CN111130774A - Password generation method, device and equipment - Google Patents

Password generation method, device and equipment Download PDF

Info

Publication number
CN111130774A
CN111130774A CN201911371271.7A CN201911371271A CN111130774A CN 111130774 A CN111130774 A CN 111130774A CN 201911371271 A CN201911371271 A CN 201911371271A CN 111130774 A CN111130774 A CN 111130774A
Authority
CN
China
Prior art keywords
password
sub
private key
path
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911371271.7A
Other languages
Chinese (zh)
Inventor
张兵
袁力
邸烁
徐磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Aershan Block Chain Alliance Technology Co ltd
Original Assignee
Beijing Aershan Block Chain Alliance Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Aershan Block Chain Alliance Technology Co ltd filed Critical Beijing Aershan Block Chain Alliance Technology Co ltd
Priority to CN201911371271.7A priority Critical patent/CN111130774A/en
Publication of CN111130774A publication Critical patent/CN111130774A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Abstract

The invention provides a password generation method, a device and equipment, wherein at least one sub-private key corresponding to a preset path is generated according to the preset main private key and the preset path in a password path rule; and generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule. In the method, the sub-private keys corresponding to different paths in the preset password path rule can be generated through the pre-generated main private key, so that the sub-passwords are generated, and at least one sub-password can be generated for the same appointed path, so that the password of the appointed path is convenient for a user to update, and the convenience for the user to manage the password is improved.

Description

Password generation method, device and equipment
Technical Field
The present invention relates to the technical field of password management, and in particular, to a password generation method, apparatus and device.
Background
With the rapid development of the internet, more and more internet applications are used by people, most of the internet applications are provided with independent user systems, users need to be registered when the internet applications are used, and a safe and reliable password needs to be set when the internet applications are used in order to ensure the safety of the users; for an individual user, in order to ensure the security of the used internet applications, each internet application needs to use a different password, and the password of the user needs to be modified periodically, and the security management of the passwords is a difficult and difficult task.
Disclosure of Invention
The invention aims to provide a password generation method, a password generation device and password generation equipment so as to improve the convenience of password management of a user.
The invention provides a password generation method, which comprises the following steps: generating at least one sub-private key corresponding to a preset path according to the pre-generated main private key and the preset path in the password path rule; the password path rule is used for determining a path for generating a password; generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule; wherein the password generation rule is used to determine a password format.
Further, the pre-generated master private key is generated by the following method: when a login instruction sent by a user for the first time is received, generating a random seed corresponding to the user, wherein the random seed comprises a randomly generated character string; generating a master private key corresponding to the random seed.
Further, the method further comprises: and generating mnemonics corresponding to the random seeds.
Further, after the step of generating the sub-password corresponding to the sub-private key according to the sub-private key and the specified password format in the preset password generation rule, the method further includes: and generating a password index number corresponding to the sub-password.
Further, the password format comprises numbers, letters or special characters, and the password length; the method further comprises the following steps: and generating a password generation rule mark corresponding to the password format.
Further, the path includes: at least one of an application flag, a user name of a user in the application, the password generation rule flag, and the password index number.
The invention provides a password generating device, comprising: the first generation module is used for generating at least one sub-private key corresponding to a preset path according to the preset main private key and the preset appointed path in the password path rule; the password path rule is used for determining a path for generating a password; the fourth generation module is used for generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule; wherein the password generation rule is used to determine a password format.
Further, the pre-generated master private key is generated by the following method: when a login instruction sent by a user for the first time is received, generating a random seed corresponding to the user; wherein the random seed comprises a randomly generated string; generating a master private key corresponding to the random seed.
The invention provides a password generation device, which comprises a processor and a memory, wherein the memory stores machine executable instructions capable of being executed by the processor, and the processor executes the machine executable instructions to realize the password generation method.
The present invention provides a machine-readable storage medium having stored thereon machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement a password generation method as described in any of the above.
According to the password generation method, the password generation device and the password generation equipment, at least one sub-private key corresponding to a preset path is generated according to the preset main private key and the preset path in the password path rule; and generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule. In the method, the sub-private keys corresponding to different paths in the preset password path rule can be generated through the pre-generated main private key, so that the sub-passwords are generated, and at least one sub-password can be generated for the same appointed path, so that the password of the appointed path is convenient for a user to update, and the convenience for the user to manage the password is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a password generation method according to an embodiment of the present invention;
fig. 2 is a flowchart of another password generation method according to an embodiment of the present invention;
fig. 3 is a flowchart of a hierarchical determining method according to an embodiment of the present invention;
fig. 4 is a flowchart of another password generation method according to an embodiment of the present invention;
FIG. 5 is a flowchart of another method for generating a password according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a password generation apparatus according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a password generation device according to an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
At present, when people use internet applications, users are generally required to be registered for each internet application, safe and reliable passwords are required to be set, different internet applications are required, the set passwords are generally different, the passwords are required to be modified periodically for ensuring the safety, the password safety of some financial software applications is more important, and once the passwords are leaked or maliciously cracked, the personal economic property loss is caused; the secure management of these passwords is a difficult and difficult task for individual users.
Based on this, embodiments of the present invention provide a password generation method, apparatus, and device, and the technology may be applied to management of multiple passwords.
In order to facilitate understanding of the embodiment, a password generation method disclosed in the embodiment of the present invention is first described in detail; as shown in fig. 1, the method comprises the steps of:
step S102, generating at least one sub-private key corresponding to a specified path according to a pre-generated main private key and the specified path in a preset password path rule; the password path rule is used for determining a path for generating the password.
The master private key can generate different sub private keys through an internal derivation algorithm, and can control the generated sub private keys, and the generated sub private keys are also fixed as long as the derivation algorithm is not changed; the password path rule is used for determining a path for generating the password, for example, the path 1 is WeChat, the path 2 is microblog, and the path 3 is Paibao; the specified path can be WeChat, microblog or pay money and the like; during actual implementation, at least one sub-private key corresponding to a specified path can be generated according to the pre-generated main private key and the specified path in the preset password path rule; for example, for the WeChat, a plurality of paths of the WeChat, such as the WeChat path 1, the WeChat path 2, etc., may be provided, and the WeChat private key 1 corresponding to the WeChat path 1, the WeChat private key 2 corresponding to the WeChat path 2, etc., may be generated based on the pre-generated master private key.
Step S104, generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule; wherein the password generation rule is used to determine a password format.
The password format can comprise various combination formats such as pure numeric passwords, numeric-letter combination passwords and the like; the sub-password can be understood as a password of a path corresponding to the sub-private key generated according to the sub-private key; for example, if the wechat path 1 corresponds to the wechat son private key 1, and the wechat path 2 corresponds to the wechat son private key 2, the wechat son password 1 generated according to the wechat son private key 1 and the specified password format is the sub password corresponding to the wechat path 1, and can also be understood as the first password generated by the wechat; the WeChat sub-password 2 generated according to the WeChat sub-private key 2 and the specified password format is a sub-password corresponding to the WeChat path 2 and can also be understood as a second password generated by WeChat, and by analogy, a plurality of sub-passwords can be generated for WeChat, and the passwords of the WeChat paths are different; as an example, when a user needs a WeChat password, the WeChat sub-password can be automatically displayed only by selecting a path of the WeChat and a rule for generating the sub-password; only the WeChat can be selected, so that all the sub-passwords corresponding to the WeChat can be displayed.
In practical implementation, the sub-private key can be used for generating the sub-password in the specified password format through the customized password generation algorithm, and in general, the sub-password generated according to the specified sub-private key is also fixed and unchanged as long as the customized password generation algorithm is unchanged.
According to the password generation method provided by the embodiment of the invention, at least one sub-private key corresponding to a preset path is generated according to the preset main private key and the preset path in the password path rule; and generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule. In the method, the sub-private keys corresponding to different paths in the preset password path rule can be generated through the pre-generated main private key, so that the sub-passwords are generated, and at least one sub-password can be generated for the same appointed path, so that the password of the appointed path is convenient for a user to update, and the convenience for the user to manage the password is improved.
The embodiment of the invention also provides another password generation method, which is realized on the basis of the method of the embodiment; as shown in fig. 2, the method comprises the steps of:
step S202, generating at least one sub-private key corresponding to a specified path according to a pre-generated main private key and the specified path in a preset password path rule; the password path rule is used for determining a path for generating the password.
In practical implementation, the pre-generated master private key is generated by the following method:
step 20, when a login instruction sent by a user for the first time is received, generating a random seed corresponding to the user; wherein the random seed comprises a randomly generated string.
When a user uses a device or equipment capable of implementing the password generation method in this embodiment for the first time, the device or equipment generates a unique random seed for the user and stores the random seed, where the random seed is usually a string of longer random numbers; in practical implementation, the step may be implemented based on a scrambler or the like, or may be implemented in other forms, and the implementation manner may be diversified.
Step 21, generating a master private key corresponding to the random seed.
In actual implementation, a unique main private key capable of managing the sub-passwords can be generated for the random seed through an internal algorithm; that is, the random seed and the master private key are in one-to-one correspondence, and as long as the random seed is determined, the master private key generated by the random seed is generally uniquely determined.
Step S204, generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule; wherein the password generation rule is used to determine a password format.
In step S206, a mnemonic word corresponding to the random seed is generated.
Considering that the random seed is usually a character string composed of a string of longer random numbers, which is inconvenient for the user to use, and for the user to record and use, the random seed can be converted into a plurality of common English words or Chinese characters and the like through a preset algorithm, namely, the mnemonic words are mnemonic words, the mnemonic words and the random seed are in one-to-one correspondence, and the generated mnemonic words are usually determined uniquely as long as the random seed is determined; the specific implementation manner may refer to a hierarchical deterministic cryptography, where hierarchical deterministic (HD for short) is proposed in BIP32 (bitcoil improved products 32, a file that proposes new functions or improvements of Bitcoin) of a Bitcoin blockchain item, as shown in the flowchart of the hierarchical deterministic method shown in fig. 3, and the proposed scheme indicates that a main private key is generated by a random seed, and then a huge number of sub private keys are derived; however, since the random seed is a long string of random numbers which is inconvenient to record, the BIP39 proposal converts the random seed into a string of mnemonics, so that the random seed is convenient to record and store; the subsequent proposals BIP43 and BIP44 define derived paths, and form more convenient use specifications.
In practical implementation, a user can manage all the sub-passwords of the user only by recording the unique mnemonic words of the user, and can update the used sub-passwords periodically without worrying about forgetting the sub-passwords. The user properly records and stores the generated mnemonic words, and the mnemonic words can be recorded by paper, and can also be stored in a device or equipment for realizing the password generation method according to a specific implementation mode; the user may also import the existing mnemonic words into the device or apparatus for use, for example, when the user used the device or apparatus before, generated the random seed and mnemonic words, possibly lost the device or apparatus, or wants to replace a new device or apparatus, the user may directly import the mnemonic words that have been remembered originally into the new device or apparatus, continue to use the originally generated sub-password, etc.; the passwords corresponding to the original mnemonic word and the current mnemonic word are different, because the random seed is changed, as long as the random seed is changed, the finally generated sub-passwords are usually completely different. As can be seen from the above, if there are a plurality of the above devices or apparatuses, one user may have a plurality of random seeds.
According to the password generation method, after the random seed corresponding to the user is generated, the mnemonic word corresponding to the random seed is generated according to the random seed, in the method, the sub-private keys corresponding to different paths in the preset password path rule can be generated through the pre-generated main private key, and then the sub-passwords are generated, and at least one sub-password can be generated for the same appointed path, so that the password of the appointed path is convenient for the user to update, and the convenience of the user in managing the password is improved.
The embodiment of the invention also provides another password generation method, which is realized on the basis of the method of the embodiment; as shown in fig. 4, the method includes the steps of:
step S402, generating at least one sub-private key corresponding to a specified path according to the preset main private key and the specified path in the preset password path rule; the password path rule is used for determining a path for generating the password.
Step S404, generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule; wherein the password generation rule is used to determine a password format.
In step S406, a password index number corresponding to the sub-password is generated.
Taking the WeChat as an example, as can be seen from the above embodiments, a plurality of sub-passwords may be generated for the WeChat; in order to facilitate the record management, the plurality of sub-passwords may be respectively numbered, for example, the numbers are respectively 0, 1, and the like, and the number is the above-mentioned password index number.
When a user needs to update the password, a new password index label can be selected from the existing password index labels, or a new sub-password is generated according to the password path rule and the password generation rule; taking the WeChat as an example, for example, only one WeChat path 1 and the corresponding sub-password 1 are currently provided, in order to update the WeChat password, the WeChat sub-private key 2 corresponding to the WeChat path 2 may be generated according to the password path rule, and then the WeChat sub-password 2 corresponding to the WeChat sub-private key 2 may be generated according to the password generation rule, and when the WeChat password is used, the generated WeChat sub-password 2 may be selected, thereby implementing the update of the WeChat password.
In step S408, a password generation rule flag corresponding to the password format is generated.
In actual implementation, when the sub-password is generated, a proper password format can be selected according to requirements; the password format typically includes numbers, letters, or special characters, as well as the password length; for example, pure numeric passwords of different lengths, combinations of numeric letters, combinations of upper and lower case of numeric letters, combinations of special characters of numeric letters, and the like; in order to facilitate recording and managing different combination modes, different flags are usually configured for different combination modes, the configured flags are the above-mentioned password generation rule flags, and the format of the password to be generated can be determined by the password generation rule flags.
In practical implementation, the path in the above password generation rule at least includes: at least one of an application software mark, a user name of a user in the application software, the password generation rule mark and the password index number; of course, other information that can determine the path for generating the password may be included.
According to the password generation method, the password index number corresponding to the sub-password is generated, the password generation rule mark corresponding to the password format is generated, the generated sub-password and the password formats in different combination modes are convenient to record and manage, the sub-passwords corresponding to different paths in the preset password path rule can be generated through the pre-generated main private key, the sub-passwords are further generated, and at least one sub-password can be generated for the same appointed path, so that the password of the appointed path is convenient to update for a user, and the convenience of the user in password management is improved.
To further understand the above embodiment, another flowchart of the password generation method is provided below, as shown in fig. 5, fig. 5 includes a random seed, a main private key, a wechat sub private key 1 and a corresponding wechat sub password 1, a microblog sub private key 2 and a corresponding microblog sub password 2, a pay-for-treasure private key N and a corresponding pay-for-treasure sub password N; the password path rule comprises WeChat, microblog and Payment treasures; the random seed generates a unique main private key through an internal algorithm, the main private key generates a sub private key corresponding to an appointed path according to the appointed path in the password path rule, namely a WeChat sub private key 1 is generated according to the WeChat path, a microblog sub private key 2 is generated according to the microblog path, and a Payment baby sub private key N is generated according to the Payment baby path; and generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule, namely generating a micro-letter sub-password 1 corresponding to the micro-letter sub-private key 1, a micro-blog sub-password 2 corresponding to the micro-blog sub-private key 2 and a Payment Baozi sub-password N corresponding to the Payment Bao sub-private key N according to the password format specified by the user.
Referring to fig. 6, a schematic structural diagram of a password generation apparatus is shown, the apparatus including: a first generating module 60, configured to generate at least one sub-private key corresponding to a specified path according to a pre-generated main private key and the specified path in a preset password path rule; the password path rule is used for determining a path for generating the password; the second generating module 61 is configured to generate a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generating rule; wherein the password generation rule is used to determine a password format.
According to the password generation method provided by the embodiment of the invention, at least one sub-private key corresponding to a preset path is generated according to the preset main private key and the preset path in the password path rule; and generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule. In the device, the sub-private keys corresponding to different paths in the preset password path rule can be generated through the pre-generated main private key, so that the sub-passwords are generated, and at least one sub-password can be generated for the same appointed path, so that a user can update the password of the appointed path conveniently, and the convenience of managing the password by the user is improved.
Further, the pre-generated master private key is generated by the following method: when a login instruction sent by a user for the first time is received, generating a random seed corresponding to the user; wherein the random seed comprises a randomly generated character string; a master private key corresponding to the random seed is generated.
The implementation principle and the technical effect of the password generation apparatus provided by the embodiment of the present invention are the same as those of the password generation method embodiment, and for the sake of brief description, no mention is made in the embodiment of the password generation apparatus, and reference may be made to the corresponding contents in the password generation method embodiment.
An embodiment of the present invention further provides a password generation device, as shown in fig. 7, the password generation device includes a processor 130 and a memory 131, the memory 131 stores machine executable instructions capable of being executed by the processor 130, and the processor 130 executes the machine executable instructions to implement the password generation method.
Further, the password generation apparatus shown in fig. 7 further includes a bus 132 and a communication interface 133, and the processor 130, the communication interface 133, and the memory 131 are connected through the bus 132.
The Memory 131 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 133 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like can be used. The bus 132 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 7, but this does not indicate only one bus or one type of bus.
The processor 130 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 130. The Processor 130 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 131, and the processor 130 reads the information in the memory 131 and completes the steps of the method of the foregoing embodiment in combination with the hardware thereof.
The embodiment of the present invention further provides a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions, and when the machine-executable instructions are called and executed by a processor, the machine-executable instructions cause the processor to implement the above password generation method.
The computer program product of the password generation method, the password generation device, and the computer program product of the apparatus provided in the embodiments of the present invention includes a computer readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiments, and specific implementations may refer to the method embodiments and are not described herein again.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A method of password generation, the method comprising:
generating at least one sub-private key corresponding to a preset path according to the pre-generated main private key and the preset path in the password path rule; the password path rule is used for determining a path for generating a password;
generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule; wherein the password generation rule is used to determine a password format.
2. The method of claim 1, wherein the pre-generated master private key is generated by:
when a login instruction sent by a user for the first time is received, generating a random seed corresponding to the user; wherein the random seed comprises a randomly generated string;
generating a master private key corresponding to the random seed.
3. The method of claim 2, further comprising:
and generating mnemonics corresponding to the random seeds.
4. The method according to claim 1, wherein after the step of generating the sub-password corresponding to the sub-private key according to the sub-private key and the specified password format in the preset password generation rule, the method further comprises:
and generating a password index number corresponding to the sub-password.
5. The method of claim 4, wherein the password format comprises a number, a letter, or a special character, and a password length; the method further comprises the following steps:
and generating a password generation rule mark corresponding to the password format.
6. The method of claim 5, wherein the path comprises: at least one of an application flag, a user name of a user in the application, the password generation rule flag, and the password index number.
7. A password generation apparatus, characterized in that the apparatus comprises:
the first generation module is used for generating at least one sub-private key corresponding to a preset path according to the preset main private key and the preset appointed path in the password path rule; the password path rule is used for determining a path for generating a password;
the second generation module is used for generating a sub-password corresponding to the sub-private key according to the sub-private key and a specified password format in a preset password generation rule; wherein the password generation rule is used to determine a password format.
8. The apparatus of claim 7, wherein the pre-generated master private key is generated by:
when a login instruction sent by a user for the first time is received, generating a random seed corresponding to the user; wherein the random seed comprises a randomly generated string;
generating a master private key corresponding to the random seed.
9. A password generation device comprising a processor and a memory, the memory storing machine executable instructions executable by the processor, the processor executing the machine executable instructions to implement the password generation method of any one of claims 1 to 6.
10. A machine-readable storage medium having stored thereon machine-executable instructions which, when invoked and executed by a processor, cause the processor to implement the password generation method of any of claims 1 to 6.
CN201911371271.7A 2019-12-26 2019-12-26 Password generation method, device and equipment Pending CN111130774A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911371271.7A CN111130774A (en) 2019-12-26 2019-12-26 Password generation method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911371271.7A CN111130774A (en) 2019-12-26 2019-12-26 Password generation method, device and equipment

Publications (1)

Publication Number Publication Date
CN111130774A true CN111130774A (en) 2020-05-08

Family

ID=70503613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911371271.7A Pending CN111130774A (en) 2019-12-26 2019-12-26 Password generation method, device and equipment

Country Status (1)

Country Link
CN (1) CN111130774A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112712357A (en) * 2020-12-30 2021-04-27 普华云创科技(北京)有限公司 Multi-mechanism multi-chain multi-currency multi-account private key management method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070028299A1 (en) * 2005-07-26 2007-02-01 Gherardo Albano Client-based method, system and program to manage multiple authentication
CN104283668A (en) * 2014-07-24 2015-01-14 山东大学(威海) Method and device for obtaining application password based on mobile terminal
CN106411516A (en) * 2016-12-07 2017-02-15 北京海泰方圆科技股份有限公司 Fixed password generation method and device and dynamic token
CN108282331A (en) * 2018-01-02 2018-07-13 金邦达有限公司 Cipher processing method, apparatus and system
CN108537038A (en) * 2018-03-22 2018-09-14 平安科技(深圳)有限公司 Custom rule cipher management method, device, terminal device and storage medium
CN108833093A (en) * 2018-06-14 2018-11-16 百度在线网络技术(北京)有限公司 Determination method, apparatus, equipment and the storage medium of account key
CN109754254A (en) * 2019-01-11 2019-05-14 北京阿尔山区块链联盟科技有限公司 Key management method, device and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070028299A1 (en) * 2005-07-26 2007-02-01 Gherardo Albano Client-based method, system and program to manage multiple authentication
CN104283668A (en) * 2014-07-24 2015-01-14 山东大学(威海) Method and device for obtaining application password based on mobile terminal
CN106411516A (en) * 2016-12-07 2017-02-15 北京海泰方圆科技股份有限公司 Fixed password generation method and device and dynamic token
CN108282331A (en) * 2018-01-02 2018-07-13 金邦达有限公司 Cipher processing method, apparatus and system
CN108537038A (en) * 2018-03-22 2018-09-14 平安科技(深圳)有限公司 Custom rule cipher management method, device, terminal device and storage medium
CN108833093A (en) * 2018-06-14 2018-11-16 百度在线网络技术(北京)有限公司 Determination method, apparatus, equipment and the storage medium of account key
CN109754254A (en) * 2019-01-11 2019-05-14 北京阿尔山区块链联盟科技有限公司 Key management method, device and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112712357A (en) * 2020-12-30 2021-04-27 普华云创科技(北京)有限公司 Multi-mechanism multi-chain multi-currency multi-account private key management method and system

Similar Documents

Publication Publication Date Title
CN107292181A (en) Database Systems based on block chain and the application method using the system
CN107370730A (en) A kind of log-on message processing method and equipment
WO2019040716A1 (en) Streaming authentication using chained identifiers
US20150163065A1 (en) Identity authentication method and apparatus and server
CN109150903A (en) A kind of account management method, device, storage medium and terminal device
CN108259413B (en) Method for obtaining certificate and authenticating and network equipment
CN104301875B (en) SMS processing and device
CN105827582B (en) A kind of communication encrypting method, device and system
CN109214196A (en) A kind of data interactive method, device and equipment
CN110138754B (en) Multi-cloud-end information processing system and resource sharing method thereof
CN106572076A (en) Web service access method, client side and server side
CN107241184B (en) Personal password generation and management method based on improved AES
CN110474775B (en) User creating method, device and equipment in block chain type account book
CN110662184A (en) Information pushing method and device, computer equipment and storage medium
CN103270732B (en) Communicator, suggestion device and information recording carrier
CN103685149B (en) The method and apparatus for handling the password of game server
KR101897085B1 (en) Apparatus and method for generating a realtime password and storage medium
CN106790166A (en) A kind of method of safety certification, apparatus and system
CN103516524A (en) Security authentication method and system
KR20220144810A (en) Secret partitioning and metadata storage
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN104281272A (en) Password input processing method and device
CN111130774A (en) Password generation method, device and equipment
CN114513350A (en) Identity verification method, system and storage medium
CN107451459A (en) The method and apparatus verified using picture validation code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200508