CN107895105A - A kind of cipher processing method, terminal device and computer-readable recording medium - Google Patents
A kind of cipher processing method, terminal device and computer-readable recording medium Download PDFInfo
- Publication number
- CN107895105A CN107895105A CN201711069097.1A CN201711069097A CN107895105A CN 107895105 A CN107895105 A CN 107895105A CN 201711069097 A CN201711069097 A CN 201711069097A CN 107895105 A CN107895105 A CN 107895105A
- Authority
- CN
- China
- Prior art keywords
- password
- cipher processing
- processing rule
- initial
- length
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The application is applied to field of information security technology, there is provided a kind of cipher processing method, terminal device and computer-readable recording medium, including:After the input that user completes first password is detected, the first password is obtained, the first password is to carry out the password after the first processing to initial password by default Cipher Processing rule;Obtain the Cipher Processing rule;Second processing is carried out to the first password based on the Cipher Processing rule and obtains the initial password, and using the initial password as final checking password.By the application, can solve the problems, such as Current Password be easily stolen, security it is low.
Description
Technical field
The application belongs to field of information security technology, more particularly to a kind of cipher processing method, terminal device and computer
Readable storage medium storing program for executing.
Background technology
With the high speed development of internet, various applications are arisen at the historic moment.Wherein, some are related to individual privacy or personal wealth
Producing the application of safety, either website fashionable needs user to input password to ensure the personal information of user or individual opening or enter
The safety of people's property.
However, the mode of existing Password Input is all in the memory based checking Password Input password candidate frame of user,
The checking password is uploaded to the server of application to be logged in or webpage to verify whether the checking password of input is correct again.
During user's input validation password, it is easy to peep or steal the checking password by other people.Therefore, it is existing
The method of some Password Inputs is easily stolen, security is low.
The content of the invention
In view of this, the embodiment of the present application provides a kind of cipher processing method, terminal device and computer-readable storage
Medium, with solve the problems, such as Current Password be easily stolen, security it is low.
The first aspect of the embodiment of the present application provides a kind of processing method of password, including:
After the input that user completes first password is detected, the first password is obtained, the first password is to pass through
Default Cipher Processing rule carries out the password after the first processing to initial password;
Obtain the Cipher Processing rule;
Second processing is carried out to the first password based on the Cipher Processing rule and obtains the initial password, and by institute
Initial password is stated as final checking password.
The second aspect of the embodiment of the present application provides a kind of terminal device, including:
First password acquisition module, for after the input that user completes first password is detected, it is close to obtain described first
Code, the first password are to carry out the password after the first processing to initial password by default Cipher Processing rule
Cipher Processing rule acquisition module, for obtaining the Cipher Processing rule;
Initial password generation module, obtained for carrying out second processing to the first password based on the Cipher Processing rule
The initial password is obtained, and using the initial password as final checking password.
The third aspect of the embodiment of the present application provides a kind of terminal device, including memory, processor and is stored in
In the memory and the computer program that can run on the processor, described in the computing device during computer program
The step of realizing the methods described that the embodiment of the present application first aspect provides.
The fourth aspect of the embodiment of the present application provides a kind of computer-readable recording medium, the computer-readable storage
Media storage has computer program, and the computer program realizes the embodiment of the present application when being executed by one or more processors
On the one hand the step of methods described provided.
5th aspect of the embodiment of the present application provides a kind of computer program product, and the computer program product includes
Computer program, the computer program realize that the embodiment of the present application first aspect provides when being executed by one or more processors
Methods described the step of.
The embodiment of the present application obtains the first password after the input that user completes first password is detected, and described the
One password is to carry out the password after the first processing to initial password by default Cipher Processing rule;Obtain the Cipher Processing
Rule;Second processing is carried out to the first password based on the Cipher Processing rule and obtains the initial password, and by described in
Initial password is as final checking password.Because the first password of user's input is not real checking password, so, i.e.,
Make user during first password is inputted, the first password that other people peep user's input also can not be according to described first
Password completes the operation such as login or payment, improves the security of password.
Brief description of the drawings
, below will be to embodiment or description of the prior art in order to illustrate more clearly of the technical scheme in the embodiment of the present application
In the required accompanying drawing used be briefly described, it should be apparent that, drawings in the following description are only some of the application
Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these
Accompanying drawing obtains other accompanying drawings.
Fig. 1 is a kind of implementation process schematic diagram for cipher processing method that the embodiment of the application one provides;
Fig. 2 is a kind of implementation process schematic diagram for cipher processing method that the another embodiment of the application provides;
Fig. 3 is the schematic block diagram for the terminal device that the embodiment of the application one provides;
Fig. 4 is the schematic block diagram for the terminal device that the another embodiment of the application provides.
Embodiment
In describing below, in order to illustrate rather than in order to limit, it is proposed that such as tool of particular system structure, technology etc
Body details, thoroughly to understand the embodiment of the present application.However, it will be clear to one skilled in the art that there is no these specific
The application can also be realized in the other embodiments of details.In other situations, omit to well-known system, device, electricity
Road and the detailed description of method, in case unnecessary details hinders the description of the present application.
It should be appreciated that ought be in this specification and in the appended claims in use, special described by the instruction of term " comprising "
Sign, entirety, step, operation, the presence of element and/or component, but be not precluded from one or more of the other feature, entirety, step,
Operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this present specification is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the application.As used in present specification and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and appended claims is
Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to illustrate technical scheme described herein, illustrated below by specific embodiment.
Fig. 1 is the implementation process schematic diagram for the cipher processing method that the embodiment of the application one provides, as shown in the figure this method
It may comprise steps of:
Step S101, after the input that user completes first password is detected, the first password is obtained, described first is close
Code is to carry out the password after the first processing to initial password by default Cipher Processing rule.
In the embodiment of the present application, user needs to input password when the operation such as being logged in or paid, it will usually ejects
Password Input frame, user input password in Password Input frame.And detect that user completes the input of password, can detect
ACK button, login button, payment button on user's click visualization interface etc., can also be Password Input in the scheduled time
The movement of cursor is not detected in frame.Certainly in actual applications, other detection modes can also be set, to detect user
Whether the input of first password is completed.
The first password is not really to be used for verifying whether user has permission to access or have permission the password of payment.I.e.
The first password is not to be sent to wait to log in application or pay the checking that the server applied is used for verifying user identity
Password.As an example, user sets the login password of an application, and we can be referred to as initial password, and initial password is exactly
The server for being sent to the application is needed to be used for verifying whether user has permission to access the checking password of the application.And described first
Password is obtained according to the initial password.Cipher Processing rule can be pre-set, it is right based on the Cipher Processing rule
The password that initial password obtained after the first processing is exactly first password.The password that user inputs in Password Input frame is not
It is initial password, but first password.
Step S102, obtain the Cipher Processing rule.
In the embodiment of the present application, the Cipher Processing rule can be user set in advance it is a kind of to password at
The algorithm of reason, can be by a Cipher Processing into another password by the algorithm.
As one of embodiment, the Cipher Processing rule is made up of at least one zero Arabic numerals of being more than,
And the numeral in the Cipher Processing rule differs.
Certainly, in actual applications, other Cipher Processing rules can also be set.
Step S103, it is described initial close that second processing acquisition is carried out to the first password based on the Cipher Processing rule
Code, and using the initial password as final checking password.
In the embodiment of the present application, after first password and Cipher Processing rule is obtained, it is possible to based on described close
Code processing rule carries out second processing to the first password and obtains the initial password.And the initial password obtained is exactly user
The final checking password set, for carrying out login authentication, payment verification etc..
First processing procedure is that the process that processing obtains first password is carried out to initial password, the second processing mistake
Journey is that the process that processing obtains initial password is carried out to first password, it is seen that the first processing procedure is complete with second processing process
Opposite process.
It should be noted that the password that the embodiment of the present application simply schematically illustrates user's input is to be based on default Cipher Processing
Rule carries out the password after the first processing to initial password.Certainly, user in actual applications, can also set to directly input and test
Demonstrate,prove password.Can show two buttons in user interface, one of button indication need to user in Password Input frame it is defeated
The password entered carries out second processing to obtain checking password, that is, the method for the embodiment of the present application, and another button indication is used
The password of family input is exactly to verify password, it is not necessary to and the password inputted to user in Password Input frame carries out second processing, and
Server is sent to be verified.User can select either to set any login or the means of payment in advance.
The embodiment of the present application is to carry out first according to default Cipher Processing rule by the initial password set to user
First password is obtained after processing, user remembers first password, when user needs login authentication or payment verification, by first
In Password Input Password Input frame, initial password is obtained after carrying out second processing to first password based on Cipher Processing rule, this
Individual initial password can serve as verifying that password operates to verify whether to have permission to log in or have permission payment etc..Due to
Family only needs to remember first password, and the first password is not real checking password, therefore, even if other people peep
Or first password is stolen, it the verification operation such as also can not be logged in or be paid using first password.Therefore, this password
The mode of processing is safer.
Fig. 2 is the schematic flow sheet for the cipher processing method that the another embodiment of the application provides, and this method can as shown in the figure
To comprise the following steps:
Step S201, obtain the initial password and Cipher Processing rule of user's input.
In the embodiment of the present application, the initial password is the checking password of user's confirmation (for example, login password or payment
Password).The Cipher Processing rule can be set by user, for example, when user wants initial password is carried out to upset processing
When, initial password can be inputted in initial password frame and Cipher Processing rule is inputted in Cipher Processing rule frame.Make
For citing, it is " abcdef " that user can input initial password in initial password frame, is inputted in Cipher Processing rule frame close
Code processing rule is " 32 ".
Step S202, it is close that the first processing acquisition described first is carried out to the initial password based on the Cipher Processing rule
Code, and the first password is shown in clear text manner, so that user is subsequently using the first password as input password.
In the embodiment of the present application, the first processing can be carried out to the initial password according to following processing mode:
Step A1:It is G to set Cipher Processing rule, and initial password M, length (G) represent Ah in Cipher Processing rule
The number of Arabic numbers, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and M [k] is represented in initial password k-th
Code characters, length (M) represent the number of code characters in initial password;
Step A2:Initialize k=1;
Step A3:If k≤length (G), step A4 is performed;
Step A4:If G [k]>Length (M), then perform step A5;If G [k]≤length (M), M [k] and M is exchanged
Step A5 is performed behind the position of [G [k]];
Step A5:K=k+1 is made, and returns and performs step A3, until k>During length (G), after the completion of place-exchange
Initial password is as the first password.
By way of example it is assumed that initial password is " abcdef ", k is from 1 natural number for getting length (G) always, it is assumed that
In Cipher Processing rule the number of Arabic numerals be 2, then k be got always from 12 natural number (i.e. 1,2).Assuming that at password
Manage regular G=298635, then length (G)=6, k value be exactly successively from 1 get 7 natural number (i.e. 1,2,3,4,5,6,
7)。
When initializing k=1, meet k≤length (G), and meet G [k]≤length (M), then by M [1] and M [2]
Exchange position and obtain bacdef, the value that k plus 1 causes k is changed into 2;
As k=2, meet k≤length (G), and meet G [k]≤> length (M), then need not exchange position, obtain
Be still bacdef, by k plus 1 cause k value be changed into 3;
As k=3, meet k≤length (G), and meet G [k]≤> length (M), then need not exchange position, obtain
Be still bacdef, by k plus 1 cause k value be changed into 4;
As k=4, meet k≤length (G), and meet G [k]≤length (M), then M [4] and M [6] is exchanged into position
Put to obtain bacfed, the value that k plus 1 causes k is changed into 5;
As k=5, meet k≤length (G), and meet G [k]≤length (M), then M [5] and M [3] is exchanged into position
Put to obtain baefcd, the value that k plus 1 causes k is changed into 6;
As k=6, meet k≤length (G), and meet G [k]≤length (M), then M [6] and M [5] is exchanged into position
Put to obtain baefdc, the value that k plus 1 causes k is changed into 7;
And as k=7, k > length (G), acquisition is exactly first password baefdc.The also table in k > length (G)
Show that the first processing terminates.
After first password is obtained, show the first password in clear text manner, in order to user can remember it is described
First password is as input password.
By analysis above, the process of the first processing is that initial password is upset to the process of order rearrangement, in reality
In the application of border, other processing procedures are can also be, for example, deleting, increase.
By way of example it is assumed that Cipher Processing rule is 5, it is close the 5th character deletion in initial password can be obtained first
Code, and is stored in default storage region by the 5th character, in order to which first password is generated the during initial password
5 characters, which increase to, obtains initial password in first password.It is, of course, also possible to be increased operation, for example, by initial password
The front or behind of 5th character increases a preset characters and obtains first password, is being initial close by first password processing
During code, the preset characters of the 5th character front or behind are deleted.It is, of course, also possible to it is, by the of initial password
After 5 characters are converted into ASCII character, add or subtract present count and obtain first password, and present count is stored in default
Storage region.By the first password processing obtain initial password during from default storage region obtain present count with
It is easy to subtract the 5th character in first password or obtains initial password plus present count.
It is above that 1 Arabic numerals is illustrated only by Cipher Processing rule setting, can be by Cipher Processing in practical application
Rule setting is the processing procedure that multidigit Arabic numerals carry out the example above.
Step S203, the Cipher Processing rule is encrypted, and the Cipher Processing rule after encryption is stored
To default storage region.
In the embodiment of the present application, due to obtaining the process of first password from initial password, with being obtained just from first password
The process of beginning password is based on identical Cipher Processing rule, and is antipodal process, it is therefore desirable to by the Cipher Processing
Rule is stored in default storage region.So, first password is being carried out during second processing obtains initial password just
The Cipher Processing rule can be obtained from default storage region., can also be by institute in order to further ensure the safety of password
State Cipher Processing rule to be first encrypted, the Cipher Processing rule after encryption is stored to default storage region.
The default storage region can be some storage region in terminal device, can also be with the terminal device have communicate
(for example, cloud storage) in the storage region of other terminal devices of connection.
Step S204, after the input that user completes first password is detected, obtain the first password.
In the embodiment of the present application, user needs to input original after first password is obtained according to initial password in script
Only need to input first password in the register of beginning password or delivery operation.Due to first password being processed into initially
The process of password must obtain Cipher Processing rule, so, even if user, during first password is inputted, other users steal
The first password is peeped or stolen, is to be proved to be successful when being logged in by first password or payment verification
's.Because if it is to succeed that the first password is directly logged in into confirmation or payment affirmation, checking as checking password
's;The login authentication or payment verification of server are carried out after if second processing is also passed through to the first password again, due to it
His user and Cipher Processing rule corresponding to can not knowing, so, password can not be still verified, leads to not Successful login
Or can not successfully it pay.
Step S205, obtain the Cipher Processing rule in the default storage region.
In the embodiment of the present application, due to by first password processing processing generation initial password during be with will just
The process of beginning Cipher Processing generation first password is antipodal process, but is based on identical Cipher Processing rule.This
With regard to needing to obtain the Cipher Processing rule by initial password processing for first password.It is by the password in step S203
Reason rule is stored in default storage region, it is only necessary to is obtained from default storage region.If the Cipher Processing rule
Then pass through encryption, after Cipher Processing rule is got from default storage region, also need to the operation of decryption accordingly.
Step S206, it is described initial close that second processing acquisition is carried out to the first password based on the Cipher Processing rule
Code, and using the initial password as final checking password.
In the embodiment of the present application, second processing can be carried out to the first password according to following processing mode:
Step B1:It is G to set Cipher Processing rule, and first password m, length (G) represent Ah in Cipher Processing rule
The number of Arabic numbers, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and m [k] is represented in first password k-th
Code characters;Length (m) represents the number of code characters in first password;
Step B2:Initialize k=length (G);
Step B3:If k > 0, step B4 is performed;
Step B4:If G [k]>Length (m), then perform step B5;If G [k]≤length (m), m [k] and m is exchanged
Step B5 is performed behind the position of [G [k]];
Step B5:K=k-1 is made, and returns and performs step B3, it is when k≤0, first after the completion of place-exchange is close
Code is used as the initial password.
As an example, it will be assumed that the first password m=baefdc of acquisition, then length (m)=6.What is obtained simultaneously is close
Code handles regular G=298635, then length (G)=6, k value be exactly from 6 take successively natural number until get 0 (i.e. 6,5,
4、3、2、1、0)。
When initializing k=6, meet k > 0, and meet G [k]≤length (m), then exchange m [6] and m [5] position,
Baefcd is obtained, subtracting 1 by k causes k value to be changed into 5;
As k=5, meet k > 0, and meet G [k]≤length (m), then exchange m [5] and m [3] position, obtain
Bacfed, k is subtracted 1 and causes k value to be changed into 4;
As k=4, meet k > 0, and meet G [k]≤length (m), then exchange m [4] and m [6] position, obtain
Bacdef, k is subtracted 1 and causes k value to be changed into 3;
As k=3, meet k > 0, and meet G [k] > length (m), then need not exchange position, what is obtained is still
Bacdef, k is subtracted 1 and causes k value to be changed into 2;
As k=2, meet k > 0, and meet G [k] > length (m), then need not exchange position, what is obtained is still
Bacdef, k is subtracted 1 and causes k value to be changed into 1;
As k=1, meet k > 0, and meet G [k]≤length (m), then exchange m [1] and m [2] position, obtain
Abcdef, k is subtracted 1 and causes k value to be changed into 0;
And as k=0, acquisition is exactly initial password abcdef, and the initial password of acquisition can serve as verifying that password is used
In login authentication or payment verification.Simultaneously during k=0, represent that second processing terminates.
By comparing the process of initial password processing generation first password and generating first password processing initial close
The process of code can show that the Cipher Processing rule of use is identical, the difference is that the process of processing is antipodal mistake
Journey.So as long as user, by Cipher Processing rule encrypting storing, enters after first password is obtained according to initial password in user
When row login or payment verification, it can be obtained the first password of acquisition as input password, system at the password of user's preservation
Reason rule, the Cipher Processing rule is decrypted, be then based on Cipher Processing rule first password is reduced to it is initial close
Code, that is, verify password.So, if user is during password is inputted, even if being peeped by other users to Qi Tayong
If family leads to not the first password of acquisition as checking password, natural authentication failed log in or can not paid;If
The first password of acquisition is also passed through second processing by other users, due to other users and can not get Cipher Processing rule,
So can not still get really checking password, it also just successful log or can not can not successfully pay, improve user
The security of account or property.
It should be understood that the size of the sequence number of each step is not meant to the priority of execution sequence, each process in above-described embodiment
Execution sequence should determine that the implementation process without tackling the embodiment of the present application forms any limit with its function and internal logic
It is fixed.
Fig. 3 is the schematic block diagram for the terminal device that the embodiment of the application one provides, and for convenience of description, is only shown and this Shen
Please the related part of embodiment.
The terminal device 3 can be built in the terminal devices such as mobile phone, notebook software unit, hardware cell or
The unit of soft or hard combination, it can also be integrated into as independent suspension member in existing terminal device.
The terminal device 3 includes:
First password acquisition module 31, for after the input that user completes first password is detected, obtaining described first
Password, the first password are to carry out the password after the first processing to initial password by default Cipher Processing rule
Cipher Processing rule acquisition module 32, for obtaining the Cipher Processing rule;
Initial password generation module 33, for carrying out second processing to the first password based on the Cipher Processing rule
The initial password is obtained, and using the initial password as final checking password.
Optionally, the terminal device 3 also includes:
Initial password acquisition module 34, for obtaining the initial password and Cipher Processing rule of user's input;
First password generation module 35, for carrying out the first processing to the initial password based on the Cipher Processing rule
The first password is obtained, and shows the first password in clear text manner, so that user subsequently makees the first password
To input password.
Optionally, the terminal device 3 also includes:
Memory module 36 is encrypted, for the Cipher Processing rule to be encrypted, and will be close after encryption
Code processing rule is stored to default storage region.
Optionally, the Cipher Processing rule is made up of at least one zero Arabic numerals of being more than, and at the password
Numeral in reason rule differs.
Optionally, the first password generation module 35 is specifically used for:
Step A1:It is G to set Cipher Processing rule, and initial password M, length (G) represent Ah in Cipher Processing rule
The number of Arabic numbers, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and M [k] is represented in initial password k-th
Code characters, length (M) represent the number of code characters in initial password;
Step A2:Initialize k=1;
Step A3:If k≤length (G), step A4 is performed;
Step A4:If G [k]>Length (M), then perform step A5;If G [k]≤length (M), M [k] and M is exchanged
Step A5 is performed behind the position of [G [k]];
Step A5:K=k+1 is made, and returns and performs step A3, until k>During length (G), after the completion of place-exchange
Initial password is as the first password.
Optionally, the initial password generation module 33 is specifically used for:
Step B1:It is G to set Cipher Processing rule, and first password m, length (G) represent Ah in Cipher Processing rule
The number of Arabic numbers, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and m [k] is represented in first password k-th
Code characters;Length (m) represents the number of code characters in first password;
Step B2:Initialize k=length (G);
Step B3:If k > 0, step B4 is performed;
Step B4:If G [k]>Length (m), then perform step B5;If G [k]≤length (m), m [k] and m is exchanged
Step B5 is performed behind the position of [G [k]];
Step B5:K=k-1 is made, and returns and performs step B3, it is when k≤0, first after the completion of place-exchange is close
Code is used as the initial password.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work(
Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different
Functional unit, module are completed, will the internal structure of the terminal device be divided into different functional units or module, to complete
All or part of function described above.Each functional unit, module in embodiment can be integrated in a processing unit,
Can also be that unit is individually physically present, can also two or more units it is integrated in a unit, above-mentioned collection
Into unit can both have been realized in the form of hardware, can also be realized in the form of SFU software functional unit.In addition, each function
Unit, the specific name of module are not limited to the protection domain of the application also only to facilitate mutually distinguish.Above-mentioned dress
Middle unit, the specific work process of module are put, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Fig. 4 is the schematic block diagram for the terminal device that the another embodiment of the application provides.As shown in figure 4, the end of the embodiment
End equipment 4 includes:One or more processors 40, memory 41 and it is stored in the memory 41 and can be in the processing
The computer program 42 run on device 40.The processor 40 is realized when performing the computer program 42 at above-mentioned each password
Manage the step in embodiment of the method, such as the step S101 to S103 shown in Fig. 1.Or the processor 40 performs the meter
The function of each module/unit in above-mentioned terminal device embodiment, such as module 31 to 33 shown in Fig. 3 are realized during calculation machine program 42
Function.
Exemplary, the computer program 42 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 41, and are performed by the processor 40, to complete the application.Described one
Individual or multiple module/units can be the series of computation machine programmed instruction section that can complete specific function, and the instruction segment is used for
Implementation procedure of the computer program 42 in the terminal device 4 is described.For example, the computer program 42 can be divided
It is cut into first password acquisition module, Cipher Processing rule acquisition module, initial password generation module.
The first password acquisition module, for after the input that user completes first password is detected, obtaining described the
One password, the first password are to carry out the password after the first processing to initial password by default Cipher Processing rule
The Cipher Processing rule acquisition module, for obtaining the Cipher Processing rule;
The initial password generation module, for being carried out based on the Cipher Processing rule to the first password at second
Reason obtains the initial password, and using the initial password as final checking password.
Other modules can refer to the description in the embodiment shown in Fig. 3, will not be repeated here.
The terminal device includes but are not limited to processor 40, memory 41.It will be understood by those skilled in the art that figure
4 be only an example of terminal device 4, does not form the restriction to terminal device 4, can be included more more or less than illustrating
Part, either combine some parts or different parts, such as the terminal device can also include input equipment, defeated
Go out equipment, network access equipment, bus etc..
The processor 40 can be CPU (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng.
The memory 41 can be the internal storage unit of the terminal device 4, such as the hard disk of terminal device 4 or interior
Deposit.The memory 41 can also be the External memory equipment of the terminal device 4, such as be equipped with the terminal device 4
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, dodge
Deposit card (Flash Card) etc..Further, the memory 41 can also both include the storage inside list of the terminal device 4
Member also includes External memory equipment.The memory 41 is used to store needed for the computer program and the terminal device
Other programs and data.The memory 41 can be also used for temporarily storing the data that has exported or will export.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and is not described in detail or remembers in some embodiment
The part of load, it may refer to the associated description of other embodiments.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Member and algorithm steps, it can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
Performed with hardware or software mode, application-specific and design constraint depending on technical scheme.Professional and technical personnel
Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed
Scope of the present application.
In embodiment provided herein, it should be understood that disclosed terminal device and method, it can be passed through
Its mode is realized.For example, terminal device embodiment described above is only schematical, for example, the module or list
The division of member, only a kind of division of logic function can have an other dividing mode when actually realizing, for example, multiple units or
Component can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, show
Show or the mutual coupling discussed or direct-coupling or communication connection can be by some interfaces, between device or unit
Coupling or communication connection are connect, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated module/unit realized in the form of SFU software functional unit and as independent production marketing or
In use, it can be stored in a computer read/write memory medium.Based on such understanding, the application realizes above-mentioned implementation
All or part of flow in example method, by computer program the hardware of correlation can also be instructed to complete, described meter
Calculation machine program can be stored in a computer-readable recording medium, and the computer program can be achieved when being executed by processor
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer-readable medium
It can include:Any entity or device, recording medium, USB flash disk, mobile hard disk, the magnetic of the computer program code can be carried
Dish, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It is it should be noted that described
The content that computer-readable medium includes can carry out appropriate increasing according to legislation in jurisdiction and the requirement of patent practice
Subtract, such as in some jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and
Telecommunication signal.
Embodiment described above is only to illustrate the technical scheme of the application, rather than its limitations;Although with reference to foregoing reality
Example is applied the application is described in detail, it will be understood by those within the art that:It still can be to foregoing each
Technical scheme described in embodiment is modified, or carries out equivalent substitution to which part technical characteristic;And these are changed
Or replace, the essence of appropriate technical solution is departed from the spirit and scope of each embodiment technical scheme of the application, all should
Within the protection domain of the application.
Claims (10)
- A kind of 1. cipher processing method, it is characterised in that including:After the input that user completes first password is detected, the first password is obtained, the first password is by default Cipher Processing rule to initial password carry out first processing after password;Obtain the Cipher Processing rule;Second processing is carried out to the first password based on the Cipher Processing rule and obtains the initial password, and will be described first Beginning password is as final checking password.
- 2. cipher processing method as claimed in claim 1, it is characterised in that before the first password is obtained, in addition to:Obtain the initial password and Cipher Processing rule of user's input;The first processing is carried out to the initial password based on the Cipher Processing rule and obtains the first password, and with plaintext Mode shows the first password, so that user is subsequently using the first password as input password.
- 3. cipher processing method as claimed in claim 2, it is characterised in that obtaining the Cipher Processing rule of user's input Afterwards, in addition to:The Cipher Processing rule is encrypted, and the Cipher Processing rule after encryption is stored to default and deposited Storage area domain.
- 4. the cipher processing method as described in any one of claims 1 to 3, it is characterised in that the Cipher Processing rule is by extremely Few Arabic numerals more than zero form, and the Arabic numerals in the Cipher Processing rule differ.
- 5. cipher processing method as claimed in claim 4, it is characterised in that described to be based on the Cipher Processing rule to described Initial password, which carries out the first processing acquisition first password, to be included:Step A1:It is G to set Cipher Processing rule, and initial password M, length (G) represent Arabic in Cipher Processing rule The number of numeral, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and M [k] represents k-th of password in initial password Character, length (M) represent the number of code characters in initial password;Step A2:Initialize k=1;Step A3:If k≤length (G), step A4 is performed;Step A4:If G [k]>Length (M), then perform step A5;If G [k]≤length (M), M [k] and M [G are exchanged [k]] position after perform step A5;Step A5:K=k+1 is made, and returns and performs step A3, until k>, will be initial after the completion of place-exchange during length (G) Password is as the first password.
- 6. the processing method of password as claimed in claim 4, it is characterised in that described to be based on the Cipher Processing rule to institute Stating the first password progress second processing acquisition initial password includes:Step B1:It is G to set Cipher Processing rule, and first password m, length (G) represent Arabic in Cipher Processing rule The number of numeral, G [k] represent k-th of Arabic numerals in Cipher Processing rule, and m [k] represents k-th of password in first password Character, length (m) represent the number of code characters in first password;Step B2:Initialize k=length (G);Step B3:If k > 0, step B4 is performed;Step B4:If G [k]>Length (m), then perform step B5;If G [k]≤length (m), m [k] and m [G are exchanged [k]] position after perform step B5;Step B5:K=k-1 is made, and returns and performs step B3, when k≤0, the first password after the completion of place-exchange is made For the initial password.
- A kind of 7. terminal device, it is characterised in that including:First password acquisition module, for after the input that user completes first password is detected, obtaining the first password, institute It is to carry out the password after the first processing to initial password by default Cipher Processing rule to state first passwordCipher Processing rule acquisition module, for obtaining the Cipher Processing rule;Initial password generation module, institute is obtained for carrying out second processing to the first password based on the Cipher Processing rule Initial password is stated, and using the initial password as final checking password.
- 8. terminal device as claimed in claim 7, it is characterised in that also include:Initial password acquisition module, for obtaining the initial password and Cipher Processing rule of user's input;First password generation module, institute is obtained for carrying out the first processing to the initial password based on the Cipher Processing rule First password is stated, and shows the first password in clear text manner, so that user is subsequently using the first password as input Password.
- 9. a kind of terminal device, including memory, processor and it is stored in the memory and can be on the processor The computer program of operation, it is characterised in that realize such as claim 1 to 6 described in the computing device during computer program The step of any one methods described.
- 10. a kind of computer-readable recording medium, it is characterised in that the computer-readable recording medium storage has computer journey Sequence, realized when the computer program is executed by one or more processors such as the step of any one of claim 1 to 6 methods described Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711069097.1A CN107895105B (en) | 2017-11-03 | 2017-11-03 | Password processing method, terminal equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711069097.1A CN107895105B (en) | 2017-11-03 | 2017-11-03 | Password processing method, terminal equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107895105A true CN107895105A (en) | 2018-04-10 |
CN107895105B CN107895105B (en) | 2020-06-09 |
Family
ID=61803060
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711069097.1A Active CN107895105B (en) | 2017-11-03 | 2017-11-03 | Password processing method, terminal equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107895105B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113158150A (en) * | 2021-04-14 | 2021-07-23 | 捷德(中国)科技有限公司 | Verification method, device and system |
CN113282913A (en) * | 2021-07-23 | 2021-08-20 | 天聚地合(苏州)数据股份有限公司 | Password replacement method and device |
CN113973000A (en) * | 2020-07-25 | 2022-01-25 | 华为技术有限公司 | Method and device for processing pre-shared key PSK |
CN114005201A (en) * | 2021-10-26 | 2022-02-01 | 珠海格力电器股份有限公司 | Door lock control method and device, electronic equipment and storage medium |
CN114117416A (en) * | 2021-09-16 | 2022-03-01 | 山东大学 | SAT-based visualization method and system for symmetric password automated analysis platform |
CN114726516A (en) * | 2022-03-28 | 2022-07-08 | 北京汇元网科技股份有限公司 | Encryption method, system, terminal equipment and storage medium for fusing card number and password |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1851788A (en) * | 2006-03-30 | 2006-10-25 | 周忠杰 | Password setting metod |
CN102932152A (en) * | 2012-11-03 | 2013-02-13 | 张金木 | Authentication technology adopting dynamic and static mixed passwords |
US20140157121A1 (en) * | 2012-11-30 | 2014-06-05 | International Business Machines Corporation | Preventing malicious observance of private information |
CN104090688A (en) * | 2014-08-06 | 2014-10-08 | 广东欧珀移动通信有限公司 | Password input method and device for mobile terminal |
CN104156679A (en) * | 2014-07-16 | 2014-11-19 | 惠州Tcl移动通信有限公司 | Electronic equipment, unlocking password setting method thereof and unlocking method thereof |
-
2017
- 2017-11-03 CN CN201711069097.1A patent/CN107895105B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1851788A (en) * | 2006-03-30 | 2006-10-25 | 周忠杰 | Password setting metod |
CN102932152A (en) * | 2012-11-03 | 2013-02-13 | 张金木 | Authentication technology adopting dynamic and static mixed passwords |
US20140157121A1 (en) * | 2012-11-30 | 2014-06-05 | International Business Machines Corporation | Preventing malicious observance of private information |
CN104156679A (en) * | 2014-07-16 | 2014-11-19 | 惠州Tcl移动通信有限公司 | Electronic equipment, unlocking password setting method thereof and unlocking method thereof |
CN104090688A (en) * | 2014-08-06 | 2014-10-08 | 广东欧珀移动通信有限公司 | Password input method and device for mobile terminal |
Non-Patent Citations (1)
Title |
---|
张俊伟等: "基于位置密钥交换的UC安全模型", 《计算机研究与发展》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113973000A (en) * | 2020-07-25 | 2022-01-25 | 华为技术有限公司 | Method and device for processing pre-shared key PSK |
CN113158150A (en) * | 2021-04-14 | 2021-07-23 | 捷德(中国)科技有限公司 | Verification method, device and system |
CN113282913A (en) * | 2021-07-23 | 2021-08-20 | 天聚地合(苏州)数据股份有限公司 | Password replacement method and device |
CN114117416A (en) * | 2021-09-16 | 2022-03-01 | 山东大学 | SAT-based visualization method and system for symmetric password automated analysis platform |
CN114117416B (en) * | 2021-09-16 | 2024-04-12 | 山东大学 | SAT-based symmetric password automatic analysis platform visualization method and system |
CN114005201A (en) * | 2021-10-26 | 2022-02-01 | 珠海格力电器股份有限公司 | Door lock control method and device, electronic equipment and storage medium |
CN114726516A (en) * | 2022-03-28 | 2022-07-08 | 北京汇元网科技股份有限公司 | Encryption method, system, terminal equipment and storage medium for fusing card number and password |
CN114726516B (en) * | 2022-03-28 | 2024-08-30 | 北京汇元网科技股份有限公司 | Encryption method for fusing card number and password, terminal equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107895105B (en) | 2020-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107895105A (en) | A kind of cipher processing method, terminal device and computer-readable recording medium | |
US10438187B2 (en) | Establishment of a secure session between a card reader and a mobile device | |
EP3140796B1 (en) | Establishment of a secure session between a card reader and a mobile device | |
CN105320864A (en) | Method and apparatus for processing event operation | |
CN110494854A (en) | Use the Verification System of multi-party computations | |
US20160127134A1 (en) | User authentication system and method | |
CN107004080A (en) | Environment sensing security token | |
CN109150903A (en) | A kind of account management method, device, storage medium and terminal device | |
CN106503996A (en) | Payment transaction based on web provides equipment, method and system | |
CN106462706A (en) | A method and apparatus for providing client-side score-based authentication | |
CN107451819A (en) | A kind of auth method and device based on user's operation behavior feature | |
CN107480513B (en) | Authentication implementation method and device, computer device and readable storage medium | |
CN103888942B (en) | Data processing method based on negotiation secret keys | |
CN112636914B (en) | Identity verification method, identity verification device and smart card | |
CN107733973A (en) | Method of controlling security, terminal, server and computer-readable medium | |
CN105897417A (en) | Encrypted data input method and encrypted data input device | |
CN103634328A (en) | Authentication method, device and system for network platform authentication server | |
US8984599B2 (en) | Real time password generation apparatus and method | |
CN107769928A (en) | A kind of terminal and computer-readable recording medium | |
CN104346550A (en) | Information processing method and electronic equipment | |
CN108183889A (en) | Identity identifying method and identification authentication system | |
CN102938033A (en) | System for enhancing safety of U shield for bank and application method thereof | |
CN108156273A (en) | A kind of anonymous ID generation methods, device and electronic equipment | |
EP3528154B1 (en) | Systems and methods for authentication code entry using mobile electronic devices | |
CN108521822A (en) | Cipher safety inputting method in POS machine and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |