CN112819061B - Password information identification method, device, equipment and storage medium - Google Patents

Password information identification method, device, equipment and storage medium Download PDF

Info

Publication number
CN112819061B
CN112819061B CN202110113935.0A CN202110113935A CN112819061B CN 112819061 B CN112819061 B CN 112819061B CN 202110113935 A CN202110113935 A CN 202110113935A CN 112819061 B CN112819061 B CN 112819061B
Authority
CN
China
Prior art keywords
confirmed
password
rule
information
text information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110113935.0A
Other languages
Chinese (zh)
Other versions
CN112819061A (en
Inventor
蔡文
余文杰
刘曼烨
涂权蓉
柳亦婷
高贺
仲晨
莫志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202110113935.0A priority Critical patent/CN112819061B/en
Publication of CN112819061A publication Critical patent/CN112819061A/en
Application granted granted Critical
Publication of CN112819061B publication Critical patent/CN112819061B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2462Approximate or statistical queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • G06F16/334Query execution
    • G06F16/3344Query execution using natural language analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computational Linguistics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure relates to a password information identification method, device, equipment and storage medium, wherein the method comprises the following steps: acquiring text information to be identified; matching the text information with the confirmed password identification rule; responding to failure of matching the text information with the confirmed password identification rule, and matching the text information with a preset password identification rule to be confirmed; and determining the text information as password information in response to successful matching of the text information and the password identification rule to be confirmed. The method and the device improve the success rate of password identification on the text information, and are beneficial to follow-up setting operation based on the password identification result.

Description

Password information identification method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for identifying password information.
Background
In the related art, the server side can perform password identification on text information selected by the terminal user, for example, when the text information is identified as specific password information, the text information can be analyzed based on the password information, and further operations such as preset page display and the like are automatically executed on the terminal device based on analysis results, so that good browsing experience is provided for the terminal user. However, the password identification scheme in the related art generally depends on the password identification rule provided by the password provider, and when the password information generation rule of the password provider is changed but a new password identification rule is not provided to the server (or the new password identification rule is not provided in time), the success rate of identifying the password information by the server is reduced, which further affects the use experience of the end user.
Disclosure of Invention
To overcome the problems in the related art, embodiments of the present disclosure provide a password information identification method, apparatus, device, and storage medium, which are used to solve the drawbacks in the related art.
According to a first aspect of embodiments of the present disclosure, there is provided a password information identification method, the method including:
Acquiring text information to be identified;
matching the text information with the confirmed password identification rule;
Responding to failure of matching the text information with the confirmed password identification rule, and matching the text information with a preset password identification rule to be confirmed;
And determining the text information as password information in response to successful matching of the text information and the password identification rule to be confirmed.
In an embodiment, the method further comprises:
and calling a setting instruction analysis interface according to a setting calling proportion to analyze the password information.
In an embodiment, the method further comprises:
determining the analysis success times of the password information successfully matched with the password identification rule to be confirmed;
Determining the recognition success rate of the password recognition rule to be confirmed based on the analysis success times;
and determining the password identification rule to be confirmed as the confirmed password identification rule in response to the identification success rate of the password identification rule to be confirmed being higher than or equal to a first set probability threshold.
In an embodiment, the method further comprises:
and responding to the successfully resolved password information, and executing setting operation based on the successfully resolved password information.
In an embodiment, the method further comprises:
Responding to successful matching of the text information and the confirmed password identification rule, and calling a set instruction analysis interface to analyze the text information as password information;
Responding to the analysis failure of the password information, and determining the analysis failure times of the successfully matched password information of the confirmed password identification rule;
determining the recognition success rate of the confirmed password recognition rule based on the analysis failure times;
And deleting the confirmed password identification rule in response to the identification success rate of the confirmed password identification rule being lower than a second set probability threshold.
According to a second aspect of embodiments of the present disclosure, there is provided a password information identifying apparatus, the apparatus including:
the text information acquisition module is used for acquiring text information to be identified;
the confirmed rule matching module is used for matching the text information with confirmed password identification rules;
The to-be-confirmed rule matching module is used for matching the text information with a preset to-be-confirmed password identification rule in response to failure in matching the text information with the confirmed password identification rule;
and the password information determining module is used for determining the text information as password information in response to successful matching of the text information and the password identification rule to be confirmed.
In an embodiment, the device further comprises:
and the password information analysis module is used for calling a setting instruction analysis interface according to the setting calling proportion to analyze the password information.
In an embodiment, the device further comprises: a validated rule determination module;
the confirmed rule determination module includes:
the success number accumulation unit is used for determining the analysis success number of the password information matched successfully by the password identification rule to be confirmed;
the first probability determining unit is used for determining the recognition success rate of the password recognition rule to be confirmed based on the analysis success times;
and the confirmed rule determining unit is used for determining the password identification rule to be confirmed as the confirmed password identification rule in response to the identification success rate of the password identification rule to be confirmed being higher than or equal to a first set probability threshold value.
In an embodiment, the device further comprises: a confirmed rule deletion module;
the confirmed rule deleting module includes:
The password information analysis unit is used for calling a setting instruction analysis interface to analyze the text information as password information in response to successful matching of the text information and the confirmed password identification rule;
a failure number accumulating unit, configured to determine a number of failed parsing of the password information for which the confirmed password identification rule is successfully matched in response to a failure of parsing of the password information;
A second probability determining unit, configured to determine an identification success rate of the confirmed password identification rule based on the resolution failure number;
and the confirmed rule deleting unit is used for deleting the confirmed password identification rule in response to the identification success rate of the confirmed password identification rule being lower than a second set probability threshold.
According to a third aspect of embodiments of the present disclosure, there is provided an electronic device, the device comprising:
A processor and a memory for storing processor-executable instructions;
wherein the processor is configured to:
Acquiring text information to be identified;
matching the text information with the confirmed password identification rule;
Responding to failure of matching the text information with the confirmed password identification rule, and matching the text information with a preset password identification rule to be confirmed;
And determining the text information as password information in response to successful matching of the text information and the password identification rule to be confirmed.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements:
Acquiring text information to be identified;
matching the text information with the confirmed password identification rule;
Responding to failure of matching the text information with the confirmed password identification rule, and matching the text information with a preset password identification rule to be confirmed;
And determining the text information as password information in response to successful matching of the text information and the password identification rule to be confirmed.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects:
According to the method and the device, the text information to be identified is obtained and matched with the confirmed password identification rule, the text information is matched with the preset password identification rule to be confirmed in response to failure in matching of the text information with the confirmed password identification rule, and then the text information is determined to be the password information in response to success in matching of the text information with the password identification rule to be confirmed.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flowchart illustrating a password information identification method, according to an exemplary embodiment;
FIG. 2 is a flowchart illustrating a password information identification method according to yet another exemplary embodiment;
FIG. 3 is a block diagram of a password information identifying apparatus, according to an example embodiment;
FIG. 4 is a block diagram of a password information identifying apparatus according to yet another exemplary embodiment;
fig. 5 is a block diagram of an electronic device, according to an example embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
FIG. 1 is a flowchart illustrating a password information identification method, according to an exemplary embodiment; the method of the embodiment can be used for a server (for example, a server or a server cluster formed by a plurality of servers) for identifying password information.
As shown in fig. 1, the method includes the following steps S11-S14:
in step S11, text information to be recognized is acquired.
In this embodiment, the server may obtain the text information to be identified from the terminal device used by the user, so as to identify whether the text information is password information.
In an embodiment, the user may select text information based on a client installed on the terminal device, and the client may send the text information to be identified selected by the user to the server.
For example, a user may press a text message for a long time under a transmission gate usage scenario of a terminal device, and then a client of the transmission gate scenario may send the text message to a server for a subsequent password identification operation.
In step S12, the text information is matched with the confirmed password identification rule.
In this embodiment, after the text information to be identified is obtained, the text information may be matched with at least one preset confirmed password identification rule.
The confirmed password identification rule is a rule which is confirmed currently and can be used for identifying whether text information is password information or not, for example, the password identification rule is provided for a server side in advance by a password provider.
In an embodiment, the confirmed password identification rule is used to specify the format of the password information, the type of the included characters, the number of the included characters, and the like, and the specific rule may be based on the type of the password information, which is not limited in this embodiment. For example, if the type of the password information is "panning password" for opening panning web page, the confirmed password identification rule may include: the middle is fixed 7 to 15 digits plus case letters, and the two sides are special symbols. It is worth noting that the special symbols in the confirmed password identification rule are fixed, such as "#", etc.
For example, "afatq 0t15151 a" is an panning password matching the confirmed password identification rule. If the user selects the text information from the client, the client can send the text information to the server, and the server can match the text information with the confirmed password identification rule, so that whether the text information is successfully matched with the confirmed password identification rule or failed to be matched can be determined.
In step S13, in response to the failure of matching the text information with the confirmed password identification rule, matching the text information with a preset password identification rule to be confirmed.
In this embodiment, after the text information is matched with the confirmed password identification rule, if it is determined that the text information fails to match with each rule in the preset confirmed password identification rule, the text information may be matched with at least one preset password identification rule to be confirmed.
The password identification rule to be confirmed may be a preset rule for confirming whether the password identification rule can be a confirmed password identification rule, and the password identification rule to be confirmed may be a confirmed password identification rule when a certain condition (such as the identification success rate is higher than a threshold value) is satisfied.
For example, when the password information generation rule of the password provider changes (for example, the password generation rule of the naughty platform changes), but a new password identification rule is not provided to the server, or is not provided in time, at this time, the server cannot accurately identify whether the text information is the password information based on the confirmed password identification rule. In this case, the above-described text information may be matched with a password recognition rule to be confirmed which is defined in advance.
It should be noted that, the password identification rule to be confirmed may be freely set based on actual needs. In an embodiment, the password identification rule to be confirmed may be obtained based on a manner of performing character replacement or expanding character types on the confirmed password identification rule. For example, hundreds of different symbols may be added to the number of specific symbols contained in the confirmed password identification rule to derive the password identification rule to be confirmed. When the obtained text information is determined to fail to be matched with the confirmed password identification rule, the text information can be matched with the password identification rule to be confirmed.
In step S14, in response to the text information successfully matching the password identification rule to be confirmed, the text information is determined as password information.
In this embodiment, after the text information is matched with a preset password identification rule to be confirmed, if it is determined that the password identification rule to be confirmed, which is matched with the text information, exists in the password identification rule to be confirmed, that is, the text information is successfully matched with the password identification rule to be confirmed, the text information can be determined as the password information, and then the subsequent operations of calling a set instruction analysis interface to analyze the password information can be executed. In an embodiment, the manner of parsing the password information may be referred to the embodiment shown in fig. 2 described below, which will not be described in detail here.
As can be seen from the foregoing description, in the method of this embodiment, by acquiring text information to be identified, matching the text information with a confirmed password identification rule, and matching the text information with a preset password identification rule to be confirmed in response to failure in matching the text information with the confirmed password identification rule, further determining the text information as password information in response to success in matching the text information with the password identification rule to be confirmed, since matching the text information with the password identification rule to be confirmed when failure in matching the text information with the confirmed password identification rule is also performed, success rate of password identification for the text information can be improved, setting operation can be performed based on a password identification result, and user experience can be improved.
FIG. 2 is a flowchart illustrating a password information identification method according to yet another exemplary embodiment; the method of the embodiment can be used for a server (for example, a server or a server cluster formed by a plurality of servers) for identifying password information.
As shown in fig. 2, the method includes the following steps S21 to S36:
In step S21, text information to be recognized is acquired.
In step S22, the text information is matched with the confirmed password identification rule.
In step S23, whether the text information matches the confirmed password identification rule: if not, executing step S24; if yes, go to step S31;
in step S24, the text information is matched with a preset password identification rule to be confirmed.
In step S25, in response to the text information successfully matching the password identification rule to be confirmed, the text information is determined as password information.
Steps S21 to S22 and S24 to S25 are the same as steps S11 to S14 in the embodiment shown in fig. 1, and are not described herein.
In step S26, a setting instruction analysis interface is called according to a setting calling proportion to analyze the password information.
In this embodiment, after the text information is determined as the password information, the password information may be resolved by calling a setting instruction resolving interface according to a setting calling proportion.
The setting call proportion can be set based on actual service requirements, for example, the setting call proportion is set to 20%, namely, 1 call can be successfully performed in the 5-call setting instruction analysis interface. For example, calls may succeed 1 time every 4 times, etc.
It can be understood that after the text information is identified as the password information, the setting instruction analysis interface is called to analyze the password information, so that the text information selected by the user can be prevented from being sent to the setting instruction analysis interface for analysis without distinction, the calling times of the setting instruction analysis interface can be reduced, and the text information selected by the user can be prevented from being leaked to the setting instruction analysis interface.
For example, if the password information is a panning password, the setting instruction analysis interface may be a panning password analysis interface.
In step S27, whether the password information is successfully parsed or not: if yes, go to step S28; if not, step S37 is executed, i.e., the recognition flow is ended.
In this embodiment, after the password information is resolved by calling the set instruction resolving interface, it may be determined whether the password information is resolved successfully, and if the password is resolved successfully, the following step S28 may be executed continuously; otherwise, the current password identification flow may end.
In step S28, the number of times of resolution success of the password information that the password identification rule to be confirmed matches successfully is determined.
In this embodiment, after the password information is successfully parsed, the setting operation may be performed based on the password information after the parsing is successful. For example, an operation corresponding to the password information may be performed. For example, when the password information is a panning password, an operation such as displaying a panning page corresponding to the password may be performed, which is not limited in this embodiment.
Further, after the password information is successfully parsed, the number of times of parsing success of the password information successfully matched with the to-be-confirmed password identification rule matched with the text information can be added once, so that statistics on the number of times of parsing success of the password information successfully matched with the to-be-confirmed password identification rule can be realized.
It should be noted that, the number of parsing success is the number of parsing success of all the password information that is currently matched and succeeded by the password identification rule to be confirmed, but not the number of parsing success of the password information corresponding to the text information to be identified. That is, the above-mentioned password identification rule to be confirmed may be matched with a plurality of pieces of password information, and in this embodiment, after determining that the above-mentioned text information to be identified is successfully matched with the password identification rule to be confirmed, the text information is determined as the password information, and the number of successful parsing times of all pieces of password information that are successfully matched with the password identification rule to be confirmed is calculated.
In step S29, the recognition success rate of the password recognition rule to be confirmed is determined based on the resolution success number.
In this embodiment, after determining the number of parsing success times of the password information that the password identification rule to be confirmed matches successfully, the identification success rate of the password identification rule to be confirmed may be determined based on the number of parsing success times.
For example, the recognition success rate of the password recognition rule to be confirmed may be determined based on a ratio of the number of resolution successes of the password information for which the password recognition rule to be confirmed is matched to the total number of resolution (i.e., the sum of the current number of resolution failures and the number of resolution successes).
In step S30, in response to the recognition success rate of the password recognition rule to be confirmed being higher than or equal to the first set probability threshold, the password recognition rule to be confirmed is determined as a confirmed password recognition rule.
In this embodiment, after determining the recognition success rate of the to-be-confirmed password recognition rule, the recognition success rate may be compared with a first set probability threshold, and then the to-be-confirmed password recognition rule may be determined as a confirmed password recognition rule when the recognition success rate of the to-be-confirmed password recognition rule is higher than or equal to the first set probability threshold.
It can be appreciated that the password identification rule to be confirmed is determined as the confirmed password identification rule by responding to the identification success rate of the password identification rule to be confirmed being higher than or equal to a first set probability threshold value; and in response to the recognition success rate of the to-be-confirmed password recognition rule being lower than a first set probability threshold, the to-be-confirmed password recognition rule is not confirmed to be the confirmed password recognition rule, so that the confirmed password recognition rule is updated, the effectiveness of the confirmed password recognition rule is improved, the success probability of whether text information selected by a user is password information or not can be improved, and the requirement of the user is met.
In step S31, a setting instruction analysis interface is called to analyze the text information as password information.
In this embodiment, after the step S23 is executed to determine that the text information matches with the confirmed password identification rule, the setting instruction analysis interface may be called to analyze the text information as the password information.
It should be noted that, since the confirmed password identification rule is a rule which is confirmed currently and can be used for identifying whether the text information is password information, the setting instruction analysis interface can be directly called to analyze the text information as the password information, and the setting instruction analysis interface is not required to be called according to the setting calling proportion, so that the success rate of analyzing the password information can be ensured.
In step S32, whether the password information is successfully parsed or not: if not, executing step S33; if yes, go to step S36.
In this embodiment, after the text information is parsed as the password information by calling the set instruction parsing interface, it may be determined whether the password information is parsed successfully, and if not, step S33 may be executed; if successful, step S36 may be performed.
In step S33, the number of failed parsing of the password information for which the confirmed password identification rule is successfully matched is determined.
In this embodiment, after the analysis of the password information fails, the number of analysis failures of the password information successfully matched by the confirmed password identification rule may be added once, so as to implement statistics on the number of analysis failures of the password information successfully matched by the confirmed password identification rule.
In step S34, the recognition success rate of the confirmed password recognition rule is determined based on the number of resolution failures.
In this embodiment, when determining the number of parsing failures of the password information that the confirmed password identification rule is successfully matched with, the identification success rate of the confirmed password identification rule may be determined based on the number of parsing failures.
For example, the recognition success rate of the password recognition rule to be confirmed may be determined based on a ratio of the number of resolution successes of the password information for which the password recognition rule to be confirmed is matched to the total number of resolution (i.e., the sum of the current number of resolution failures and the number of resolution successes).
In step S35, the confirmed password identification rule is deleted in response to the identification success rate of the confirmed password identification rule being lower than a second set probability threshold.
In this embodiment, after determining the recognition success rate of the confirmed password recognition rule based on the analysis failure times, the recognition success rate may be compared with a second set probability threshold, and then the confirmed password recognition rule may be deleted when the recognition success rate of the confirmed password recognition rule is lower than the second set probability threshold. It should be noted that, the second set probability threshold is smaller than or equal to the first set probability threshold, and specific values of the first set probability threshold and the second set probability threshold may be set based on actual service needs, which is not limited in this embodiment.
Further, after deleting the confirmed password identification rule, the confirmed password identification rule may be determined as the password identification rule to be confirmed, or the confirmed password identification rule may be directly removed. If the recognition success rate of the confirmed password recognition rule is higher than or equal to the second set probability threshold value, the deleting operation for deleting the confirmed password recognition rule is not executed.
It can be appreciated that by deleting the confirmed password identification rule in response to the success rate of identification of the confirmed password identification rule being lower than the second set probability threshold, the confirmed password identification rule can be updated, and the invalid confirmed password identification rule can be deleted, so that the effectiveness of the existing confirmed password identification rule can be improved, the success rate of whether text information selected by a user based on the confirmed password identification rule is password information can be improved, and the requirement of the user can be met.
In step S36, a setting operation is performed based on the password information after the analysis is successful.
In this embodiment, after the step S32 is performed, if it is determined that the password information is successfully parsed, the setting operation may be performed based on the password information after the parsing is successful. On the basis, the analysis success times of the password information successfully matched with the confirmed password identification rule can be counted, and the maintenance of the confirmed password identification rule which is acquired currently based on the analysis success times is facilitated.
FIG. 3 is a block diagram of a password information identifying apparatus, according to an example embodiment; the device of the embodiment can be used for a server (for example, a server or a server cluster formed by a plurality of servers) for identifying password information. As shown in fig. 3, the apparatus includes: a text information acquisition module 110, a confirmed rule matching module 120, a rule matching to be confirmed module 130, and a password information determination module 140, wherein:
a text information obtaining module 110, configured to obtain text information to be identified;
a confirmed rule matching module 120 for matching the text information with confirmed password identification rules;
The to-be-confirmed rule matching module 130 is configured to match the text information with a preset to-be-confirmed password identification rule in response to failure in matching the text information with the confirmed password identification rule;
and the password information determining module 140 is configured to determine the text information as password information in response to successful matching of the text information with the password identification rule to be confirmed.
As can be seen from the above description, the device in this embodiment obtains the text information to be identified, matches the text information with the confirmed password identification rule, matches the text information with the preset password identification rule in response to the failure of matching the text information with the confirmed password identification rule, and determines the text information as the password information in response to the success of matching the text information with the confirmed password identification rule.
FIG. 4 is a block diagram of a password information identifying apparatus according to yet another exemplary embodiment; the device of the embodiment can be used for a server (for example, a server or a server cluster formed by a plurality of servers) for identifying password information. The text information obtaining module 210, the confirmed rule matching module 220, the rule to be confirmed matching module 230, and the password information determining module 240 are the same as the text information obtaining module 110, the confirmed rule matching module 120, the rule to be confirmed matching module 130, and the password information determining module 140 in the embodiment shown in fig. 3, and are not described herein.
As shown in fig. 4, the apparatus may further include:
the password information analysis module 250 is configured to invoke a setting instruction analysis interface according to a setting calling proportion to analyze the password information.
In an embodiment, the apparatus may further include:
and the setting operation executing module 260 is configured to execute a setting operation based on the password information after the analysis is successful, in response to the analysis of the password information being successful.
In an embodiment, the apparatus may further include: a validated rules determination module 270;
The confirmed rule determination module 270 may include:
A success number accumulating unit 271, configured to determine a number of parsing success of the password information that is successfully matched with the password identification rule to be confirmed;
a first probability determining unit 272, configured to determine an identification success rate of the password identification rule to be confirmed based on the number of resolution successes;
the confirmed rule determining unit 273 is configured to determine the password identification rule to be confirmed as the confirmed password identification rule in response to the identification success rate of the password identification rule to be confirmed being higher than or equal to the first set probability threshold.
In an embodiment, the apparatus may further include: confirmed rule deletion module 280;
Acknowledged rules deletion module 280 may include:
A password information parsing unit 281, configured to invoke a set instruction parsing interface to parse the text information as password information in response to successful matching of the text information and the confirmed password identification rule;
a failure number accumulating unit 282, configured to determine, in response to a failure in parsing the password information, a number of parsing failures of the password information for which the confirmed password identification rule is successfully matched;
A second probability determination unit 283, configured to determine an identification success rate of the confirmed password identification rule based on the parsing failure times;
and a confirmed rule deleting unit 284 configured to delete the confirmed password identification rule in response to the identification success rate of the confirmed password identification rule being lower than a second set probability threshold.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 5 is a block diagram of an electronic device, according to an example embodiment. For example, apparatus 900 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, exercise device, personal digital assistant, or the like.
Referring to fig. 5, apparatus 900 may include one or more of the following components: a processing component 902, a memory 904, a power component 906, a multimedia component 908, an audio component 910, an input/output (I/O) interface 912, a sensor component 914, and a communication component 916.
The processing component 902 generally controls overall operations of the apparatus 900, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 902 may include one or more processors 920 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 902 can include one or more modules that facilitate interaction between the processing component 902 and other components. For example, the processing component 902 can include a multimedia module to facilitate interaction between the multimedia component 908 and the processing component 902.
The memory 904 is configured to store various types of data to support operations at the apparatus 900. Examples of such data include instructions for any application or method operating on the device 900, contact data, phonebook data, messages, pictures, videos, and the like. The memory 904 may be implemented by any type of volatile or nonvolatile memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power supply component 906 provides power to the various components of the device 900. Power supply components 906 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for device 900.
The multimedia component 908 comprises a screen between the device 900 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 908 includes a front-facing camera and/or a rear-facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the apparatus 900 is in an operational mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 910 is configured to output and/or input audio signals. For example, the audio component 910 includes a Microphone (MIC) configured to receive external audio signals when the device 900 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 904 or transmitted via the communication component 916. In some embodiments, the audio component 910 further includes a speaker for outputting audio signals.
The I/O interface 912 provides an interface between the processing component 902 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 914 includes one or more sensors for providing status assessment of various aspects of the apparatus 900. For example, the sensor assembly 914 may detect the on/off state of the device 900, the relative positioning of the components, such as the display and keypad of the device 900, the sensor assembly 914 may also detect the change in position of the device 900 or one component of the device 900, the presence or absence of user contact with the device 900, the orientation or acceleration/deceleration of the device 900, and the change in temperature of the device 900. The sensor assembly 914 may also include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor assembly 914 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 914 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 916 is configured to facilitate communication between the apparatus 900 and other devices in a wired or wireless manner. The device 900 may access a wireless network based on a communication standard, such as WiFi,2G or 3G,4G or 5G, or a combination thereof. In one exemplary embodiment, the communication component 916 receives broadcast signals or broadcast-related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component 916 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, apparatus 900 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for executing the methods described above.
In an exemplary embodiment, there is also provided a non-transitory computer readable storage medium including instructions, such as memory 904 including a computer program, which when executed by processor 920 of apparatus 900, is implemented to:
Acquiring text information to be identified;
matching the text information with the confirmed password identification rule;
Responding to failure of matching the text information with the confirmed password identification rule, and matching the text information with a preset password identification rule to be confirmed;
And determining the text information as password information in response to successful matching of the text information and the password identification rule to be confirmed.
For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (11)

1. A method for identifying password information, the method comprising:
Acquiring text information to be identified;
Matching the text information with a confirmed password identification rule, wherein the confirmed password identification rule is a rule which can be used for identifying whether the text information is password information or not and is confirmed currently;
Responding to failure of matching the text information with the confirmed password identification rule, and matching the text information with a preset password identification rule to be confirmed, wherein the password identification rule to be confirmed is a preset rule for confirming whether the password identification rule can be confirmed;
And determining the text information as password information in response to successful matching of the text information and the password identification rule to be confirmed.
2. The method according to claim 1, wherein the method further comprises:
and calling a setting instruction analysis interface according to a setting calling proportion to analyze the password information.
3. The method according to claim 2, wherein the method further comprises:
determining the analysis success times of the password information successfully matched with the password identification rule to be confirmed;
Determining the recognition success rate of the password recognition rule to be confirmed based on the analysis success times;
and determining the password identification rule to be confirmed as the confirmed password identification rule in response to the identification success rate of the password identification rule to be confirmed being higher than or equal to a first set probability threshold.
4. The method according to claim 2, wherein the method further comprises:
and responding to the successfully resolved password information, and executing setting operation based on the successfully resolved password information.
5. The method according to any one of claims 1 to 4, further comprising:
Responding to successful matching of the text information and the confirmed password identification rule, and calling a set instruction analysis interface to analyze the text information as password information;
Responding to the analysis failure of the password information, and determining the analysis failure times of the successfully matched password information of the confirmed password identification rule;
determining the recognition success rate of the confirmed password recognition rule based on the analysis failure times;
And deleting the confirmed password identification rule in response to the identification success rate of the confirmed password identification rule being lower than a second set probability threshold.
6. A password information identifying apparatus, characterized in that the apparatus comprises:
the text information acquisition module is used for acquiring text information to be identified;
the confirmed rule matching module is used for matching the text information with confirmed password identification rules, wherein the confirmed password identification rules are rules which can be used for identifying whether the text information is password information or not and are confirmed currently;
The to-be-confirmed rule matching module is used for matching the text information with a preset to-be-confirmed password identification rule in response to failure in matching the text information with the confirmed password identification rule, wherein the to-be-confirmed password identification rule is a preset rule for confirming whether the to-be-confirmed password identification rule can be changed into the confirmed password identification rule or not;
and the password information determining module is used for determining the text information as password information in response to successful matching of the text information and the password identification rule to be confirmed.
7. The apparatus of claim 6, wherein the apparatus further comprises:
and the password information analysis module is used for calling a setting instruction analysis interface according to the setting calling proportion to analyze the password information.
8. The apparatus of claim 7, wherein the apparatus further comprises: a validated rule determination module;
the confirmed rule determination module includes:
the success number accumulation unit is used for determining the analysis success number of the password information matched successfully by the password identification rule to be confirmed;
the first probability determining unit is used for determining the recognition success rate of the password recognition rule to be confirmed based on the analysis success times;
and the confirmed rule determining unit is used for determining the password identification rule to be confirmed as the confirmed password identification rule in response to the identification success rate of the password identification rule to be confirmed being higher than or equal to a first set probability threshold value.
9. The apparatus according to any one of claims 6 to 8, further comprising: a confirmed rule deletion module;
the confirmed rule deleting module includes:
The password information analysis unit is used for calling a setting instruction analysis interface to analyze the text information as password information in response to successful matching of the text information and the confirmed password identification rule;
a failure number accumulating unit, configured to determine a number of failed parsing of the password information for which the confirmed password identification rule is successfully matched in response to a failure of parsing of the password information;
A second probability determining unit, configured to determine an identification success rate of the confirmed password identification rule based on the resolution failure number;
and the confirmed rule deleting unit is used for deleting the confirmed password identification rule in response to the identification success rate of the confirmed password identification rule being lower than a second set probability threshold.
10. An electronic device, the device comprising:
A processor and a memory for storing processor-executable instructions;
wherein the processor is configured to:
Acquiring text information to be identified;
Matching the text information with a confirmed password identification rule, wherein the confirmed password identification rule is a rule which can be used for identifying whether the text information is password information or not and is confirmed currently;
Responding to failure of matching the text information with the confirmed password identification rule, and matching the text information with a preset password identification rule to be confirmed, wherein the password identification rule to be confirmed is a preset rule for confirming whether the password identification rule can be confirmed;
And determining the text information as password information in response to successful matching of the text information and the password identification rule to be confirmed.
11. A computer readable storage medium having stored thereon a computer program, the program being embodied when executed by a processor:
Acquiring text information to be identified;
Matching the text information with a confirmed password identification rule, wherein the confirmed password identification rule is a rule which can be used for identifying whether the text information is password information or not and is confirmed currently;
Responding to failure of matching the text information with the confirmed password identification rule, and matching the text information with a preset password identification rule to be confirmed, wherein the password identification rule to be confirmed is a preset rule for confirming whether the password identification rule can be confirmed;
And determining the text information as password information in response to successful matching of the text information and the password identification rule to be confirmed.
CN202110113935.0A 2021-01-27 2021-01-27 Password information identification method, device, equipment and storage medium Active CN112819061B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110113935.0A CN112819061B (en) 2021-01-27 2021-01-27 Password information identification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110113935.0A CN112819061B (en) 2021-01-27 2021-01-27 Password information identification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112819061A CN112819061A (en) 2021-05-18
CN112819061B true CN112819061B (en) 2024-05-10

Family

ID=75860009

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110113935.0A Active CN112819061B (en) 2021-01-27 2021-01-27 Password information identification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112819061B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116629232A (en) * 2023-05-09 2023-08-22 北京泰镝科技股份有限公司 Password analysis method and device in text and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138502A (en) * 2015-08-14 2015-12-09 上海斐讯数据通信技术有限公司 Method for recognizing copy objects and collecting data
CN106790054A (en) * 2016-12-20 2017-05-31 四川长虹电器股份有限公司 Interactive authentication system and method based on recognition of face and Application on Voiceprint Recognition
CN107222369A (en) * 2017-07-07 2017-09-29 北京小米移动软件有限公司 Recognition methods, device, switch and the storage medium of application program
CN107229638A (en) * 2016-03-24 2017-10-03 北京搜狗科技发展有限公司 A kind of text message processing method and device
CN108108094A (en) * 2017-12-12 2018-06-01 深圳和而泰数据资源与云技术有限公司 A kind of information processing method, terminal and computer-readable medium
CN108491379A (en) * 2018-03-08 2018-09-04 平安科技(深圳)有限公司 Shortcut key recognition methods, device, equipment and computer readable storage medium
CN109448734A (en) * 2018-09-20 2019-03-08 李庆湧 Unlocking terminal equipment and application starting method and device based on vocal print
CN109766473A (en) * 2018-11-30 2019-05-17 北京达佳互联信息技术有限公司 Information interacting method, device, electronic equipment and storage medium
WO2019153982A1 (en) * 2018-02-08 2019-08-15 深圳壹账通智能科技有限公司 Payment processing method and device, computer apparatus, and storage medium
WO2020024398A1 (en) * 2018-08-02 2020-02-06 平安科技(深圳)有限公司 Biometrics-assisted payment method and apparatus, and computer device and storage medium
CN111611976A (en) * 2020-06-04 2020-09-01 支付宝(杭州)信息技术有限公司 Payment method and device based on face recognition
CN111814472A (en) * 2020-09-03 2020-10-23 平安国际智慧城市科技股份有限公司 Text recognition method, device, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102623727B1 (en) * 2018-10-29 2024-01-11 삼성전자주식회사 Electronic device and Method for controlling the electronic device thereof

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138502A (en) * 2015-08-14 2015-12-09 上海斐讯数据通信技术有限公司 Method for recognizing copy objects and collecting data
CN107229638A (en) * 2016-03-24 2017-10-03 北京搜狗科技发展有限公司 A kind of text message processing method and device
CN106790054A (en) * 2016-12-20 2017-05-31 四川长虹电器股份有限公司 Interactive authentication system and method based on recognition of face and Application on Voiceprint Recognition
WO2018113526A1 (en) * 2016-12-20 2018-06-28 四川长虹电器股份有限公司 Face recognition and voiceprint recognition-based interactive authentication system and method
CN107222369A (en) * 2017-07-07 2017-09-29 北京小米移动软件有限公司 Recognition methods, device, switch and the storage medium of application program
CN108108094A (en) * 2017-12-12 2018-06-01 深圳和而泰数据资源与云技术有限公司 A kind of information processing method, terminal and computer-readable medium
WO2019153982A1 (en) * 2018-02-08 2019-08-15 深圳壹账通智能科技有限公司 Payment processing method and device, computer apparatus, and storage medium
CN108491379A (en) * 2018-03-08 2018-09-04 平安科技(深圳)有限公司 Shortcut key recognition methods, device, equipment and computer readable storage medium
WO2020024398A1 (en) * 2018-08-02 2020-02-06 平安科技(深圳)有限公司 Biometrics-assisted payment method and apparatus, and computer device and storage medium
CN109448734A (en) * 2018-09-20 2019-03-08 李庆湧 Unlocking terminal equipment and application starting method and device based on vocal print
CN109766473A (en) * 2018-11-30 2019-05-17 北京达佳互联信息技术有限公司 Information interacting method, device, electronic equipment and storage medium
CN111611976A (en) * 2020-06-04 2020-09-01 支付宝(杭州)信息技术有限公司 Payment method and device based on face recognition
CN111814472A (en) * 2020-09-03 2020-10-23 平安国际智慧城市科技股份有限公司 Text recognition method, device, equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于关联规则挖掘的口令字典生成技术;陈君山;刘京菊;李振汉;;微电子学与计算机(12);全文 *
基于社工信息的口令生成与安全性分析;高强;李啸;胡勇;吴少华;;通信技术(07);全文 *

Also Published As

Publication number Publication date
CN112819061A (en) 2021-05-18

Similar Documents

Publication Publication Date Title
CN112003893B (en) Resource downloading method and device
CN111461304B (en) Training method of classified neural network, text classification method, device and equipment
CN112269556A (en) Information display method, device, system, equipment, server and storage medium
CN108153832B (en) Push information display method and device
CN112291631A (en) Information acquisition method, device, terminal and storage medium
CN107402767B (en) Method and device for displaying push message
CN106792604B (en) Method and device for service prompt in communication process
CN110337825B (en) Service switching method and device
CN111639276A (en) Resource preloading method and device and storage medium
CN112819061B (en) Password information identification method, device, equipment and storage medium
CN110968492B (en) Information processing method and device and storage medium
CN112486770A (en) Client dotting reporting method and device, electronic equipment and storage medium
CN110764847B (en) User information processing method, device, electronic equipment and storage medium
CN116567057A (en) Application configuration method, device, equipment and storage medium
CN112333233B (en) Event information reporting method and device, electronic equipment and storage medium
CN112291581B (en) Server, terminal equipment, information processing method and device
CN114239531A (en) Template recommendation method and device, electronic equipment and storage medium
CN111736890A (en) Data updating method and device, electronic equipment and storage medium
CN111143184B (en) Data processing method, device and system
CN111984532A (en) Applet-based exception handling method and device
US20160119259A1 (en) Method, terminal device and server for pushing message through light application
CN111526084A (en) Information processing method, device, equipment and storage medium
CN112199250B (en) Picture monitoring method and device, electronic equipment and storage medium
CN114727274B (en) User migration method, device, electronic equipment and storage medium
CN113191792B (en) Task processing method, device, electronic equipment, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant