Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.Based on the embodiment of the present invention, those skilled in the art are in the premise for not making creative work
Under every other embodiment obtained, shall fall within the protection scope of the present invention.
When carrying out Cipher Strength detection due to canonical check addition, examination criteria is excessively single, is generally only suitable for pure digi-tal
The password of the password of character or pure alphabetic character carries out Cipher Strength detection, will for the password comprising multiple types character
The Cipher Strength of password can not be accurately calculated, be easy to appear and the weak password of Cipher Strength is detected as strong close of Cipher Strength
Code, and the strong password of Cipher Strength is detected as the weak password of Cipher Strength, with the high problem of Cipher Strength detection False Rate.
In the embodiment of the present invention, by analyzing password to be detected, a variety of cryptographic properties information of password are obtained,
And the corresponding overall score score value of the password and Cipher Strength are calculated according to the cryptographic properties information and default computation rule
Total weight;Then, the fuzzy controller that the overall score score value and the total weight input of the Cipher Strength is pre-generated, by institute
It states fuzzy controller and the corresponding password of the password is obtained according to the overall score score value and the total weight calculation of the Cipher Strength
Intensity;So that the Cipher Strength is accurately calculated;Also, due to the fuzzy controller be according to it is gathered in advance
Know the corresponding overall score score value sample data of password, the total weight samples data of the corresponding Cipher Strength of the known password and institute
The fuzzy controller that the corresponding Cipher Strength sample data of password known to stating generates, and the corresponding Cipher Strength of the known password
Sample data is the data obtained by multiple practice summary, therefore, can greatly improve the accuracy of Cipher Strength detection, no
It will appear and the weak password of Cipher Strength is detected as the strong password of Cipher Strength, and the strong password of Cipher Strength is detected as password
The case where intensity weak password, effectively reduces Cipher Strength detection and the probability judged by accident occurs, has the characteristics that high reliablity, energy
Safety enough for password setting provides preferable guarantee.
A kind of implementation process schematic diagram of Cipher Strength detection method provided in an embodiment of the present invention as shown in figure 1, should
Method is applied to terminal, can be executed by the Cipher Strength detection device configured in terminal, suitable for that need to carry out Cipher Strength inspection
The situation of survey, including step 101 is to step 103.
Step 101, password to be detected is received, and the password is analyzed, obtains cryptographic properties information;
The password to be detected can carry out the password of input when Account Registration for user;The password is generally used to protect
The account safety of user, and the password of the higher Cipher Strength of setting is usually required, just it is avoided that other people easily realize password
It cracks.Therefore, when user carries out Password Input, the detection of Cipher Strength can be carried out, to the password that user inputs with verifying
The safety of the password of user's input.
Optionally, in certain embodiments of the present invention, in above-mentioned steps 101, character analysis is carried out to the password,
Cryptographic properties information is obtained, may include: that character analysis is carried out to the password, obtain total number of characters, the number of the password
The total number of characters of character, the total number of characters of consecutive identical numerical character, the total number of characters of alphabetic character, the total character of consecutive identical alphabetic character
One of number, the total number of characters of spcial character and consecutive identical spcial character character number or a variety of cryptographic properties information.
Specifically, as shown in Fig. 2, it is described to the password carry out character analysis, obtain cryptographic properties information, can wrap
It includes: step 201 to step 203.
Step 201, each character in the password is matched with the character in preset characters library respectively, and according to
Matching result determines the character types of each character in the password.
In the embodiment of the present invention, the character types include numerical character, alphabetic character and spcial character.The predetermined word
Fu Ku is previously stored with all numerical characters (for example, 0~9), all alphabetic characters (such as capitalization A~Z and small letter
Alphabetical a~z) and all spcial characters (for example, punctuation mark, oeprator etc.).
In the embodiment of the present invention, by the way that each character in the password is carried out with the character in preset characters library respectively
Matching can determine that the corresponding character types of each character in the password.
Step 202, according to the character types of character each in the password, the numerical character that statistics obtains the password is total
Number of characters, the total number of characters of consecutive identical numerical character, the total number of characters of alphabetic character, the total number of characters of consecutive identical alphabetic character, spy
The different total number of characters of character and consecutive identical spcial character character number.
For example, when the password of user's input is " 01m5da!It, can be by by the first character of the password when gh9990 "
Symbol is matched with character in preset characters library, determines that the first character of the password is numerical character;It then, will be described close
Second character of code is matched with character in the preset characters library, determines that second character of the password is also number
Character, and so on, the character types of each character of the password can be determined, so as to according to each in the password
The character types of character, statistics obtain the total number of characters of numerical character, the total number of characters of consecutive identical numerical character, word of the password
The total number of characters of alphabetic character, the total number of characters of consecutive identical alphabetic character, the total number of characters of spcial character and consecutive identical special character word
Accord with number.
Step 203, to the total number of characters of the numerical character, the total number of characters of the alphabetic character and the total word of the spcial character
Symbol number is added up to obtain total number of characters of the password.
Since the password can be made of numerical character, alphabetic character and spcial character, obtaining the password
Total number of characters when, can be according to the total number of characters of the numerical character, the total word of the alphabetic character counted in step 202
Symbol number and the total number of characters of the spcial character are added up to obtain.
It should be noted that being herein only that the cryptographic properties information of password is illustrated, it is not expressed as to this
The restriction of invention protection scope, in certain embodiments of the present invention, the cryptographic properties information of the password can also include
Other cryptographic properties information.For example, it is also possible to include the total number of characters of continuous number character, that is, what numerical character continuously occurred
Number;It can also include the total number of characters of contiguous alphabet character, that is, the number that alphabetic character continuously occurs;Etc..
Wherein, the spcial character refers to the character in addition to the numerical character, alphabetic character.For example, character "!" etc.
Deng.
Step 102, the corresponding overall score of the password is calculated according to the cryptographic properties information and default computation rule
Score value and the total weight of Cipher Strength.
It, can be according to institute after obtaining the corresponding cryptographic properties information of password to be detected in the embodiment of the present invention
It states cryptographic properties information and default computation rule calculates the corresponding overall score score value of the password to be detected and Cipher Strength
Total weight.
Optionally, as shown in figure 3, described calculate the password according to the cryptographic properties information and default computation rule
Corresponding overall score score value may include step 301 to step 305.
Step 301, corresponding first score value of total number of characters of the password is determined using the first default computation rule.
Step 302, determine that the numerical character for including in the password is second point corresponding using the second default computation rule
Value.
Step 303, computation rule is preset using third determine the corresponding third point of the alphabetic character for including in the password
Value.
Step 304, determine that the spcial character for including in the password is 4th point corresponding using the 4th default computation rule
Value.
Step 305, it adds up, obtains described close to first score value, the second score value, third score value and quartile
The corresponding overall score score value of code.
It should be noted that in embodiments of the present invention, above-mentioned first default computation rule, the second default calculate are advised
Then, third is preset computation rule and the 4th default computation rule and can be preset according to practical application scene, also,
In other embodiments of the invention, above-mentioned overall score score value can also be obtained by the way that more or fewer scoring score values are cumulative.
For example, the first default computation rule are as follows:
The second default computation rule are as follows:
Scoring score value-numerical character deduction score value of the total number of characters of the second score value=number.
The third presets computation rule are as follows:
Scoring score value-alphabetic character deduction score value of the total number of characters of the third score value=letter.
The 4th default computation rule are as follows:
The quartile=spcial character sum scoring score value-spcial character deduction score value.
It should be noted that in embodiments of the present invention, above-mentioned first default computation rule, the second default calculate are advised
Then, the division that third presets computation rule and the 4th default each score value of computation rule can be set according to practical application scene
It is fixed.
Optionally, as shown in figure 4, described determine the password according to the cryptographic properties information and default computation rule
The corresponding total weight of Cipher Strength may include: step 401 to step 402.
Step 401, numerical character accounting, alphabetic character accounting and the spcial character accounting in the password are calculated separately;
Wherein, the numerical character accounting M in the password1Total number of characters of the total number of characters/password of=numerical character;It is described
Alphabetic character accounting M in password2Total number of characters of the total number of characters/password of=alphabetic character;Spcial character in the password
Accounting M3Total number of characters of the total number of characters/password of=spcial character.
Step 402, according to preset digital weight, alphabetical weight and spcial character weight to the numerical character accounting,
Alphabetic character accounting and spcial character accounting add up, and obtain the total weight of the corresponding Cipher Strength of the password.
The preset digital weight, alphabetical weight and spcial character weight can be set according to practical application scene
It is fixed.
For example, the preset digital weight w1It is 1/5, the preset alphabetical weight w2It is 2/5, the preset spy
Different character weight w3Be 2/5, it is described according to preset digital weight, alphabetical weight and spcial character weight to the numerical character
Accounting, alphabetic character accounting and spcial character accounting add up, and obtaining the total weight of the corresponding Cipher Strength of the password is P=
M1w1+M2w2+M3w3。
Step 103, the fuzzy controller that the overall score score value and the total weight input of the Cipher Strength is pre-generated,
It is corresponding that the password obtained according to the overall score score value and the total weight calculation of the Cipher Strength by the fuzzy controller
Cipher Strength;The fuzzy controller is according to the corresponding overall score score value sample data of known password gathered in advance, described
The total weight samples data of the corresponding Cipher Strength of known password and the corresponding Cipher Strength sample data of the known password are raw
At.
The process that the fuzzy controller implements fuzzy control mainly includes fuzzy inputing method, fuzzy reasoning and deblurring
Change.
Wherein, fuzzy inputing method refers to that an actual value by input variable in a basic domain is converted to linguistic variable
Conversion process.
Fuzzy reasoning refers to the reasoning process for carrying out that output is calculated to the input according to fuzzy control rule, at this
In inventive embodiments, the fuzzy control rule is that basis repeatedly practices the obtained Cipher Strength code of points.
Optionally, as shown in figure 5, the generating process of the fuzzy controller may include: step 501 to step 504.
Step 501, the corresponding overall score score value sample data of known password gathered in advance is determined as the Fuzzy Control
First input variable Q of device processedr, the corresponding total weight samples data of Cipher Strength of the known password are determined as described fuzzy
Second input variable Q of controllers, the corresponding Cipher Strength sample data of the known password is determined as the fuzzy control
The output variable T of device.
Wherein, the corresponding overall score score value sample data of the known password, the corresponding Cipher Strength of the known password
Total weight samples data and the corresponding Cipher Strength sample data of the known password can be obtained by practice.
For example, multiple passwords are arranged, and carry out different modes respectively to the multiple password by practice process
The multiple password is determined as the very big password of Cipher Strength, password according to password cracking difficulty size by multiple password cracking
The password of the medium password of the big password of intensity, Cipher Strength, Cipher Strength small password and Cipher Strength very little, and calculate
The corresponding overall score score value of each password and the total weight of Cipher Strength, and then obtain the corresponding overall score score value of the known password
Sample data, the total weight samples data of the corresponding Cipher Strength of the known password and the corresponding password of the known password are strong
Spend sample data.
Step 502, according to the corresponding overall score score value sample data of known password gathered in advance, the known password pair
Described in the total weight samples data of the Cipher Strength answered and the corresponding Cipher Strength sample data of the known password determine respectively
First input variable, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and
Quantizing factor.
For example, described according to the corresponding overall score score value sample data of known password gathered in advance, the known password
The corresponding total weight samples data of Cipher Strength and the corresponding Cipher Strength sample data of the known password determine institute respectively
State the first input variable, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset
It include: according to the corresponding overall score score value sample data of the known password gathered in advance, described known close with quantizing factor
Described in the total weight samples data of the corresponding Cipher Strength of code and the corresponding Cipher Strength sample data of the known password determine
The basic domain of first input variable is [0, first threshold], the fuzzy domain of first input variable be [0, first threshold/
R1, first threshold * 2/R1, first threshold * 3/R1 ..., first threshold], the fuzzy subset be [very little (VS), it is small (S), in
Deng (Z), big (B), very big (VB)], quantizing factor 1;According to the corresponding overall score score value of the known password gathered in advance
Sample data, the total weight samples data of the corresponding Cipher Strength of the known password and the corresponding password of the known password are strong
Degree sample data determines that the basic domain of second input variable is [0, second threshold], and second input variable obscures
Domain is [0, second threshold/R2, second threshold * 2/R2, second threshold * 3/R2 ..., second threshold], and the fuzzy subset is
[very little (VS), small (S), medium (Z), big (B), very big (VB)], quantizing factor 1;According to described gathered in advance known close
The corresponding overall score score value sample data of code, the total weight samples data of the corresponding Cipher Strength of the known password and it is described
Know that the corresponding Cipher Strength sample data of password determines that the basic domain of the third input variable is [0, third threshold value], it is described
The fuzzy domain of third input variable be [0, third threshold value/R3, third threshold value * 2/R3, third threshold value * 3/R3 ..., third threshold
Value], the fuzzy subset is [very little (VS), small (S), medium (Z), big (L), very big (VL)], quantizing factor 1.
Wherein, the first threshold, second threshold, third threshold value can respectively correspond the known password gathered in advance
The maximum value of corresponding overall score score value sample data, the total weight samples data of the known corresponding Cipher Strength of password are most
The maximum value of big value and the corresponding Cipher Strength of the known password.For example, the first threshold can be 100, described the
Two threshold values can be 1, and the third threshold value can be 1, and R1, R2 and R3 can be calculated according to practical experience.
Step 503, according to the known corresponding overall score score value sample data of password gathered in advance, described known close
The total weight samples data of the corresponding Cipher Strength of code, the known corresponding Cipher Strength sample data of password and described first
Input variable, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and
Quantizing factor establishes the first membership function of first input variable respectively, the second of second input variable is subordinate to letter
The third membership function of the several and described output variable.
The membership function of fuzzy controller generally comprises: Gauss π membership function, generalized bell membership function, S type are subordinate to
Function, trapezoidal membership function, triangular membership and Z-shaped membership function.
In practical applications, by the practical experience of expert it is found that S π membership function can efficiently solve Cipher Strength
The problem of detection.Therefore, as shown in fig. 6, first membership function for establishing first input variable respectively, described second
Second membership function of input variable and the third membership function of the output variable may include: to establish described first respectively
S π membership function F (x)=1/ (1+e of input variable, second input variable and the third input variable-a(x-c)),
In, the value of first membership function, the second membership function and third membership function corresponding a and c can basis
The corresponding overall score score value sample data of the known password gathered in advance, the known corresponding Cipher Strength of password are always weighed
It is same notebook data, the known corresponding Cipher Strength sample data of password and first input variable, described second defeated
Enter variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and quantizing factor are fitted examination
It tests to obtain.
Corresponding Linguistic Value between input variable and output variable may be implemented by the membership function.Step 504, according to
The corresponding overall score score value sample data of known password gathered in advance, the total weight sample of the known corresponding Cipher Strength of password
Notebook data and the known corresponding Cipher Strength sample data of password establish first input variable, second input
Cipher Strength code of points between variable and the output variable, and be subordinate to according to the Cipher Strength code of points, first
Function, the second membership function and third membership function establish the fuzzy controller.
For example, corresponding obtaining the corresponding overall score score value sample data of a large amount of known password, the known password
The total weight samples data of Cipher Strength and the known corresponding Cipher Strength sample data of password after, can establish as
Cipher Strength code of points shown in following table one:
Table one:
It, can be according to the Cipher Strength after establishing above-mentioned Cipher Strength code of points in the embodiment of the present invention
Code of points and first membership function, the second membership function and third membership function complete the generation of fuzzy controller
Journey, and input variable is made inferences using the fuzzy controller to obtain corresponding output variable.
It should be noted that the parameters of above-mentioned generation fuzzy controller are to be obtained according to practical experience, in this hair
In bright some embodiments, above-mentioned parameters can be finely adjusted according to different application scenarios.
In the embodiment of the present invention, by carrying out character analysis to the password, a variety of cryptographic properties information are obtained, and according to
Corresponding score score value and deduction score value is calculated in the corresponding default computation rule of a variety of cryptographic properties information, and
The corresponding overall score score value of the password and the total weight of Cipher Strength are finally obtained, and then fuzzy as what is pre-generated
The input of controller, the corresponding Cipher Strength of the password is calculated by the fuzzy controller, so that the password is strong
Degree is accurately calculated;Also, since the fuzzy controller is according to the corresponding overall score of known password gathered in advance
Score value sample data, the total weight samples data of the corresponding Cipher Strength of the known password and the known password are corresponding close
Code intensity sample data generates, and the known corresponding Cipher Strength sample data of password is obtained by multiple practice summary
Therefore the data arrived can greatly improve the accuracy of Cipher Strength detection, be not in the password detection that Cipher Strength is weak
For the strong password of Cipher Strength, and the case where the strong password of Cipher Strength is detected as Cipher Strength weak password, it is effectively reduced
There is the probability judged by accident in Cipher Strength detection, can objectively avoid the standards of grading because of alphabetic character, numerical character, special word
Continuous occur of symbol and caused by score loophole, have the characteristics that high reliablity, the safety being arranged for password provides preferable guarantor
Barrier.
In embodiments of the present invention, when detecting that the corresponding Cipher Strength of password is very little, is small or medium, output phase is answered
Prompt information, so that user is according to the prompt information Modify password.
It is illustrated in figure 7 the embodiment of the present invention and a kind of structural schematic diagram of Cipher Strength detection device 700 is provided, it is described close
Code intensity detecting device 700 may include: analytical unit 701, computing unit 702 and detection unit 703.
The analytical unit 701 is analyzed for receiving password to be detected, and to the password, obtains password category
Property information;
The computing unit 702, for calculating the password according to the cryptographic properties information and default computation rule
Corresponding overall score score value and the total weight of Cipher Strength;
The detection unit 703, it is pre-generated for inputting the overall score score value and the total weight of the Cipher Strength
Fuzzy controller, institute is obtained according to the overall score score value and the total weight calculation of the Cipher Strength by the fuzzy controller
State the corresponding Cipher Strength of password;The fuzzy controller is according to the corresponding overall score score value sample of known password gathered in advance
Notebook data, the total weight samples data of the corresponding Cipher Strength of the known password and the corresponding Cipher Strength of the known password
What sample data generated.
Optionally, the analytical unit 701, also particularly useful for:
Each character in the password is matched with the character in preset characters library respectively, and according to matching result
Determine the character types of each character in the password;
According to the character types of character each in the password, statistics obtain the password the total number of characters of numerical character,
The total number of characters of consecutive identical numerical character, the total number of characters of alphabetic character, the total number of characters of consecutive identical alphabetic character, spcial character are total
Number of characters and consecutive identical spcial character character number;
The total number of characters of the numerical character, the total number of characters of the alphabetic character and the total number of characters of the spcial character are carried out
It is cumulative to obtain total number of characters of the password.
Optionally, the computing unit 702, also particularly useful for:
Corresponding first score value of total number of characters of the password is determined using the first default computation rule;
Corresponding second score value of numerical character for including in the password is determined using the second default computation rule;
Computation rule, which is preset, using third determines the corresponding third score value of alphabetic character for including in the password;
The corresponding quartile of spcial character for including in the password is determined using the 4th default computation rule;
It adds up to first score value, the second score value, third score value and quartile, it is corresponding to obtain the password
Overall score score value.
Optionally, the computing unit 702, also particularly useful for:
Calculate separately numerical character accounting, alphabetic character accounting and the spcial character accounting in the password;
According to preset digital weight, alphabetical weight and spcial character weight to the numerical character accounting, alphabetic character
Accounting and spcial character accounting add up, and obtain the total weight of the corresponding Cipher Strength of the password.
Optionally, the Cipher Strength detection device 700 can also include the generation unit of fuzzy controller, the generation
Unit is specifically used for:
The corresponding overall score score value sample data of known password gathered in advance is determined as the of the fuzzy controller
The corresponding total weight samples data of Cipher Strength of the known password are determined as the of the fuzzy controller by one input variable
Two input variables become the output that the corresponding Cipher Strength sample data of the known password is determined as the fuzzy controller
Amount;
According to the corresponding overall score score value sample data of known password gathered in advance, the corresponding password of the known password
The total weight samples data of intensity and the known corresponding Cipher Strength sample data of password determine first input respectively
Variable, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and quantization because
Son;
It is corresponding according to the corresponding overall score score value sample data of the known password gathered in advance, the known password
The total weight samples data of Cipher Strength, the known corresponding Cipher Strength sample data of password and first input become
Amount, second input variable and the corresponding basic domain of the output variable, fuzzy domain, fuzzy subset and quantization because
Son, establish respectively the first membership function of first input variable, the second membership function of second input variable and
The third membership function of the output variable;
It is corresponding according to the corresponding overall score score value sample data of the known password gathered in advance, the known password
The total weight samples data of Cipher Strength and the known corresponding Cipher Strength sample data of password establish first input
Cipher Strength code of points between variable, second input variable and the output variable, and according to the Cipher Strength
Code of points, the first membership function, the second membership function and third membership function establish the fuzzy controller.
Optionally, the generation unit, also particularly useful for:
It is corresponding according to the corresponding overall score score value sample data of the known password gathered in advance, the known password
The total weight samples data of Cipher Strength and the known corresponding Cipher Strength sample data of password determine first input
The basic domain of variable is [0, first threshold], the fuzzy domain of first input variable be [0, first threshold/R1, first
Threshold value * 2/R1, first threshold * 3/R1 ..., first threshold], the fuzzy subset is [very little, small, medium, greatly, very greatly], amount
Changing the factor is 1;
It is corresponding according to the corresponding overall score score value sample data of the known password gathered in advance, the known password
The total weight samples data of Cipher Strength and the known corresponding Cipher Strength sample data of password determine second input
The basic domain of variable is [0, second threshold], the fuzzy domain of second input variable be [0, second threshold/R2, second
Threshold value * 2/R2, second threshold * 3/R2 ..., second threshold], the fuzzy subset is [very little, small, medium, greatly, very greatly], amount
Changing the factor is 1;
It is corresponding according to the corresponding overall score score value sample data of the known password gathered in advance, the known password
The total weight samples data of Cipher Strength and the known corresponding Cipher Strength sample data of password determine the third input
The basic domain of variable is [0, third threshold value], the fuzzy domain of the third input variable be [0, third threshold value/R3, third
Threshold value * 2/R3, third threshold value * 3/R3 ..., third threshold value], the fuzzy subset is [very little, small, medium, greatly, very greatly], amount
Changing the factor is 1.
Optionally, the generation unit, also particularly useful for: first input variable, second input are established respectively
The S π membership function of variable and the third input variable.
It should be noted that for convenience and simplicity of description, the specific work of the Cipher Strength detection device 700 of foregoing description
Make process, the corresponding process of Fig. 1 and Fig. 6 the method can be referred to, details are not described herein.
Fig. 8 is the schematic diagram of terminal provided in an embodiment of the present invention.As shown in figure 8, the terminal 8 includes: processor 80, deposits
Reservoir 81 and it is stored in the computer program 82 that can be run in the memory 81 and on the processor 80, such as password
Intensity detection program.The processor 80 realizes that above-mentioned each Cipher Strength detection method is real when executing the computer program 82
Apply the step in example, such as step 101 shown in FIG. 1 is to 103.Alternatively, the processor 80 executes the computer program 82
The function of each module/unit in the above-mentioned each Installation practice of Shi Shixian, such as the function of unit 701 to 703 shown in Fig. 7.
The computer program can be divided into one or more module/units, one or more of modules/mono-
Member is stored in the memory 81, and is executed by the processor 80, to complete the present invention.One or more of moulds
Block/unit can be the series of computation machine program instruction section that can complete specific function, the instruction segment by describe it is described based on
Implementation procedure of the calculation machine program in the terminal.For example, the computer program can be divided into analytical unit, calculate list
Member and detection unit, each unit concrete function are as follows: analytical unit, for receiving password to be detected, and to the password into
Row analysis, obtains cryptographic properties information;Computing unit, for being calculated according to the cryptographic properties information and default computation rule
The corresponding overall score score value of the password and the total weight of Cipher Strength;Detection unit, for by the overall score score value and described
The pre-generated fuzzy controller of the total weight input of Cipher Strength, by the fuzzy controller according to the overall score score value and institute
It states the total weight calculation of Cipher Strength and obtains the corresponding Cipher Strength of the password;The fuzzy controller is according to gathered in advance
The corresponding overall score score value sample data of known password, the total weight samples data of the corresponding Cipher Strength of the known password and
The corresponding Cipher Strength sample data of password known to described generates.
The terminal can be the mobile terminals such as smart phone or desktop PC, notebook, palm PC and
Cloud server etc. calculates equipment.The terminal may include, but be not limited only to, processor 80, memory 81.Those skilled in the art
For member it is appreciated that Fig. 8 is only the example of terminal, the not restriction of structure paired terminal may include more more or less than illustrating
Component, perhaps combine certain components or different components, such as the terminal can also include input-output equipment, net
Network access device, bus etc..
Alleged processor 80 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 81 can be the internal storage unit of the terminal, such as the hard disk or memory of terminal.It is described to deposit
Reservoir 81 is also possible to the plug-in type hard disk being equipped on the External memory equipment of the terminal, such as the terminal, intelligent storage
Block (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..
Further, the memory 81 can also both including the terminal internal storage unit and also including External memory equipment.Institute
Memory 81 is stated for other programs and data needed for storing the computer program and the terminal.The memory 81
It can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal and method can pass through
Other modes are realized.For example, device/terminal embodiment described above is only schematical, for example, the module or
The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units
Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute
Display or the mutual coupling or direct-coupling or communication connection discussed can be through some interfaces, device or unit
INDIRECT COUPLING or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code
Dish, CD, computer storage, read-only memory (Read-Only Memory, ROM), random access memory (Random
Access Memory, RAM), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that the meter
The content that calculation machine readable medium includes can carry out increase and decrease appropriate according to the requirement made laws in jurisdiction with patent practice,
It such as does not include electric carrier signal and telecommunications according to legislation and patent practice, computer-readable medium in certain jurisdictions
Signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.