CN113852461A - Password recovery method and device, computer equipment and storage medium - Google Patents

Password recovery method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113852461A
CN113852461A CN202111130022.6A CN202111130022A CN113852461A CN 113852461 A CN113852461 A CN 113852461A CN 202111130022 A CN202111130022 A CN 202111130022A CN 113852461 A CN113852461 A CN 113852461A
Authority
CN
China
Prior art keywords
password
backup
information
key
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111130022.6A
Other languages
Chinese (zh)
Other versions
CN113852461B (en
Inventor
何高丰
刘超雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Wondershare Software Co Ltd
Original Assignee
Shenzhen Wondershare Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Wondershare Software Co Ltd filed Critical Shenzhen Wondershare Software Co Ltd
Priority to CN202111130022.6A priority Critical patent/CN113852461B/en
Publication of CN113852461A publication Critical patent/CN113852461A/en
Application granted granted Critical
Publication of CN113852461B publication Critical patent/CN113852461B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a password recovery method, a password recovery device, computer equipment and a storage medium. The method comprises the following steps: acquiring data of a mobile device connected with the terminal device, and encrypting and backing up the data to obtain a backup package; decrypting the backup package and finding a key chain file, and obtaining account password information according to key string information in the key chain file; scanning the decrypted backup package to acquire personal attribute information; inputting the personal attribute information and the account password information into a recovery algorithm model for AI calculation, and outputting a predicted forgetting password. The invention has the advantages that the password used in the mobile equipment at ordinary times is forgotten by decrypting the backup packet and acquiring the account password information and the personal attribute information, carrying out AI calculation according to the account password information and the personal attribute information and outputting the predicted forgotten password.

Description

Password recovery method and device, computer equipment and storage medium
Technical Field
The invention relates to the field of mobile phone security, in particular to a password recovery method and device, computer equipment and a storage medium.
Background
In the age of the prevailing mobile equipment, the mobile phone becomes a necessary tool for each person, and a large number of personal passwords are stored in the mobile phone, such as Wifi account passwords, account passwords logged in by a Web site, mailbox account passwords, account passwords logged in by an App, screen time lock passwords, bank card accounts, Apple ID accounts and the like; many inconveniences are caused when the account password is used at ordinary times.
Disclosure of Invention
The invention aims to provide a password recovery method, a password recovery device, computer equipment and a storage medium, and aims to solve the problem that inconvenience is caused when a password of an account which is used at ordinary times in the conventional mobile equipment is forgotten.
In order to solve the technical problems, the invention aims to realize the following technical scheme: the password recovery method is applied to terminal equipment and comprises the following steps:
acquiring data of a mobile device connected with the terminal device, and encrypting and backing up the data to obtain a backup package;
decrypting the backup package and finding a key chain file, and obtaining account password information according to key string information in the key chain file;
scanning the decrypted backup package to acquire personal attribute information;
inputting the personal attribute information and the account password information into a recovery algorithm model for AI calculation, and outputting a predicted forgetting password.
In addition, another object of the present invention is to provide a password recovery apparatus, including:
the backup unit is used for acquiring data of the mobile equipment connected with the terminal equipment and encrypting and backing up the data to obtain a backup packet;
the first acquisition unit is used for decrypting the backup package, finding a key chain file and obtaining account password information according to key string information in the key chain file;
the second acquisition unit is used for scanning the decrypted backup package and acquiring personal attribute information;
and the calculation unit is used for inputting the personal attribute information and the account password information into a recovery algorithm model for AI calculation and outputting a predicted forgetting password.
In addition, an embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the password recovery method according to the first aspect when executing the computer program.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, causes the processor to execute the password recovery method according to the first aspect.
The embodiment of the invention discloses a password recovery method, a password recovery device, computer equipment and a storage medium. The method comprises the following steps: acquiring data of a mobile device connected with the terminal device, and encrypting and backing up the data to obtain a backup package; decrypting the backup package and finding a key chain file, and obtaining account password information according to key string information in the key chain file; scanning the decrypted backup package to acquire personal attribute information; inputting the personal attribute information and the account password information into a recovery algorithm model for AI calculation, and outputting a predicted forgetting password. The embodiment of the invention has the advantages that the problem that the password used in the mobile equipment is forgotten at ordinary times is solved by decrypting the backup packet, acquiring the account password information and the personal attribute information, carrying out AI calculation according to the account password information and the personal attribute information and outputting the predicted forgotten password.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a password recovery method according to an embodiment of the present invention;
fig. 2 is a schematic view of a sub-flow framework of a password recovery method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of another sub-flow framework of a password recovery method according to an embodiment of the present invention;
fig. 4 is a sub-flow diagram of a password recovery method according to an embodiment of the present invention;
fig. 5 is a schematic sub-flowchart of a password recovery method according to an embodiment of the present invention;
fig. 6 is a schematic sub-flowchart of a password recovery method according to an embodiment of the present invention;
FIG. 7 is a schematic view of another sub-flow chart of a password recovery method according to an embodiment of the present invention;
FIG. 8 is a schematic block diagram of a password recovery system provided by an embodiment of the present invention;
FIG. 9 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating a password recovery method according to an embodiment of the present invention;
as shown in fig. 1, the method includes steps S101 to S104.
S101, data of the mobile device connected with the terminal device are obtained, and the data are encrypted and backed up to obtain a backup package.
In the step, all data in the mobile equipment can be encrypted and backed up to the terminal equipment by using a Recovery product (a mobile phone backup function) in a DrFone toolkit, and by adopting the method, system settings, photo videos, App data and the like in the mobile equipment can be almost encrypted and backed up to the terminal equipment to obtain a backup package.
S102, the backup package is decrypted, the key chain file is found, and account password information is obtained according to key string information in the key chain file.
In the step, the backup package is decrypted to obtain a key chain file, various account password information is stored in key string information in the key chain file, and various account passwords of the user can be collected based on the key chain file.
S103, scanning the decrypted backup package to acquire personal attribute information.
In this step, personal attribute information of the user can be obtained by scanning the decrypted backup package, where the personal attribute information may include information such as a birthday, a mobile phone number, a name, a direct family number, and a direct family birthday of the user.
And S104, inputting the personal attribute information and the account password information into a recovery algorithm model to perform AI calculation, and outputting a predicted forgetting password.
In this step, the personal attribute information with a very high probability can be used as reference data of the account password by the user, and can be effectively used as reference data of the predicted forgotten password output in this embodiment, and the predicted forgotten password output by the user can be input into the recovery algorithm model together with the derived account password information to perform AI calculation, so that the user can be helped to retrieve the forgotten password at a certain probability.
In the embodiment, the mobile device is an iPhone mobile phone, the terminal device is a Windows computer, in the existing scheme, the key string information of the iPhone mobile phone synchronously at the cloud can be exported and decrypted only through the Mac computer, the Windows computer is more popular at present, the implementation realizes that the key string information is exported and decrypted through the Windows computer, the key string information in the iPhone mobile phone can be displayed on the Windows computer, and when a user forgets a certain password, the AI calculation is carried out on the personal attribute information of the user and the exported account password information, and the predicted forgetting password is output.
In one embodiment, as shown in fig. 2, step S101 includes:
starting;
s201, detecting whether the mobile equipment starts backup encryption or not, if so, entering a step S202, otherwise, jumping to a step S203;
s202, setting a default password after clearing the backup password, and entering the step S204;
s203, directly setting a default password, and entering the step S204;
and S204, acquiring data in the mobile equipment, and carrying out encryption backup through a default password to obtain a backup package.
In this embodiment, when data of the mobile device is encrypted and backed up to the terminal device, it is first detected whether the mobile device starts backup encryption, where the new password is set, and the new password may adopt a simple default password such as a single letter "a", so that subsequent decryption speed may be increased.
In one embodiment, as shown in fig. 3, step S201 includes:
beginning:
s301, detecting whether the mobile equipment starts backup encryption, if so, entering a step S302, otherwise, jumping to a step S303;
s302, receiving a backup password input by a user and entering the step S304;
s303, setting a default password;
s304, verifying whether the backup password is correct, if so, entering the step S305, otherwise, jumping to the step S306;
s305, replacing the backup password with the default password;
s306, restoring a restoring packet with empty configuration to the mobile equipment, and removing the backup password and setting a default password after the mobile equipment is restarted.
In the embodiment, in the process of setting the default password, if the user starts the backup encryption, the backup password input by the user is received, and after the backup password is verified to be correct, the mobile device does not need to be restarted, and the default password is directly adopted to replace the backup password; and if the backup password input by the user is wrong in verification, restoring a null configuration restoration packet to the mobile equipment, and clearing the backup password and setting a default password after the mobile equipment is restarted.
In one embodiment, as shown in fig. 4, step S102 includes:
s401, decrypting the backup package to obtain a file list database and a backup file;
s402, acquiring a name field and a path field of a corresponding key chain file from a file table in a file list database;
s403, acquiring a key chain file from the backup file according to the name field and the path field;
and S404, obtaining account password information according to the key string information in the key chain file.
In this embodiment, the decrypted backup includes a file list database and a backup file named by a file hash value, and a list named Files in the file list database is a file list; two more important fields are stored in the file table, one field records the file name in the backup file, the other field records the relative path corresponding to the file, and the name field and the path field corresponding to the key chain file are inquired through the two fields; acquiring a key chain file from the backup file according to the name field and the path field of the key chain file; the key chain file stores key string information of the mobile device, and account password information is obtained according to the key string information in the key chain file.
In one embodiment, as shown in fig. 5, step S404 includes:
s501, obtaining a plurality of key fields according to key string information in a key chain file;
s502, decrypting each key field;
s503, matching the mark fields of the key information to be acquired in each decrypted key field to obtain account password information corresponding to the key information, wherein the key information is any one of a Wifi account password, an account password of a certain App, a screen locking password, a mailbox account password and an AppleID account password.
In this embodiment, the key string information is a plist format file, the file is composed of a plurality of key fields, each key field is a dictionary structure word, each key field in the key string information is decrypted by adopting a base64 decoding mode, and the required key information can be obtained through the decrypted key field; for example, when the key information to be acquired is a Wifi account password, field matching is performed in each decrypted key field according to a mark field of the Wifi account password, the key field in which the Wifi account password is stored is screened out, and the Wifi account password can be derived from the key field; based on the above, various key information of the user can be derived, and an important reference value is provided for subsequently calculating the forgetting password of the user.
In one embodiment, as shown in fig. 6, step S104 includes:
s601, inputting the personal attribute information and the account password information into a recovery algorithm model to perform account number repetition degree calculation, password repetition degree calculation, character repetition degree calculation and personal attribute display degree calculation;
and S602, setting different weights according to the calculation result, and outputting the predicted forgotten password.
In this embodiment, the password is a character string composed of numbers and letters that is used more in life, and for convenience of memory, the user often uses one or a combination of a plurality of kinds of words such as birthday, nickname pinyin, address number, family information, favorite people, articles, and various common words; and calculating the account number repetition degree, the password repetition degree, the character repetition degree and the personal attribute display degree according to the personal attribute information and the account password information acquired from the backup packet to obtain a calculation result, embodying the password use habit of the user from the calculation result, setting different weights in the calculation process, and outputting the predicted forgotten password.
Specifically, the account number, the password, the characters and the personal attributes can be sorted according to importance, and the weight is given according to the importance sorting; then, calculating the repetition times of each digit in the account number, the password, the characters and the personal attributes in a counting mode, giving a weight to each digit according to the sequence of the repetition times, training the digits according to the weights given twice, and outputting a predicted forgotten password; it can be understood that a plurality of predicted forgotten passwords are output by adjusting the weight values given twice, and the success rate of password recovery is increased.
More specifically, in a specific scenario, importance weight values of 0.1, 0.3, and 0.3 are respectively assigned to the account number, the password, the character, and the personal attribute; calculating the repetition times of each number of words in the account number, the password, the characters and the personal attributes in a counting mode, dividing low, medium and high levels according to the obtained highest repetition times, and endowing a low-level number word with a weight value of 0.2 times, a medium-level number word with a weight value of 0.3 times and a high-level number word with a weight value of 0.5 times; and obtaining the probability of the digit appearing in the forgotten password according to the number weighted value of the digit and the importance weighted value of the importance ranking of the digit, and finally outputting the combined password of one or more digits according to the ranking from high probability to low probability.
In one embodiment, as shown in fig. 7, step S104 includes:
s701, receiving a mask input by a user;
s702, inputting the mask code, the personal attribute information and the account password information into a recovery algorithm model to carry out AI calculation, and outputting a predicted forgotten password.
In this embodiment, regarding the forgotten password, if the user can provide a mask of the password, for example, a total of 9 digits of the forgotten password is provided, the first 6 digits are the name of the user, for example, abcdef, and the last three digits are all digits, three digits with the highest output probability or a plurality of different digit groups may be output according to the weight of the trained digit, so as to output one or more predicted forgotten passwords.
The embodiment of the invention also provides a password recovery device, which is used for executing any embodiment of the password recovery method. Specifically, referring to fig. 8, fig. 8 is a schematic block diagram of a password recovery apparatus according to an embodiment of the present invention.
As shown in fig. 8, the password recovering apparatus 800 includes: a backup unit 801, a first acquisition unit 802, a second acquisition unit 803, and a calculation unit 804.
A backup unit 801, configured to acquire data of a mobile device connected to a terminal device, and encrypt and backup the data to obtain a backup packet;
a first obtaining unit 802, configured to decrypt the backup package and find the key chain file, and obtain account password information according to key string information in the key chain file;
a second obtaining unit 803, configured to scan the decrypted backup package to obtain personal attribute information;
an operation unit 804 for inputting the personal attribute information and the account password information into the recovery algorithm model for AI operation and outputting the predicted forgotten password
The device decrypts the backup packet and obtains account password information and personal attribute information, performs AI calculation according to the account password information and the personal attribute information and outputs the predicted forgotten password, and has the advantage of solving the problem that the password used in the mobile equipment is forgotten at ordinary times.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The password recovery apparatus described above may be implemented in the form of a computer program that can be run on a computer device as shown in fig. 9.
Referring to fig. 9, fig. 9 is a schematic block diagram of a computer device according to an embodiment of the present invention. The computer device 900 is a server, which may be an independent server or a server cluster composed of a plurality of servers.
Referring to fig. 9, the computer device 900 includes a processor 902, memory, and a network interface 905 connected by a system bus 901, where the memory may include a non-volatile storage medium 903 and an internal memory 904.
The non-volatile storage medium 903 may store an operating system 9031 and a computer program 9032. The computer program 9032, when executed, may cause the processor 902 to perform a password recovery method.
The processor 902 is used to provide computing and control capabilities, supporting the operation of the overall computer device 900.
The internal memory 904 provides an environment for the execution of a computer program 9032 in the non-volatile storage medium 903, which computer program 9032, when executed by the processor 902, may cause the processor 902 to perform the password recovery method.
The network interface 905 is used for network communication, such as providing data information transmission. Those skilled in the art will appreciate that the configuration shown in fig. 9 is a block diagram of only a portion of the configuration associated with aspects of the present invention and is not intended to limit the computing device 900 to which aspects of the present invention may be applied, and that a particular computing device 900 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
Those skilled in the art will appreciate that the embodiment of a computer device illustrated in fig. 9 does not constitute a limitation on the specific construction of the computer device, and that in other embodiments a computer device may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. For example, in some embodiments, the computer device may only include a memory and a processor, and in such embodiments, the structures and functions of the memory and the processor are consistent with those of the embodiment shown in fig. 9, and are not described herein again.
It should be understood that, in the embodiment of the present invention, the Processor 902 may be a Central Processing Unit (CPU), and the Processor 902 may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In another embodiment of the invention, a computer-readable storage medium is provided. The computer readable storage medium may be a non-volatile computer readable storage medium. The computer-readable storage medium stores a computer program, wherein the computer program implements the password recovery method of the embodiment of the present invention when executed by a processor.
The storage medium is a physical and non-transitory storage medium, and may be various physical storage media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses, devices and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A password recovery method is applied to terminal equipment and is characterized by comprising the following steps:
acquiring data of a mobile device connected with the terminal device, and encrypting and backing up the data to obtain a backup package;
decrypting the backup package and finding a key chain file, and obtaining account password information according to key string information in the key chain file;
scanning the decrypted backup package to acquire personal attribute information;
inputting the personal attribute information and the account password information into a recovery algorithm model for AI calculation, and outputting a predicted forgetting password.
2. The password recovery method according to claim 1, wherein the obtaining of the data of the mobile device connected to the terminal device and the encrypted backup of the data to obtain the backup package comprises:
detecting whether the mobile equipment starts backup encryption or not, if so, clearing the backup password and then setting a default password, and if not, directly setting the default password;
and acquiring data in the mobile equipment and carrying out encryption backup through the default password to obtain a backup package.
3. The password recovery method of claim 2, wherein the detecting whether the mobile device starts backup encryption, and if so, setting a default password after clearing the backup password comprises:
detecting whether the mobile equipment starts backup encryption;
if the backup encryption is detected to be started, receiving a backup password input by a user and verifying whether the backup password is correct or not;
if the backup password is correct, replacing the backup password with a default password;
and if the backup password is wrong, restoring a null configuration restoration packet to the mobile equipment, and clearing the backup password and setting a default password after the mobile equipment is restarted.
4. The password recovery method of claim 1, wherein decrypting the backup package and finding a key fob file and obtaining account password information from key string information in the key fob file comprises:
decrypting the backup package to obtain a file list database and a backup file;
acquiring a name field and a path field corresponding to the key chain file from a file table in the file list database;
acquiring the key chain file in the backup file according to the name field and the path field;
and obtaining account password information according to the key string information in the key chain file.
5. The password recovery method of claim 4, wherein the obtaining account password information from the key string information in the key fob file comprises:
obtaining a plurality of key fields according to the key string information in the key chain file;
decrypting each key field;
and matching the mark fields of the key information to be acquired in each decrypted key field to obtain account password information corresponding to the key information, wherein the key information is any one of a Wifi account password, an account password of a certain App, a screen locking password, a mailbox account password and an AppleID account password.
6. The password recovery method according to claim 1, wherein inputting the personal attribute information and the account password information into a recovery algorithm model for AI calculation and outputting a predicted forgotten password comprises:
inputting the personal attribute information and the account password information into a recovery algorithm model to perform account number repetition degree calculation, password repetition degree calculation, character repetition degree calculation and personal attribute display degree calculation;
and setting different weights according to the calculation result, and outputting the predicted forgotten password.
7. The password recovery method of claim 6, wherein inputting the personal attribute information and the account password information into a recovery algorithm model for AI calculation and outputting a predicted forgotten password comprises:
receiving a mask input by a user;
inputting the mask, the personal attribute information and the account password information into a recovery algorithm model for AI calculation, and outputting a predicted forgotten password.
8. A password recovery apparatus, comprising:
the backup unit is used for acquiring data of the mobile equipment connected with the terminal equipment and encrypting and backing up the data to obtain a backup packet;
the first acquisition unit is used for decrypting the backup package, finding a key chain file and obtaining account password information according to key string information in the key chain file;
the second acquisition unit is used for scanning the decrypted backup package and acquiring personal attribute information;
and the calculation unit is used for inputting the personal attribute information and the account password information into a recovery algorithm model for AI calculation and outputting a predicted forgetting password.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the password recovery method according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to perform the password recovery method of any one of claims 1 to 7.
CN202111130022.6A 2021-09-26 2021-09-26 Password recovery method and device, computer equipment and storage medium Active CN113852461B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111130022.6A CN113852461B (en) 2021-09-26 2021-09-26 Password recovery method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111130022.6A CN113852461B (en) 2021-09-26 2021-09-26 Password recovery method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113852461A true CN113852461A (en) 2021-12-28
CN113852461B CN113852461B (en) 2024-02-02

Family

ID=78979821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111130022.6A Active CN113852461B (en) 2021-09-26 2021-09-26 Password recovery method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113852461B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020067832A1 (en) * 2000-06-05 2002-06-06 Jablon David P. Systems, methods and software for remote password authentication using multiple servers
CN103546281A (en) * 2013-10-31 2014-01-29 厦门市美亚柏科信息股份有限公司 Dynamic secret key generating method and device
US9438419B1 (en) * 2011-07-12 2016-09-06 The Florida State University Research Foundation, Inc. Probabilistic password cracking system
CN107122479A (en) * 2017-05-03 2017-09-01 西安交通大学 A kind of user cipher conjecture system based on deep learning
CN111651749A (en) * 2020-04-28 2020-09-11 中国平安财产保险股份有限公司 Method and device for finding account based on password, computer equipment and storage medium
CN111786995A (en) * 2020-06-30 2020-10-16 中国联合网络通信集团有限公司 Account password management method, management middleware, system, equipment and storage medium
CN112667979A (en) * 2020-12-30 2021-04-16 网神信息技术(北京)股份有限公司 Password generation method and device, password identification method and device, and electronic device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020067832A1 (en) * 2000-06-05 2002-06-06 Jablon David P. Systems, methods and software for remote password authentication using multiple servers
US9438419B1 (en) * 2011-07-12 2016-09-06 The Florida State University Research Foundation, Inc. Probabilistic password cracking system
CN103546281A (en) * 2013-10-31 2014-01-29 厦门市美亚柏科信息股份有限公司 Dynamic secret key generating method and device
CN107122479A (en) * 2017-05-03 2017-09-01 西安交通大学 A kind of user cipher conjecture system based on deep learning
CN111651749A (en) * 2020-04-28 2020-09-11 中国平安财产保险股份有限公司 Method and device for finding account based on password, computer equipment and storage medium
CN111786995A (en) * 2020-06-30 2020-10-16 中国联合网络通信集团有限公司 Account password management method, management middleware, system, equipment and storage medium
CN112667979A (en) * 2020-12-30 2021-04-16 网神信息技术(北京)股份有限公司 Password generation method and device, password identification method and device, and electronic device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
OLEG AFONIN: "what is password recovery", pages 6, Retrieved from the Internet <URL:https://blog.elcomsoft.com/2019/11/what-is-password-recovery-and-how-it-is-different-from-password-cracking/> *
VLADIMIR KATALOV: "Six Ways to Decrypt iPhone Passwords from the Keychain", pages 8 - 10, Retrieved from the Internet <URL:https://blog.elcomsoft.com/2018/12/six-ways-to-decrypt-iphone-passwords-from-the-keychain/> *

Also Published As

Publication number Publication date
CN113852461B (en) 2024-02-02

Similar Documents

Publication Publication Date Title
US9740849B2 (en) Registration and authentication of computing devices using a digital skeleton key
CN108647262B (en) Picture management method and device, computer equipment and storage medium
CN108154365B (en) Safety equipment, method and system for generating dynamic two-dimensional code
CN106599723B (en) File encryption method and device and file decryption method and device
CN109241484B (en) Method and equipment for sending webpage data based on encryption technology
WO2020215568A1 (en) Communication number changing method, apparatus and system, computer device and storage medium
CN105389493A (en) Password management method and password management system
WO2021114614A1 (en) Application program secure startup method and apparatus, computer device, and storage medium
EP3469512A1 (en) Systems and methods for secure storage of user information in a user profile
WO2016153430A1 (en) Method of obfuscating data
US20190007393A1 (en) Verifiable record storage service
CN112380063A (en) Digital certificate backup method, device, equipment and storage medium
CN107248972B (en) Data encryption and decryption method and device and electronic equipment
CN113127915A (en) Data encryption desensitization method and device, electronic equipment and storage medium
CN115982761A (en) Sensitive information processing method and device, electronic equipment and storage medium
CN112084487B (en) Weak password analysis method and device, storage medium and electronic equipment
CN109284608B (en) Method, device and equipment for identifying Legionella software and safety processing method
US10430617B2 (en) Terminal determination device and method
CN113852461A (en) Password recovery method and device, computer equipment and storage medium
CN116668010A (en) Password generation method, system, device and storage medium thereof
CN115344852A (en) Weak password detection method, device, equipment, storage medium and program product
CN111061720A (en) Data screening method and device and electronic equipment
WO2018232021A2 (en) Systems and methods for secure storage of user information in a user profile
US11829512B1 (en) Protecting membership in a secure multi-party computation and/or communication
CN112115496B (en) Data decryption pattern recognition method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant