. a kind of method for generating cipher code, it is characterised in that including:
Determine user's server to be accessed;
Obtain the identification information of the server and the key of user input;
Based on default operation rule, according to the key and the identification information, computing is generated for logging in the server
Login password.
2. method for generating cipher code as claimed in claim 1, it is characterised in that the identification information at least includes title, version
Number, any one or more in sequence number.
3. method for generating cipher code as claimed in claim 1, it is characterised in that the key at least includes password, fingerprint, iris
And any one or more in face.
4. a kind of method of password authentication, it is characterised in that including:
Obtain the key of user input;
Based on default operation rule, according to the key and the identification information of the user server to be accessed, computing
Generate the login password for logging in the server;
If it is determined that the login password is default login password, then it is proved to be successful.
5. method of password authentication as claimed in claim 4, it is characterised in that the method for password authentication also includes:
If it is determined that the login password is not the default login password, then authentication failed.
6. a kind of password generating apparatus, it is characterised in that including:
Determining module, for determining user's server to be accessed;
Acquisition module, for obtaining the identification information of the server and the key of user input;
Secret generation module, for based on default operation rule, according to the key and the identification information, computing generation is used
In the login password for logging in the server.
7. password generating apparatus as claimed in claim 6, it is characterised in that the identification information at least includes title, version
Number, any one or more in sequence number.
8. password generating apparatus as claimed in claim 6, it is characterised in that the key at least includes password, fingerprint, iris
And any one or more in face.
9. a kind of password authentication device, it is characterised in that including:
Acquiring unit, the key for obtaining user input;
Password generation unit, for based on default operation rule, according to the key and the user service to be accessed
The identification information of device, computing generates the login password for logging in the server;
Authentication unit, for if it is determined that the login password is then proved to be successful to preset login password.
10. a kind of password authentication device, it is characterised in that
The authentication unit, is additionally operable to if it is determined that the login password is for the default login password, then authentication failed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710090444.2A CN106789043A (en) | 2017-02-20 | 2017-02-20 | A kind of method for generating cipher code, method of password authentication and relevant apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710090444.2A CN106789043A (en) | 2017-02-20 | 2017-02-20 | A kind of method for generating cipher code, method of password authentication and relevant apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106789043A true CN106789043A (en) | 2017-05-31 |
Family
ID=58958204
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710090444.2A Withdrawn CN106789043A (en) | 2017-02-20 | 2017-02-20 | A kind of method for generating cipher code, method of password authentication and relevant apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106789043A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109753787A (en) * | 2019-01-21 | 2019-05-14 | 山西晟视汇智科技有限公司 | A kind of equipment login password with uniqueness generates and management method, device, system, storage equipment and terminal |
CN110719257A (en) * | 2019-09-06 | 2020-01-21 | 平安国际智慧城市科技股份有限公司 | Method, device and equipment for managing authority of single-page application and storage medium |
CN111541550A (en) * | 2020-05-11 | 2020-08-14 | 卡瓦科尔牙科医疗器械(苏州)有限公司 | Secret key generation method of dental medical information system |
CN111709000A (en) * | 2020-06-03 | 2020-09-25 | 中科九度(北京)空间信息技术有限责任公司 | Encryption and decryption method based on multi-biological-feature fusion and application |
CN112100611A (en) * | 2020-08-14 | 2020-12-18 | 广州江南科友科技股份有限公司 | Password generation method and device, storage medium and computer equipment |
CN112784316A (en) * | 2020-09-07 | 2021-05-11 | 青岛经济技术开发区海尔热水器有限公司 | Electric appliance, electric appliance management method, device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932345A (en) * | 2012-10-26 | 2013-02-13 | 山东中创软件商用中间件股份有限公司 | Method, device and system for information transmission |
CN102984260A (en) * | 2012-11-29 | 2013-03-20 | 胡浩 | Internet account number and password information management method and system |
US20150326397A1 (en) * | 2012-05-25 | 2015-11-12 | Kabushiki Kaisha Toshiba | Host device and authentication method for host device |
CN105933353A (en) * | 2016-07-05 | 2016-09-07 | 北京万维星辰科技有限公司 | Method and system for realizing secure login |
CN106034123A (en) * | 2015-03-17 | 2016-10-19 | 中国移动通信集团湖北有限公司 | Authentication method, application system server and client |
-
2017
- 2017-02-20 CN CN201710090444.2A patent/CN106789043A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150326397A1 (en) * | 2012-05-25 | 2015-11-12 | Kabushiki Kaisha Toshiba | Host device and authentication method for host device |
CN102932345A (en) * | 2012-10-26 | 2013-02-13 | 山东中创软件商用中间件股份有限公司 | Method, device and system for information transmission |
CN102984260A (en) * | 2012-11-29 | 2013-03-20 | 胡浩 | Internet account number and password information management method and system |
CN106034123A (en) * | 2015-03-17 | 2016-10-19 | 中国移动通信集团湖北有限公司 | Authentication method, application system server and client |
CN105933353A (en) * | 2016-07-05 | 2016-09-07 | 北京万维星辰科技有限公司 | Method and system for realizing secure login |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109753787A (en) * | 2019-01-21 | 2019-05-14 | 山西晟视汇智科技有限公司 | A kind of equipment login password with uniqueness generates and management method, device, system, storage equipment and terminal |
CN110719257A (en) * | 2019-09-06 | 2020-01-21 | 平安国际智慧城市科技股份有限公司 | Method, device and equipment for managing authority of single-page application and storage medium |
CN111541550A (en) * | 2020-05-11 | 2020-08-14 | 卡瓦科尔牙科医疗器械(苏州)有限公司 | Secret key generation method of dental medical information system |
CN111709000A (en) * | 2020-06-03 | 2020-09-25 | 中科九度(北京)空间信息技术有限责任公司 | Encryption and decryption method based on multi-biological-feature fusion and application |
CN112100611A (en) * | 2020-08-14 | 2020-12-18 | 广州江南科友科技股份有限公司 | Password generation method and device, storage medium and computer equipment |
CN112784316A (en) * | 2020-09-07 | 2021-05-11 | 青岛经济技术开发区海尔热水器有限公司 | Electric appliance, electric appliance management method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106789043A (en) | A kind of method for generating cipher code, method of password authentication and relevant apparatus | |
EP3123692B1 (en) | Techniques to operate a service with machine generated authentication tokens | |
US10225245B2 (en) | Identity infrastructure as a service | |
US9413735B1 (en) | Managing distribution and retrieval of security key fragments among proxy storage devices | |
CN105812350B (en) | Cross-platform single sign-on system | |
JP2017510013A (en) | Techniques for providing network security with just-in-time provisioned accounts | |
CN105577835B (en) | Cross-platform single sign-on system based on cloud computing | |
US11140173B2 (en) | System and method for secure access control | |
US11068570B1 (en) | Authentication using third-party data | |
Bakar et al. | Adaptive authentication based on analysis of user behavior | |
CN109829333A (en) | A kind of key message guard method and system based on OpenID | |
CN108632241A (en) | A kind of multi-application system unified login method and apparatus | |
CN106790243A (en) | A kind of password remapping method of safe U disc | |
CN106295384B (en) | Big data platform access control method and device and authentication server | |
CN106529216B (en) | Software authorization system and software authorization method based on public storage platform | |
CN101464892A (en) | Login method and device for dynamic database | |
CN116346415A (en) | Multi-factor login authentication method and device for industrial control PLC system and PLC system | |
Nabi et al. | Cybersecurity Mechanism and User Authentication Security Methods | |
CN107547569A (en) | A kind of log-on message management method and device | |
CN114238925A (en) | Aggregation authentication method of non-mutual trust heterogeneous system based on JWT token | |
CN113794571A (en) | Authentication method, device and medium based on dynamic password | |
EP2763346B1 (en) | Mutual anti-piracy authentication system in smartphone-type software tokens and in the sms thereof | |
CN107360181A (en) | A kind of data encryption system and method based on id password | |
US11736940B2 (en) | L8p8 secure transmission system and method | |
Zapata et al. | Testing and Securing Android Studio Applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170531 |