CN107895105A - A kind of cipher processing method, terminal device and computer-readable recording medium - Google Patents

A kind of cipher processing method, terminal device and computer-readable recording medium Download PDF

Info

Publication number
CN107895105A
CN107895105A CN201711069097.1A CN201711069097A CN107895105A CN 107895105 A CN107895105 A CN 107895105A CN 201711069097 A CN201711069097 A CN 201711069097A CN 107895105 A CN107895105 A CN 107895105A
Authority
CN
China
Prior art keywords
password
cipher processing
processing rule
initial
length
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711069097.1A
Other languages
Chinese (zh)
Other versions
CN107895105B (en
Inventor
龚敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711069097.1A priority Critical patent/CN107895105B/en
Publication of CN107895105A publication Critical patent/CN107895105A/en
Application granted granted Critical
Publication of CN107895105B publication Critical patent/CN107895105B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application is applied to field of information security technology, there is provided a kind of cipher processing method, terminal device and computer-readable recording medium, including:After the input that user completes first password is detected, the first password is obtained, the first password is to carry out the password after the first processing to initial password by default Cipher Processing rule;Obtain the Cipher Processing rule;Second processing is carried out to the first password based on the Cipher Processing rule and obtains the initial password, and using the initial password as final checking password.By the application, can solve the problems, such as Current Password be easily stolen, security it is low.

Description

A kind of cipher processing method, terminal device and computer-readable recording medium
Technical field
The application belongs to field of information security technology, more particularly to a kind of cipher processing method, terminal device and computer Readable storage medium storing program for executing.
Background technology
With the high speed development of internet, various applications are arisen at the historic moment.Wherein, some are related to individual privacy or personal wealth Producing the application of safety, either website fashionable needs user to input password to ensure the personal information of user or individual opening or enter The safety of people's property.
However, the mode of existing Password Input is all in the memory based checking Password Input password candidate frame of user, The checking password is uploaded to the server of application to be logged in or webpage to verify whether the checking password of input is correct again. During user's input validation password, it is easy to peep or steal the checking password by other people.Therefore, it is existing The method of some Password Inputs is easily stolen, security is low.
The content of the invention
In view of this, the embodiment of the present application provides a kind of cipher processing method, terminal device and computer-readable storage Medium, with solve the problems, such as Current Password be easily stolen, security it is low.
The first aspect of the embodiment of the present application provides a kind of processing method of password, including:
After the input that user completes first password is detected, the first password is obtained, the first password is to pass through Default Cipher Processing rule carries out the password after the first processing to initial password;
Obtain the Cipher Processing rule;
Second processing is carried out to the first password based on the Cipher Processing rule and obtains the initial password, and by institute Initial password is stated as final checking password.
The second aspect of the embodiment of the present application provides a kind of terminal device, including:
First password acquisition module, for after the input that user completes first password is detected, it is close to obtain described first Code, the first password are to carry out the password after the first processing to initial password by default Cipher Processing rule
Cipher Processing rule acquisition module, for obtaining the Cipher Processing rule;
Initial password generation module, obtained for carrying out second processing to the first password based on the Cipher Processing rule The initial password is obtained, and using the initial password as final checking password.
The third aspect of the embodiment of the present application provides a kind of terminal device, including memory, processor and is stored in In the memory and the computer program that can run on the processor, described in the computing device during computer program The step of realizing the methods described that the embodiment of the present application first aspect provides.
The fourth aspect of the embodiment of the present application provides a kind of computer-readable recording medium, the computer-readable storage Media storage has computer program, and the computer program realizes the embodiment of the present application when being executed by one or more processors On the one hand the step of methods described provided.
5th aspect of the embodiment of the present application provides a kind of computer program product, and the computer program product includes Computer program, the computer program realize that the embodiment of the present application first aspect provides when being executed by one or more processors Methods described the step of.
The embodiment of the present application obtains the first password after the input that user completes first password is detected, and described the One password is to carry out the password after the first processing to initial password by default Cipher Processing rule;Obtain the Cipher Processing Rule;Second processing is carried out to the first password based on the Cipher Processing rule and obtains the initial password, and by described in Initial password is as final checking password.Because the first password of user's input is not real checking password, so, i.e., Make user during first password is inputted, the first password that other people peep user's input also can not be according to described first Password completes the operation such as login or payment, improves the security of password.
Brief description of the drawings
, below will be to embodiment or description of the prior art in order to illustrate more clearly of the technical scheme in the embodiment of the present application In the required accompanying drawing used be briefly described, it should be apparent that, drawings in the following description are only some of the application Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these Accompanying drawing obtains other accompanying drawings.
Fig. 1 is a kind of implementation process schematic diagram for cipher processing method that the embodiment of the application one provides;
Fig. 2 is a kind of implementation process schematic diagram for cipher processing method that the another embodiment of the application provides;
Fig. 3 is the schematic block diagram for the terminal device that the embodiment of the application one provides;
Fig. 4 is the schematic block diagram for the terminal device that the another embodiment of the application provides.
Embodiment
In describing below, in order to illustrate rather than in order to limit, it is proposed that such as tool of particular system structure, technology etc Body details, thoroughly to understand the embodiment of the present application.However, it will be clear to one skilled in the art that there is no these specific The application can also be realized in the other embodiments of details.In other situations, omit to well-known system, device, electricity Road and the detailed description of method, in case unnecessary details hinders the description of the present application.
It should be appreciated that ought be in this specification and in the appended claims in use, special described by the instruction of term " comprising " Sign, entirety, step, operation, the presence of element and/or component, but be not precluded from one or more of the other feature, entirety, step, Operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this present specification is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the application.As used in present specification and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to illustrate technical scheme described herein, illustrated below by specific embodiment.
Fig. 1 is the implementation process schematic diagram for the cipher processing method that the embodiment of the application one provides, as shown in the figure this method It may comprise steps of:
Step S101, after the input that user completes first password is detected, the first password is obtained, described first is close Code is to carry out the password after the first processing to initial password by default Cipher Processing rule.
In the embodiment of the present application, user needs to input password when the operation such as being logged in or paid, it will usually ejects Password Input frame, user input password in Password Input frame.And detect that user completes the input of password, can detect ACK button, login button, payment button on user's click visualization interface etc., can also be Password Input in the scheduled time The movement of cursor is not detected in frame.Certainly in actual applications, other detection modes can also be set, to detect user Whether the input of first password is completed.
The first password is not really to be used for verifying whether user has permission to access or have permission the password of payment.I.e. The first password is not to be sent to wait to log in application or pay the checking that the server applied is used for verifying user identity Password.As an example, user sets the login password of an application, and we can be referred to as initial password, and initial password is exactly The server for being sent to the application is needed to be used for verifying whether user has permission to access the checking password of the application.And described first Password is obtained according to the initial password.Cipher Processing rule can be pre-set, it is right based on the Cipher Processing rule The password that initial password obtained after the first processing is exactly first password.The password that user inputs in Password Input frame is not It is initial password, but first password.
Step S102, obtain the Cipher Processing rule.
In the embodiment of the present application, the Cipher Processing rule can be user set in advance it is a kind of to password at The algorithm of reason, can be by a Cipher Processing into another password by the algorithm.
As one of embodiment, the Cipher Processing rule is made up of at least one zero Arabic numerals of being more than, And the numeral in the Cipher Processing rule differs.
Certainly, in actual applications, other Cipher Processing rules can also be set.
Step S103, it is described initial close that second processing acquisition is carried out to the first password based on the Cipher Processing rule Code, and using the initial password as final checking password.
In the embodiment of the present application, after first password and Cipher Processing rule is obtained, it is possible to based on described close Code processing rule carries out second processing to the first password and obtains the initial password.And the initial password obtained is exactly user The final checking password set, for carrying out login authentication, payment verification etc..
First processing procedure is that the process that processing obtains first password is carried out to initial password, the second processing mistake Journey is that the process that processing obtains initial password is carried out to first password, it is seen that the first processing procedure is complete with second processing process Opposite process.
It should be noted that the password that the embodiment of the present application simply schematically illustrates user's input is to be based on default Cipher Processing Rule carries out the password after the first processing to initial password.Certainly, user in actual applications, can also set to directly input and test Demonstrate,prove password.Can show two buttons in user interface, one of button indication need to user in Password Input frame it is defeated The password entered carries out second processing to obtain checking password, that is, the method for the embodiment of the present application, and another button indication is used The password of family input is exactly to verify password, it is not necessary to and the password inputted to user in Password Input frame carries out second processing, and Server is sent to be verified.User can select either to set any login or the means of payment in advance.
The embodiment of the present application is to carry out first according to default Cipher Processing rule by the initial password set to user First password is obtained after processing, user remembers first password, when user needs login authentication or payment verification, by first In Password Input Password Input frame, initial password is obtained after carrying out second processing to first password based on Cipher Processing rule, this Individual initial password can serve as verifying that password operates to verify whether to have permission to log in or have permission payment etc..Due to Family only needs to remember first password, and the first password is not real checking password, therefore, even if other people peep Or first password is stolen, it the verification operation such as also can not be logged in or be paid using first password.Therefore, this password The mode of processing is safer.
Fig. 2 is the schematic flow sheet for the cipher processing method that the another embodiment of the application provides, and this method can as shown in the figure To comprise the following steps:
Step S201, obtain the initial password and Cipher Processing rule of user's input.
In the embodiment of the present application, the initial password is the checking password of user's confirmation (for example, login password or payment Password).The Cipher Processing rule can be set by user, for example, when user wants initial password is carried out to upset processing When, initial password can be inputted in initial password frame and Cipher Processing rule is inputted in Cipher Processing rule frame.Make For citing, it is " abcdef " that user can input initial password in initial password frame, is inputted in Cipher Processing rule frame close Code processing rule is " 32 ".
Step S202, it is close that the first processing acquisition described first is carried out to the initial password based on the Cipher Processing rule Code, and the first password is shown in clear text manner, so that user is subsequently using the first password as input password.
In the embodiment of the present application, the first processing can be carried out to the initial password according to following processing mode:
Step A1:It is G to set Cipher Processing rule, and initial password M, length (G) represent Ah in Cipher Processing rule The number of Arabic numbers, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and M [k] is represented in initial password k-th Code characters, length (M) represent the number of code characters in initial password;
Step A2:Initialize k=1;
Step A3:If k≤length (G), step A4 is performed;
Step A4:If G [k]>Length (M), then perform step A5;If G [k]≤length (M), M [k] and M is exchanged Step A5 is performed behind the position of [G [k]];
Step A5:K=k+1 is made, and returns and performs step A3, until k>During length (G), after the completion of place-exchange Initial password is as the first password.
By way of example it is assumed that initial password is " abcdef ", k is from 1 natural number for getting length (G) always, it is assumed that In Cipher Processing rule the number of Arabic numerals be 2, then k be got always from 12 natural number (i.e. 1,2).Assuming that at password Manage regular G=298635, then length (G)=6, k value be exactly successively from 1 get 7 natural number (i.e. 1,2,3,4,5,6, 7)。
When initializing k=1, meet k≤length (G), and meet G [k]≤length (M), then by M [1] and M [2] Exchange position and obtain bacdef, the value that k plus 1 causes k is changed into 2;
As k=2, meet k≤length (G), and meet G [k]≤> length (M), then need not exchange position, obtain Be still bacdef, by k plus 1 cause k value be changed into 3;
As k=3, meet k≤length (G), and meet G [k]≤> length (M), then need not exchange position, obtain Be still bacdef, by k plus 1 cause k value be changed into 4;
As k=4, meet k≤length (G), and meet G [k]≤length (M), then M [4] and M [6] is exchanged into position Put to obtain bacfed, the value that k plus 1 causes k is changed into 5;
As k=5, meet k≤length (G), and meet G [k]≤length (M), then M [5] and M [3] is exchanged into position Put to obtain baefcd, the value that k plus 1 causes k is changed into 6;
As k=6, meet k≤length (G), and meet G [k]≤length (M), then M [6] and M [5] is exchanged into position Put to obtain baefdc, the value that k plus 1 causes k is changed into 7;
And as k=7, k > length (G), acquisition is exactly first password baefdc.The also table in k > length (G) Show that the first processing terminates.
After first password is obtained, show the first password in clear text manner, in order to user can remember it is described First password is as input password.
By analysis above, the process of the first processing is that initial password is upset to the process of order rearrangement, in reality In the application of border, other processing procedures are can also be, for example, deleting, increase.
By way of example it is assumed that Cipher Processing rule is 5, it is close the 5th character deletion in initial password can be obtained first Code, and is stored in default storage region by the 5th character, in order to which first password is generated the during initial password 5 characters, which increase to, obtains initial password in first password.It is, of course, also possible to be increased operation, for example, by initial password The front or behind of 5th character increases a preset characters and obtains first password, is being initial close by first password processing During code, the preset characters of the 5th character front or behind are deleted.It is, of course, also possible to it is, by the of initial password After 5 characters are converted into ASCII character, add or subtract present count and obtain first password, and present count is stored in default Storage region.By the first password processing obtain initial password during from default storage region obtain present count with It is easy to subtract the 5th character in first password or obtains initial password plus present count.
It is above that 1 Arabic numerals is illustrated only by Cipher Processing rule setting, can be by Cipher Processing in practical application Rule setting is the processing procedure that multidigit Arabic numerals carry out the example above.
Step S203, the Cipher Processing rule is encrypted, and the Cipher Processing rule after encryption is stored To default storage region.
In the embodiment of the present application, due to obtaining the process of first password from initial password, with being obtained just from first password The process of beginning password is based on identical Cipher Processing rule, and is antipodal process, it is therefore desirable to by the Cipher Processing Rule is stored in default storage region.So, first password is being carried out during second processing obtains initial password just The Cipher Processing rule can be obtained from default storage region., can also be by institute in order to further ensure the safety of password State Cipher Processing rule to be first encrypted, the Cipher Processing rule after encryption is stored to default storage region. The default storage region can be some storage region in terminal device, can also be with the terminal device have communicate (for example, cloud storage) in the storage region of other terminal devices of connection.
Step S204, after the input that user completes first password is detected, obtain the first password.
In the embodiment of the present application, user needs to input original after first password is obtained according to initial password in script Only need to input first password in the register of beginning password or delivery operation.Due to first password being processed into initially The process of password must obtain Cipher Processing rule, so, even if user, during first password is inputted, other users steal The first password is peeped or stolen, is to be proved to be successful when being logged in by first password or payment verification 's.Because if it is to succeed that the first password is directly logged in into confirmation or payment affirmation, checking as checking password 's;The login authentication or payment verification of server are carried out after if second processing is also passed through to the first password again, due to it His user and Cipher Processing rule corresponding to can not knowing, so, password can not be still verified, leads to not Successful login Or can not successfully it pay.
Step S205, obtain the Cipher Processing rule in the default storage region.
In the embodiment of the present application, due to by first password processing processing generation initial password during be with will just The process of beginning Cipher Processing generation first password is antipodal process, but is based on identical Cipher Processing rule.This With regard to needing to obtain the Cipher Processing rule by initial password processing for first password.It is by the password in step S203 Reason rule is stored in default storage region, it is only necessary to is obtained from default storage region.If the Cipher Processing rule Then pass through encryption, after Cipher Processing rule is got from default storage region, also need to the operation of decryption accordingly.
Step S206, it is described initial close that second processing acquisition is carried out to the first password based on the Cipher Processing rule Code, and using the initial password as final checking password.
In the embodiment of the present application, second processing can be carried out to the first password according to following processing mode:
Step B1:It is G to set Cipher Processing rule, and first password m, length (G) represent Ah in Cipher Processing rule The number of Arabic numbers, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and m [k] is represented in first password k-th Code characters;Length (m) represents the number of code characters in first password;
Step B2:Initialize k=length (G);
Step B3:If k > 0, step B4 is performed;
Step B4:If G [k]>Length (m), then perform step B5;If G [k]≤length (m), m [k] and m is exchanged Step B5 is performed behind the position of [G [k]];
Step B5:K=k-1 is made, and returns and performs step B3, it is when k≤0, first after the completion of place-exchange is close Code is used as the initial password.
As an example, it will be assumed that the first password m=baefdc of acquisition, then length (m)=6.What is obtained simultaneously is close Code handles regular G=298635, then length (G)=6, k value be exactly from 6 take successively natural number until get 0 (i.e. 6,5, 4、3、2、1、0)。
When initializing k=6, meet k > 0, and meet G [k]≤length (m), then exchange m [6] and m [5] position, Baefcd is obtained, subtracting 1 by k causes k value to be changed into 5;
As k=5, meet k > 0, and meet G [k]≤length (m), then exchange m [5] and m [3] position, obtain Bacfed, k is subtracted 1 and causes k value to be changed into 4;
As k=4, meet k > 0, and meet G [k]≤length (m), then exchange m [4] and m [6] position, obtain Bacdef, k is subtracted 1 and causes k value to be changed into 3;
As k=3, meet k > 0, and meet G [k] > length (m), then need not exchange position, what is obtained is still Bacdef, k is subtracted 1 and causes k value to be changed into 2;
As k=2, meet k > 0, and meet G [k] > length (m), then need not exchange position, what is obtained is still Bacdef, k is subtracted 1 and causes k value to be changed into 1;
As k=1, meet k > 0, and meet G [k]≤length (m), then exchange m [1] and m [2] position, obtain Abcdef, k is subtracted 1 and causes k value to be changed into 0;
And as k=0, acquisition is exactly initial password abcdef, and the initial password of acquisition can serve as verifying that password is used In login authentication or payment verification.Simultaneously during k=0, represent that second processing terminates.
By comparing the process of initial password processing generation first password and generating first password processing initial close The process of code can show that the Cipher Processing rule of use is identical, the difference is that the process of processing is antipodal mistake Journey.So as long as user, by Cipher Processing rule encrypting storing, enters after first password is obtained according to initial password in user When row login or payment verification, it can be obtained the first password of acquisition as input password, system at the password of user's preservation Reason rule, the Cipher Processing rule is decrypted, be then based on Cipher Processing rule first password is reduced to it is initial close Code, that is, verify password.So, if user is during password is inputted, even if being peeped by other users to Qi Tayong If family leads to not the first password of acquisition as checking password, natural authentication failed log in or can not paid;If The first password of acquisition is also passed through second processing by other users, due to other users and can not get Cipher Processing rule, So can not still get really checking password, it also just successful log or can not can not successfully pay, improve user The security of account or property.
It should be understood that the size of the sequence number of each step is not meant to the priority of execution sequence, each process in above-described embodiment Execution sequence should determine that the implementation process without tackling the embodiment of the present application forms any limit with its function and internal logic It is fixed.
Fig. 3 is the schematic block diagram for the terminal device that the embodiment of the application one provides, and for convenience of description, is only shown and this Shen Please the related part of embodiment.
The terminal device 3 can be built in the terminal devices such as mobile phone, notebook software unit, hardware cell or The unit of soft or hard combination, it can also be integrated into as independent suspension member in existing terminal device.
The terminal device 3 includes:
First password acquisition module 31, for after the input that user completes first password is detected, obtaining described first Password, the first password are to carry out the password after the first processing to initial password by default Cipher Processing rule
Cipher Processing rule acquisition module 32, for obtaining the Cipher Processing rule;
Initial password generation module 33, for carrying out second processing to the first password based on the Cipher Processing rule The initial password is obtained, and using the initial password as final checking password.
Optionally, the terminal device 3 also includes:
Initial password acquisition module 34, for obtaining the initial password and Cipher Processing rule of user's input;
First password generation module 35, for carrying out the first processing to the initial password based on the Cipher Processing rule The first password is obtained, and shows the first password in clear text manner, so that user subsequently makees the first password To input password.
Optionally, the terminal device 3 also includes:
Memory module 36 is encrypted, for the Cipher Processing rule to be encrypted, and will be close after encryption Code processing rule is stored to default storage region.
Optionally, the Cipher Processing rule is made up of at least one zero Arabic numerals of being more than, and at the password Numeral in reason rule differs.
Optionally, the first password generation module 35 is specifically used for:
Step A1:It is G to set Cipher Processing rule, and initial password M, length (G) represent Ah in Cipher Processing rule The number of Arabic numbers, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and M [k] is represented in initial password k-th Code characters, length (M) represent the number of code characters in initial password;
Step A2:Initialize k=1;
Step A3:If k≤length (G), step A4 is performed;
Step A4:If G [k]>Length (M), then perform step A5;If G [k]≤length (M), M [k] and M is exchanged Step A5 is performed behind the position of [G [k]];
Step A5:K=k+1 is made, and returns and performs step A3, until k>During length (G), after the completion of place-exchange Initial password is as the first password.
Optionally, the initial password generation module 33 is specifically used for:
Step B1:It is G to set Cipher Processing rule, and first password m, length (G) represent Ah in Cipher Processing rule The number of Arabic numbers, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and m [k] is represented in first password k-th Code characters;Length (m) represents the number of code characters in first password;
Step B2:Initialize k=length (G);
Step B3:If k > 0, step B4 is performed;
Step B4:If G [k]>Length (m), then perform step B5;If G [k]≤length (m), m [k] and m is exchanged Step B5 is performed behind the position of [G [k]];
Step B5:K=k-1 is made, and returns and performs step B3, it is when k≤0, first after the completion of place-exchange is close Code is used as the initial password.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work( Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different Functional unit, module are completed, will the internal structure of the terminal device be divided into different functional units or module, to complete All or part of function described above.Each functional unit, module in embodiment can be integrated in a processing unit, Can also be that unit is individually physically present, can also two or more units it is integrated in a unit, above-mentioned collection Into unit can both have been realized in the form of hardware, can also be realized in the form of SFU software functional unit.In addition, each function Unit, the specific name of module are not limited to the protection domain of the application also only to facilitate mutually distinguish.Above-mentioned dress Middle unit, the specific work process of module are put, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Fig. 4 is the schematic block diagram for the terminal device that the another embodiment of the application provides.As shown in figure 4, the end of the embodiment End equipment 4 includes:One or more processors 40, memory 41 and it is stored in the memory 41 and can be in the processing The computer program 42 run on device 40.The processor 40 is realized when performing the computer program 42 at above-mentioned each password Manage the step in embodiment of the method, such as the step S101 to S103 shown in Fig. 1.Or the processor 40 performs the meter The function of each module/unit in above-mentioned terminal device embodiment, such as module 31 to 33 shown in Fig. 3 are realized during calculation machine program 42 Function.
Exemplary, the computer program 42 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 41, and are performed by the processor 40, to complete the application.Described one Individual or multiple module/units can be the series of computation machine programmed instruction section that can complete specific function, and the instruction segment is used for Implementation procedure of the computer program 42 in the terminal device 4 is described.For example, the computer program 42 can be divided It is cut into first password acquisition module, Cipher Processing rule acquisition module, initial password generation module.
The first password acquisition module, for after the input that user completes first password is detected, obtaining described the One password, the first password are to carry out the password after the first processing to initial password by default Cipher Processing rule
The Cipher Processing rule acquisition module, for obtaining the Cipher Processing rule;
The initial password generation module, for being carried out based on the Cipher Processing rule to the first password at second Reason obtains the initial password, and using the initial password as final checking password.
Other modules can refer to the description in the embodiment shown in Fig. 3, will not be repeated here.
The terminal device includes but are not limited to processor 40, memory 41.It will be understood by those skilled in the art that figure 4 be only an example of terminal device 4, does not form the restriction to terminal device 4, can be included more more or less than illustrating Part, either combine some parts or different parts, such as the terminal device can also include input equipment, defeated Go out equipment, network access equipment, bus etc..
The processor 40 can be CPU (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng.
The memory 41 can be the internal storage unit of the terminal device 4, such as the hard disk of terminal device 4 or interior Deposit.The memory 41 can also be the External memory equipment of the terminal device 4, such as be equipped with the terminal device 4 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, dodge Deposit card (Flash Card) etc..Further, the memory 41 can also both include the storage inside list of the terminal device 4 Member also includes External memory equipment.The memory 41 is used to store needed for the computer program and the terminal device Other programs and data.The memory 41 can be also used for temporarily storing the data that has exported or will export.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and is not described in detail or remembers in some embodiment The part of load, it may refer to the associated description of other embodiments.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, application-specific and design constraint depending on technical scheme.Professional and technical personnel Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed Scope of the present application.
In embodiment provided herein, it should be understood that disclosed terminal device and method, it can be passed through Its mode is realized.For example, terminal device embodiment described above is only schematical, for example, the module or list The division of member, only a kind of division of logic function can have an other dividing mode when actually realizing, for example, multiple units or Component can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, show Show or the mutual coupling discussed or direct-coupling or communication connection can be by some interfaces, between device or unit Coupling or communication connection are connect, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated module/unit realized in the form of SFU software functional unit and as independent production marketing or In use, it can be stored in a computer read/write memory medium.Based on such understanding, the application realizes above-mentioned implementation All or part of flow in example method, by computer program the hardware of correlation can also be instructed to complete, described meter Calculation machine program can be stored in a computer-readable recording medium, and the computer program can be achieved when being executed by processor The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer-readable medium It can include:Any entity or device, recording medium, USB flash disk, mobile hard disk, the magnetic of the computer program code can be carried Dish, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It is it should be noted that described The content that computer-readable medium includes can carry out appropriate increasing according to legislation in jurisdiction and the requirement of patent practice Subtract, such as in some jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and Telecommunication signal.
Embodiment described above is only to illustrate the technical scheme of the application, rather than its limitations;Although with reference to foregoing reality Example is applied the application is described in detail, it will be understood by those within the art that:It still can be to foregoing each Technical scheme described in embodiment is modified, or carries out equivalent substitution to which part technical characteristic;And these are changed Or replace, the essence of appropriate technical solution is departed from the spirit and scope of each embodiment technical scheme of the application, all should Within the protection domain of the application.

Claims (10)

  1. A kind of 1. cipher processing method, it is characterised in that including:
    After the input that user completes first password is detected, the first password is obtained, the first password is by default Cipher Processing rule to initial password carry out first processing after password;
    Obtain the Cipher Processing rule;
    Second processing is carried out to the first password based on the Cipher Processing rule and obtains the initial password, and will be described first Beginning password is as final checking password.
  2. 2. cipher processing method as claimed in claim 1, it is characterised in that before the first password is obtained, in addition to:
    Obtain the initial password and Cipher Processing rule of user's input;
    The first processing is carried out to the initial password based on the Cipher Processing rule and obtains the first password, and with plaintext Mode shows the first password, so that user is subsequently using the first password as input password.
  3. 3. cipher processing method as claimed in claim 2, it is characterised in that obtaining the Cipher Processing rule of user's input Afterwards, in addition to:
    The Cipher Processing rule is encrypted, and the Cipher Processing rule after encryption is stored to default and deposited Storage area domain.
  4. 4. the cipher processing method as described in any one of claims 1 to 3, it is characterised in that the Cipher Processing rule is by extremely Few Arabic numerals more than zero form, and the Arabic numerals in the Cipher Processing rule differ.
  5. 5. cipher processing method as claimed in claim 4, it is characterised in that described to be based on the Cipher Processing rule to described Initial password, which carries out the first processing acquisition first password, to be included:
    Step A1:It is G to set Cipher Processing rule, and initial password M, length (G) represent Arabic in Cipher Processing rule The number of numeral, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and M [k] represents k-th of password in initial password Character, length (M) represent the number of code characters in initial password;
    Step A2:Initialize k=1;
    Step A3:If k≤length (G), step A4 is performed;
    Step A4:If G [k]>Length (M), then perform step A5;If G [k]≤length (M), M [k] and M [G are exchanged [k]] position after perform step A5;
    Step A5:K=k+1 is made, and returns and performs step A3, until k>, will be initial after the completion of place-exchange during length (G) Password is as the first password.
  6. 6. the processing method of password as claimed in claim 4, it is characterised in that described to be based on the Cipher Processing rule to institute Stating the first password progress second processing acquisition initial password includes:
    Step B1:It is G to set Cipher Processing rule, and first password m, length (G) represent Arabic in Cipher Processing rule The number of numeral, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and m [k] represents k-th of password in first password Character, length (m) represent the number of code characters in first password;
    Step B2:Initialize k=length (G);
    Step B3:If k > 0, step B4 is performed;
    Step B4:If G [k]>Length (m), then perform step B5;If G [k]≤length (m), m [k] and m [G are exchanged [k]] position after perform step B5;
    Step B5:K=k-1 is made, and returns and performs step B3, when k≤0, the first password after the completion of place-exchange is made For the initial password.
  7. A kind of 7. terminal device, it is characterised in that including:
    First password acquisition module, for after the input that user completes first password is detected, obtaining the first password, institute It is to carry out the password after the first processing to initial password by default Cipher Processing rule to state first password
    Cipher Processing rule acquisition module, for obtaining the Cipher Processing rule;
    Initial password generation module, institute is obtained for carrying out second processing to the first password based on the Cipher Processing rule Initial password is stated, and using the initial password as final checking password.
  8. 8. terminal device as claimed in claim 7, it is characterised in that also include:
    Initial password acquisition module, for obtaining the initial password and Cipher Processing rule of user's input;
    First password generation module, institute is obtained for carrying out the first processing to the initial password based on the Cipher Processing rule First password is stated, and shows the first password in clear text manner, so that user is subsequently using the first password as input Password.
  9. 9. a kind of terminal device, including memory, processor and it is stored in the memory and can be on the processor The computer program of operation, it is characterised in that realize such as claim 1 to 6 described in the computing device during computer program The step of any one methods described.
  10. 10. a kind of computer-readable recording medium, it is characterised in that the computer-readable recording medium storage has computer journey Sequence, realized when the computer program is executed by one or more processors such as the step of any one of claim 1 to 6 methods described Suddenly.
CN201711069097.1A 2017-11-03 2017-11-03 Password processing method, terminal equipment and computer readable storage medium Active CN107895105B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711069097.1A CN107895105B (en) 2017-11-03 2017-11-03 Password processing method, terminal equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711069097.1A CN107895105B (en) 2017-11-03 2017-11-03 Password processing method, terminal equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107895105A true CN107895105A (en) 2018-04-10
CN107895105B CN107895105B (en) 2020-06-09

Family

ID=61803060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711069097.1A Active CN107895105B (en) 2017-11-03 2017-11-03 Password processing method, terminal equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107895105B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113158150A (en) * 2021-04-14 2021-07-23 捷德(中国)科技有限公司 Verification method, device and system
CN113282913A (en) * 2021-07-23 2021-08-20 天聚地合(苏州)数据股份有限公司 Password replacement method and device
CN113973000A (en) * 2020-07-25 2022-01-25 华为技术有限公司 Method and device for processing pre-shared key PSK
CN114005201A (en) * 2021-10-26 2022-02-01 珠海格力电器股份有限公司 Door lock control method and device, electronic equipment and storage medium
CN114117416A (en) * 2021-09-16 2022-03-01 山东大学 SAT-based visualization method and system for symmetric password automated analysis platform
CN114726516A (en) * 2022-03-28 2022-07-08 北京汇元网科技股份有限公司 Encryption method, system, terminal equipment and storage medium for fusing card number and password

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1851788A (en) * 2006-03-30 2006-10-25 周忠杰 Password setting metod
CN102932152A (en) * 2012-11-03 2013-02-13 张金木 Authentication technology adopting dynamic and static mixed passwords
US20140157121A1 (en) * 2012-11-30 2014-06-05 International Business Machines Corporation Preventing malicious observance of private information
CN104090688A (en) * 2014-08-06 2014-10-08 广东欧珀移动通信有限公司 Password input method and device for mobile terminal
CN104156679A (en) * 2014-07-16 2014-11-19 惠州Tcl移动通信有限公司 Electronic equipment, unlocking password setting method thereof and unlocking method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1851788A (en) * 2006-03-30 2006-10-25 周忠杰 Password setting metod
CN102932152A (en) * 2012-11-03 2013-02-13 张金木 Authentication technology adopting dynamic and static mixed passwords
US20140157121A1 (en) * 2012-11-30 2014-06-05 International Business Machines Corporation Preventing malicious observance of private information
CN104156679A (en) * 2014-07-16 2014-11-19 惠州Tcl移动通信有限公司 Electronic equipment, unlocking password setting method thereof and unlocking method thereof
CN104090688A (en) * 2014-08-06 2014-10-08 广东欧珀移动通信有限公司 Password input method and device for mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张俊伟等: "基于位置密钥交换的UC安全模型", 《计算机研究与发展》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113973000A (en) * 2020-07-25 2022-01-25 华为技术有限公司 Method and device for processing pre-shared key PSK
CN113158150A (en) * 2021-04-14 2021-07-23 捷德(中国)科技有限公司 Verification method, device and system
CN113282913A (en) * 2021-07-23 2021-08-20 天聚地合(苏州)数据股份有限公司 Password replacement method and device
CN114117416A (en) * 2021-09-16 2022-03-01 山东大学 SAT-based visualization method and system for symmetric password automated analysis platform
CN114117416B (en) * 2021-09-16 2024-04-12 山东大学 SAT-based symmetric password automatic analysis platform visualization method and system
CN114005201A (en) * 2021-10-26 2022-02-01 珠海格力电器股份有限公司 Door lock control method and device, electronic equipment and storage medium
CN114726516A (en) * 2022-03-28 2022-07-08 北京汇元网科技股份有限公司 Encryption method, system, terminal equipment and storage medium for fusing card number and password

Also Published As

Publication number Publication date
CN107895105B (en) 2020-06-09

Similar Documents

Publication Publication Date Title
CN107895105A (en) A kind of cipher processing method, terminal device and computer-readable recording medium
US10438187B2 (en) Establishment of a secure session between a card reader and a mobile device
EP3140796B1 (en) Establishment of a secure session between a card reader and a mobile device
CN105320864A (en) Method and apparatus for processing event operation
CN110494854A (en) Use the Verification System of multi-party computations
CN107004080A (en) Environment sensing security token
US20160127134A1 (en) User authentication system and method
CN106503996A (en) Payment transaction based on web provides equipment, method and system
CN109150903A (en) A kind of account management method, device, storage medium and terminal device
CN104504569A (en) Verification method and device
CN103929425B (en) A kind of identity registration, identity authentication method, equipment and system
CN107451819A (en) A kind of auth method and device based on user's operation behavior feature
CN106462706A (en) A method and apparatus for providing client-side score-based authentication
CN107730775A (en) Self-service dealing method, apparatus, system and electronic equipment
CN103888942B (en) Data processing method based on negotiation secret keys
CN105897417A (en) Encrypted data input method and encrypted data input device
CN107967422A (en) One kind verification implementation method and electric terminal
US20120198530A1 (en) Real time password generation apparatus and method
CN104346550A (en) Information processing method and electronic equipment
CN107480513B (en) Authentication implementation method and device, computer device and readable storage medium
CN108183889A (en) Identity identifying method and identification authentication system
CN107769928A (en) A kind of terminal and computer-readable recording medium
CN106851613A (en) Service request method, the verification method of business handling number and its terminal
CN108965315A (en) A kind of authentic authentication method of terminal device, device and terminal device
CN102938033A (en) System for enhancing safety of U shield for bank and application method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

GR01 Patent grant
GR01 Patent grant