WO2018099115A1 - 密码检测方法、装置及终端 - Google Patents

密码检测方法、装置及终端 Download PDF

Info

Publication number
WO2018099115A1
WO2018099115A1 PCT/CN2017/094711 CN2017094711W WO2018099115A1 WO 2018099115 A1 WO2018099115 A1 WO 2018099115A1 CN 2017094711 W CN2017094711 W CN 2017094711W WO 2018099115 A1 WO2018099115 A1 WO 2018099115A1
Authority
WO
WIPO (PCT)
Prior art keywords
sub
password
user password
user
length
Prior art date
Application number
PCT/CN2017/094711
Other languages
English (en)
French (fr)
Inventor
方习文
王梓
叶宗波
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201780005389.0A priority Critical patent/CN108476225B/zh
Publication of WO2018099115A1 publication Critical patent/WO2018099115A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a password detection method, apparatus, and terminal.
  • terminals such as smart phones, tablets, wearable devices, etc.
  • terminals can support multi-user access.
  • different passwords can be set for different users, and different accesses can be set for different users.
  • Space in turn, the terminal can distinguish the user identity by password and allow the user to access the space matching the user identity.
  • the terminal can set the primary user password to 1234, the child user password to 5678, and allow the primary user to access.
  • the main user space, the main user space may include an address book, data in an album, etc., allowing the sub-user to access the sub-user space, and the sub-user space may include data in the music application.
  • the terminal when receiving the password input by the user, the terminal can directly enter the terminal system without inputting a confirmation instruction by the user, so as to improve the user experience.
  • the primary user password or the sub-user password may not be used, for example, if The terminal sets the primary user password to 1234 and the sub-user password to 123456.
  • the terminal When the sub-user inputs 1234, the terminal directly enters the main user space; if the terminal sets the primary user password to 123456 and the sub-user password to 1234, the primary When the user enters 1234, the terminal will directly enter the sub-user space.
  • the technical problem to be solved by the embodiments of the present application is to provide a password detection method, device and terminal, which can prevent user password conflicts and improve the security of the user password.
  • the embodiment of the present application provides a password detection method, in which a terminal may obtain a modification request of a primary user password, where the modification request carries an input first primary user password, and obtains the first primary user password. a first irreversible reference value, and a second irreversible reference value of the current second primary user password of the primary user, when the first irreversible reference value is consistent with the second irreversible reference value, receiving the input third primary user password, Performing a first compliance check on the third primary user password according to the third irreversible reference value of the sub-user password, where the first compliance detection is used to detect whether the third primary user password meets the primary user password If the third primary user password satisfies the first compliance, the third primary user password is used as the updated primary user password, and if the third primary user password does not satisfy the first compliance And outputting the first prompt information, where the first prompt information is used to prompt the third primary user password not to satisfy the first compliance.
  • the terminal when the terminal modifies the primary user password, the terminal passes the first irreversible reference value of the input first primary user password with the current secondary primary user password (ie, the old primary user password) of the primary user. Comparing the two irreversible reference values to authenticate the primary user, the security of the modified password may be improved, and when the first irreversible reference value is consistent with the second irreversible reference value, the input third primary user password is received, and Performing a first compliance check on the third primary user password (ie, the new primary user password) to prevent the third primary user password from conflicting with the secondary user password, High user password security.
  • the third primary user password ie, the new primary user password
  • the terminal may obtain the length of the sub-user password and the length of the third primary user password.
  • the terminal uses the preset private The key decrypts the ciphertext of each fourth irreversible reference value to obtain each of the fourth irreversible reference values, when the fifth irreversible reference value of the third primary user password and the fourth irreversible reference value of the first sub-user sub-cipher are not When the same, it is determined that the third primary user password satisfies the first compliance.
  • the fourth irreversible reference value is an irreversible reference value of the plurality of sub-user sub-passwords included in the sub-user password, where the sub-user sub-password is a password segment of the sub-user password, and the length of the first sub-user sub-password The length of the third primary user password is the same.
  • the third primary user password when the length of the sub-user password is greater than the length of the third primary user password, and the fifth irreversible reference value of the third primary user password and the fourth irreversible reference of the first sub-user sub-password When the value is different, determining that the third primary user password meets the first compliance, the third primary user password may be prevented from colliding with the secondary user password, and the security of the user password may be improved, and the fourth irreversible reference value is It is pre-encrypted and can improve the security of the sub-user password.
  • the terminal derives a first derivative key according to the first primary user password, and decrypts the ciphertext of the preset private key by using the first derivative key to obtain the preset private key.
  • the terminal may decrypt the ciphertext of the preset private key based on the first derived key derived from the first primary user password to obtain the preset private key.
  • the second derived key is derived according to the second primary user password, and the preset private key is encrypted by using the second derived key to obtain the ciphertext of the preset private key.
  • the terminal may encrypt the preset private key by using the second primary user password to obtain the second private key, and obtain the ciphertext of the preset private key, thereby improving the security of the preset private key.
  • the terminal may separately encrypt each of the fourth irreversible reference values by using a preset public key to obtain ciphertexts of the fourth irreversible reference value.
  • the terminal may encrypt each of the fourth irreversible reference values by using a preset public key to obtain ciphertexts of the fourth irreversible reference value, which may improve the security of the fourth irreversible reference value.
  • the terminal may determine the length and the multiple primary user sub-passwords included in the third primary user password. a primary user sub-password having the same length as the sub-user password, the primary user sub-password being a password segment of the third primary user password, and the determined sixth irreversible reference value of the primary user sub-password and the third irreversible reference When the values are different, it is determined that the third primary user password satisfies the first compliance.
  • the primary user sub-password having the same length as the length of the sub-user password may be determined, and when the determined primary user sub-password is determined.
  • the sixth irreversible reference value is different from the third irreversible reference value, determining that the third primary user password satisfies the first compliance, the third primary user password may be prevented from colliding with the secondary user password, and the user password may be improved.
  • the terminal may determine the third The primary user password satisfies this first compliance.
  • determining that the third primary user password satisfies the first A compliance can prevent the third primary user password from conflicting with the secondary user password, and can improve the security of the user password.
  • the terminal may obtain a registration request of the sub-user password, where the registration request carries the input sub-user password, and performs second compliance detection on the sub-user password according to the second irreversible reference value.
  • the second compliance check is configured to detect whether the sub-user password satisfies the setting condition of the sub-user password, and if the sub-user password satisfies the second compliance, complete the registration of the sub-user password, if If the sub-user password does not satisfy the second compliance, the second prompt information is output, and the second prompt information is used to prompt the sub-user password not to satisfy the second compliance.
  • the second user may perform a second compliance check according to the second irreversible reference value of the second primary user password to prevent the sub-user password from the second primary user.
  • Password conflicts can improve the security of user passwords.
  • the terminal may obtain the length of the sub-user password and the length of the second primary user password.
  • the length of the sub-user password is less than the length of the second primary user password, according to the sub-user
  • the password acquires a plurality of sub-users to complete the password.
  • the seventh irreversible reference value of the sub-user's completion password is different from the second irreversible reference value, it is determined that the sub-user password satisfies the second compliance.
  • the sub-user complete password has the same length as the second main user password, and the sub-subscribe password in the sub-user complete password is the same as the sub-user password, and the sub-password is the length and the sub-password.
  • the sub-user with the same user password length completes a password segment of the password.
  • the terminal may Determining that the sub-user password satisfies the second compliance may prevent the sub-user password from colliding with the second primary user password, and may improve the security of the user password.
  • the terminal may determine the length and the second among the plurality of sub-user sub-keys included in the sub-user password. a second sub-user sub-password having the same length as the primary user password, the sub-user sub-password being a password segment of the sub-user password, and an eighth irreversible reference value and the second irreversible reference value of the second sub-user sub-password When not the same, it is determined that the sub-user password satisfies the second compliance.
  • the terminal may determine The sub-user password satisfies the second compliance, and the sub-user password can be prevented from colliding with the second main user password, and the security of the user password can be improved.
  • the terminal may determine the sub-user.
  • the password satisfies this second compliance.
  • the terminal may determine that the sub-user password satisfies the first The second compliance can prevent the sub-user password from conflicting with the second primary user password, and can improve the security of the user password.
  • an embodiment of the present application provides another method for detecting a password, where the terminal can obtain a sub-use. a registration request of the user password, the registration request carrying the input sub-user password, and performing a second compliance detection on the sub-user password according to the second irreversible reference value of the current second primary user password of the primary user, the second The compliance check is used to detect whether the sub-user password satisfies the setting condition of the sub-user password. If the sub-user password satisfies the second compliance, the registration of the sub-user password is completed, if the sub-user password is not If the second compliance is met, the second prompt information is output, and the second prompt information is used to prompt the sub-user password not to satisfy the second compliance.
  • the second user may perform a second compliance check according to the second irreversible reference value of the second primary user password to prevent the sub-user password from the second primary user.
  • Password conflicts can improve the security of user passwords.
  • the terminal may obtain the length of the sub-user password and the length of the second primary user password.
  • the length of the sub-user password is less than the length of the second primary user password, according to the sub-user
  • the password acquires a plurality of sub-users to complete the password.
  • the seventh irreversible reference value of the sub-user's completion password is different from the second irreversible reference value, it is determined that the sub-user password satisfies the second compliance.
  • the sub-user complete password has the same length as the second main user password, and the sub-subscribe password in the sub-user complete password is the same as the sub-user password, and the sub-password is the length and the sub-password.
  • the sub-user with the same user password length completes a password segment of the password.
  • the terminal may Determining that the sub-user password satisfies the second compliance may prevent the sub-user password from colliding with the second primary user password, and may improve the security of the user password.
  • the terminal may determine the length and the second among the plurality of sub-user sub-keys included in the sub-user password. a second sub-user sub-password having the same length as the primary user password, the sub-user sub-password being a password segment of the sub-user password, and an eighth irreversible reference value and the second irreversible reference value of the second sub-user sub-password When not the same, it is determined that the sub-user password satisfies the second compliance.
  • the terminal may determine The sub-user password satisfies the second compliance, and the sub-user password can be prevented from colliding with the second main user password, and the security of the user password can be improved.
  • the terminal may It is determined that the sub-user password satisfies the second compliance.
  • the terminal may determine that the sub-user password satisfies the first The second compliance can prevent the sub-user password from conflicting with the second primary user password, and can improve the security of the user password.
  • an embodiment of the present application provides a password detecting apparatus, which has a function of implementing the behavior in the foregoing first aspect or the possible implementation manner of the first aspect.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above, which may be software and/or hardware.
  • the implementation of the cryptographic detecting device can be implemented by referring to the first aspect and the possible methods of the first aspect. Ways and repetitions are not repeated here.
  • the embodiment of the present application provides another password detecting apparatus, which has a function of implementing the behavior in the foregoing second aspect or the possible implementation manner of the second aspect.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above, which may be software and/or hardware.
  • the principle and the beneficial effects of the cryptographic detecting device can be solved by referring to the possible method embodiments of the second aspect and the second aspect and the beneficial effects. Therefore, the implementation of the cryptographic detecting device can be implemented. Referring to the second aspect and the possible method implementation manners of the second aspect, the repeated description is not repeated.
  • an embodiment of the present application provides a terminal, where the terminal includes: a memory, configured to store one or more programs; and a processor, configured to invoke a program stored in the memory to implement the method of the foregoing first aspect.
  • the solution in the design, the implementation method and the beneficial effects of the terminal solving problem can be referred to the implementation manners and beneficial effects of the first aspect, the second aspect, the first aspect and the second aspect of the possible method, and the repetition is no longer Narration.
  • the embodiment of the present application provides a computer readable storage medium, where the computer program is stored, and when the computer program is executed by at least one processor, the first aspect, the second aspect, and the first aspect may be implemented. And the possible implementation manners and beneficial effects of the second aspect, and the repetitions are not described again.
  • the embodiment of the present application provides a computer program product, comprising: a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to implement the first aspect, the first
  • a computer program product comprising: a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to implement the first aspect, the first
  • the steps of the method of the second aspect, the implementation manner and the beneficial effects of the computer program product, and the beneficial effects of the first aspect, the second aspect, the first aspect, and the second aspect, the possible embodiments, and the beneficial effects are repeated. I won't go into details here.
  • FIG. 1 is a schematic flowchart of a password detecting method according to an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of still another method for detecting a password provided by an embodiment of the present application
  • FIG. 3 is a schematic flowchart of another method for detecting a password provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of still another method for detecting a password provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of still another method for detecting a password according to an embodiment of the present application
  • FIG. 6 is a schematic flowchart of still another method for detecting a password provided by an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of still another method for detecting a password provided by an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of still another method for detecting a password according to an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a password detecting apparatus according to an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of another password detecting apparatus according to an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a terminal according to an embodiment of the present application.
  • the terminal when receiving the password input by the user, the terminal can directly enter the terminal system without inputting a confirmation instruction by the user, so as to improve the user experience.
  • the primary user password or sub-user may be caused.
  • the password is not available.
  • a password detection method and apparatus are proposed, which can prevent user password conflicts and improve the security of user passwords, which are described in detail below.
  • the primary user may refer to a user with a higher access authority
  • the secondary user may refer to a user with a lower access authority.
  • the primary user may access private data, such as accessing data in the address book and data in the payment application.
  • the sub-user can access the data in the game application, etc., at the same time, the main user can set or modify the sub-user password, and the main user can also set the access space of the sub-user.
  • the executor of the present invention may be a terminal, and the terminal may apply the primary user password and the sub-user password to the scenario of the terminal screen unlocking scenario or the application in the access terminal (such as accessing a payment application or a social application), for example,
  • the terminal can set the password of the primary user to unlock the screen of the terminal;
  • the terminal can also set the password of the primary user to allow the user corresponding to the password of the primary user to access the payment application;
  • the terminal can also set the password of the received sub-user.
  • the user corresponding to the sub-user password is allowed to access the data in the browser application.
  • the terminal in the present invention may be a device supporting multiple users, such as a smart phone, a tablet computer, or a smart wearable device, which is not limited by the present invention.
  • FIG. 1 is a schematic flowchart diagram of a password detecting method according to an embodiment of the present application.
  • the password detection method shown in Figure 1 includes the following steps:
  • the terminal may obtain a modification request of the primary user password, where the modification request may carry the first primary user password input by the user, and the first primary user password is used for authenticating the primary user to improve the security of the modified password.
  • the terminal may further perform the following steps before the step S101 is performed: the terminal may obtain a registration request of the primary user password, where the registration request carries the input second primary user password, and acquires the second primary user.
  • the second irreversible reference value of the password may be obtained: the terminal may obtain a registration request of the primary user password, where the registration request carries the input second primary user password, and acquires the second primary user. The second irreversible reference value of the password.
  • the terminal usually registers the primary user password first, and then registers the secondary user password. Therefore, when the terminal registers the primary user password, the terminal may not perform the compliance detection on the primary user password.
  • the terminal may obtain a registration request of the primary user password, where the registration request carries the second primary user password of the input user, and encrypts the second primary user password by using an irreversible encryption algorithm to obtain the second irreversible password of the second primary user.
  • the reference value and the second irreversible reference value may be stored in the terminal. Since the plaintext stored in the terminal is not the plaintext of the second password, the security of the primary user password may be improved.
  • the irreversible encryption algorithm may include a Password-Based Key Derivation Function 2 (PBKDF2) and a hash-based message authentication code (Hash-based Message). Encryption algorithms such as Authentication Code (HMAC) or Message Digest Algorithm 5 (MD5).
  • PBKDF2 Password-Based Key Derivation Function 2
  • HMAC hash-based message authentication code
  • MD5 Message Digest Algorithm 5
  • the above encryption algorithms are merely examples, not exhaustive, including but not limited to the above encryption algorithms.
  • each primary user password and sub-user password are encrypted using the same irreversible encryption algorithm.
  • the irreversible reference value of the sub-user password or the main user password may include one or more of a numerical value, a Chinese character, a letter, or a symbol.
  • the terminal stores the plaintext of the sub-user password or the plain text of the primary user password, the primary user password or the sub-user password is easily leaked. Therefore, in the present invention, the terminal stores the irreversible reference value of the sub-user password or The irreversible reference value of the primary user password can improve the security of the user password.
  • the terminal may encrypt the first primary user password by using an irreversible encryption algorithm to obtain the first irreversible reference value of the first primary user password, and obtain the current secondary user of the primary user from the terminal.
  • the second irreversible reference value of the password may be used to obtain the first irreversible reference value of the first primary user password.
  • step S103 Determine whether the first irreversible reference value and the second irreversible reference value are consistent. If they are consistent, step S104 may be performed. Otherwise, the current flow is ended.
  • the terminal may compare the first irreversible reference value with the second irreversible reference value to determine whether the first irreversible reference value and the second irreversible reference value are consistent to perform identity verification on the primary user. And can improve the security of changing passwords.
  • the terminal may perform step S104. Otherwise, the current process ends.
  • the terminal may also output prompt information to prompt for a password error.
  • steps S101-S103 the primary user is authenticated by using the method of receiving the password input by the user, and the terminal may further perform identity verification on the primary user by receiving the fingerprint input by the user, or may perform the primary user by using other methods.
  • the invention is not limited by the invention.
  • the terminal may receive the input third primary user password, so that the first primary user password may be subjected to the first compliance detection.
  • step S105 Perform a first compliance check on the third primary user password according to the third irreversible reference value of the sub-user password, where the first compliance detection is used to detect whether the third primary user password meets the primary user password.
  • the setting condition, if satisfied, the terminal may perform step S106, otherwise, execute step S107.
  • the terminal can obtain a third irreversible reference value according to the secondary user password.
  • the terminal may determine, according to the third irreversible reference value of the sub-user password, that the third primary user password does not satisfy the first compliance; if the secondary user password is 12345, the third primary user password is 45614, because the secondary user password is The third primary user password does not overlap, so the terminal can determine that the third primary user password meets the first compliance according to the third irreversible reference value of the secondary user password.
  • the terminal may perform the first compliance detection on the third primary user password according to the third irreversible reference value, and may prevent the third primary user password from colliding with the secondary user password, that is, the third primary may be prevented.
  • User password and the The first few bits of the sub-user password overlap or prevent the sub-user password from overlapping with the first few digits of the third primary user password.
  • the terminal may detect whether the secondary user password has been registered. If the terminal has already registered, the terminal may perform the step S105 to perform the third primary user password. A compliance test; otherwise, the terminal can end the process.
  • the third primary user password is used as the updated primary user password.
  • the terminal may use the third primary user password as the updated primary user. password.
  • the terminal may use the third primary user password as the second primary user password, and use the irreversible reference value of the third primary user password as the second primary.
  • An irreversible reference value of the user password and storing an irreversible reference value of the second primary user password and a length of the second primary user password.
  • the terminal may output the first prompt information, where the first prompt information is used.
  • the prompting the third primary user password does not satisfy the first compliance, so that the user can perform corresponding operations according to the prompt information, such as re-entering the third primary user password.
  • the output of the first prompt information may be transmitted in a text manner, or may be outputted in a voice manner, or may be output in a combination of the two, which is not limited by the present invention.
  • the length of the sub-user password or the main user password is too short, the sub-user password and the main user password are easily cracked, that is, the security of the user password is low; if the sub-user password or the main user password is too long It takes a long time for conflict detection, resulting in low availability of user passwords, so the length of the sub-user password or the main user password can be limited by considering the security and availability of the user password.
  • the terminal may modify the primary user password before the sub-user password is registered; or the primary user password may be modified after the sub-user password is registered, if the terminal encrypts the primary user before the sub-user password is registered. If the modification is performed, the primary user password does not need to be tested for compliance; if the terminal modifies the primary user password after the secondary user password is registered, the primary user password needs to be tested for compliance.
  • the terminal when the terminal modifies the primary user password, the terminal replaces the first irreversible reference value of the input first primary user password with the second secondary primary user password (ie, the old primary user password) of the primary user.
  • the reference value is compared to authenticate the primary user, and the security of the modified password can be improved.
  • the input third primary user password is received, and the The first master password (ie, the new master password) performs the first compliance check to prevent the third master password from colliding with the child password, thereby improving the security of the user password.
  • the password detection method shown in FIG. 2 may include the following steps:
  • the terminal may derive a first derived key for the second primary user password using the PBKDF2 algorithm (ie, AES-KEY), and encrypting the preset private key by using AES-KEY to obtain the ciphertext of the preset private key.
  • the PBKDF2 algorithm to derive a fixed value for the second primary user password, and derive a first derived key (ie, an ECIES public-private key pair) based on the fixed value, and encrypt the preset private key by using an ECIES public-private key pair.
  • the manner of encrypting the preset private key is merely an example, not an exhaustive one, including but not limited to the above encryption method.
  • the terminal may perform steps S201 and S202, and obtain a second derived key based on the second primary user password to encrypt the preset private key, and obtain the ciphertext of the preset private key, thereby improving the preset.
  • the security of the private key may be performed by steps S201 and S202, and obtain a second derived key based on the second primary user password to encrypt the preset private key, and obtain the ciphertext of the preset private key, thereby improving the preset. The security of the private key.
  • the terminal may encrypt each of the fourth irreversible reference values by using a preset public key to obtain ciphertexts of the fourth irreversible reference value, which may improve the security of the fourth irreversible reference value.
  • the preset public key and the preset private key may be a public-private key pair
  • the public-private key pair may be a public-private key pair of a highly secure asymmetric encryption algorithm, such as an asymmetric encryption algorithm (Rivest Shamir Adleman). -2048, RSA-2048) or ECIES-256 public-private key pair.
  • asymmetric encryption algorithm Raster Shamir Adleman
  • -2048, RSA-2048 RSA-2048
  • ECIES-256 public-private key pair.
  • the above public-private key pair is merely an example, not an exhaustive one, including but not limited to the public-private key pair described above.
  • the fourth irreversible reference value is an irreversible reference value of multiple sub-user sub-passwords included in the sub-user password
  • the sub-user sub-password is a password segment of the sub-user password, such as the sub-user sub-password. If the value is 1456, the plurality of sub-user sub-passwords included in the sub-user password are 145, 14, and 1.
  • the fourth irreversible reference value is an irreversible reference value of the plurality of sub-user sub-passwords.
  • the terminal may perform steps S201 and S202 when the primary user password is registered, and step S203 when the secondary user password is registered.
  • S206 Receive an input third primary user password when the first irreversible reference value is consistent with the second irreversible reference value.
  • the first derived key is derived according to the first primary user password.
  • the terminal may derive a first derived key (ie, AES-KEY) for the first primary user password using the PBKDF2 algorithm, and use the Advanced Encryption Standard-Key (AES-KEY) to pre- The ciphertext of the private key is decrypted to obtain the preset private key.
  • AES-KEY Advanced Encryption Standard-Key
  • the terminal may derive a first derived key (ie, AES-KEY) for the first primary user password using the PBKDF2 algorithm, and use the Advanced Encryption Standard-Key (AES-KEY) to pre-
  • AES-KEY Advanced Encryption Standard-Key
  • AES-KEY Advanced Encryption Standard-Key
  • ECIES Elliptic Curve Integrated Encryption Scheme
  • the manner of decrypting the ciphertext of the preset private key is only an example, not an exhaustive one, including but not limited to the above decryption mode, and in actual operation, since the decryption process is the reverse process of the encryption process, the decryption method It is mainly determined by encryption.
  • the terminal may perform steps S208 and S209, and derive a first derivative key according to the first primary user password, and decrypt the ciphertext of the preset private key by using the first derivative key to obtain the preset. a private key so that the ciphertext of the fourth irreversible reference value can be decrypted using the preset private key.
  • the terminal may compare the fourth irreversible reference value of the sub-user sub-key with the fifth irreversible reference value of the third primary user, It is determined whether the third primary user password conflicts with the secondary user password.
  • the terminal encrypts and stores the fourth irreversible reference value of the sub-user sub-key, thereby improving the exhaustive security of the sub-user password. Therefore, when the length of the sub-user password is greater than the length of the third primary user password, the terminal may decrypt the ciphertext of each fourth irreversible reference value by using a preset private key to obtain each of the fourth irreversible reference values.
  • step S211 Compare the fifth irreversible reference value of the third primary user password with the fourth irreversible reference value of the first sub-user sub-key to determine whether the third primary user password satisfies the first compliance. Then, the terminal may perform step S212; otherwise, perform step S213.
  • the terminal may compare the fourth irreversible reference value of the first sub-user sub-cipher with the fifth irreversible reference value, and determine not only whether the third primary user password satisfies the first compliance, that is, Determining whether the third primary user password conflicts with the secondary user password, and avoiding comparing all the fourth irreversible reference values with the fifth irreversible reference value to bring a large system memory consumption, thereby improving collision detection. effectiveness.
  • the third primary user password may be determined to satisfy the first compliance;
  • the fifth irreversible reference value of the third primary user password is the same as the fourth irreversible reference value of the first sub-user sub-password, it may be determined that the third primary user password does not satisfy the first compliance.
  • the length of the first sub-user sub-password is the same as the length of the third main user password. For example, if the third primary user password is 123564 and the sub-user password is 14568456, the first sub-user sub-password is used. Can be 145684.
  • the terminal may encrypt the third primary user password using an irreversible encryption algorithm to obtain a fifth irreversible reference value of the third primary user password.
  • the terminal may decrypt the ciphertext of each fourth irreversible reference value by using a preset private key to obtain each of the fourth irreversible reference values, where the fourth irreversible reference value is a plurality of sub-user sub-passwords included in the sub-user password. Irreversible reference value.
  • the terminal may compare the fourth irreversible reference value of the first sub-user sub-cipher with the fifth irreversible reference value.
  • the terminal may determine the fifth irreversible reference value and the first sub-user.
  • the fourth irreversible reference value of the sub-password (the first sub-user sub-password is 145684) is different, and may determine that the third primary user password satisfies the first compliance; if the sub-user sub-password is 12356445, the terminal It may be determined that the fifth irreversible reference value is the same as the fourth irreversible reference value of the first sub-user sub-password (the first sub-user sub-password is 123564), and may determine that the third primary user password does not satisfy the first compliance Sex.
  • the third primary user password is used as the updated primary user password.
  • the first prompt information is used to indicate that the third primary user password does not satisfy the first compliance.
  • steps S204-S206 in the present application can be explained with reference to the embodiment of FIG. 1 for the explanation of steps S101-S104.
  • steps S212 and S213 reference may be made to the embodiment of FIG.
  • steps S106 and S107 indicates that the repetition will not be described again.
  • the terminal when modifying the primary user password, if the length of the secondary user password is greater than the length of the third primary user password (new primary user password), the terminal may use the fifth irreversible reference of the third primary user password. Comparing the value with the fourth irreversible reference value of the first sub-user sub-password to determine whether the third primary user password satisfies the first compliance, thereby preventing the third primary user password from conflicting with the secondary user password, and improving The security of the user password, in addition, the terminal encrypts and stores the fourth irreversible reference value of the sub-user sub-password, thereby improving the exhaustive security of the sub-user password.
  • FIG. 3 A flow chart of another method for detecting a password provided by the embodiment of the present application is described based on the description of the foregoing method for detecting a password.
  • the password detection method shown in FIG. 3 may include the following steps:
  • S303 Receive an input third primary user password when the first irreversible reference value is consistent with the second irreversible reference value.
  • the primary user sub-password is a password segment of the third primary user password.
  • the terminal may determine the length and the sub-user password in the plurality of primary user sub-keys included in the third primary user password.
  • the primary user sub-password of the same length so that the first primary user password can be first checked for compliance.
  • Step S306. Compare the determined sixth irreversible reference value of the primary user sub-password with the third irreversible reference value to determine whether the third primary user password meets the first compliance, and if yes, the terminal may perform Step S307; otherwise, step S308 is performed.
  • the third primary user password is 123564
  • the length of the sub-user password obtained by the terminal is 5, and the length of the third primary user password is 6, and the third primary user password includes multiple primarys.
  • the user sub-password includes 1, 12, 123, 1235, 12356, 123564
  • the terminal may determine, in the plurality of primary user sub-passwords included in the third primary user password, a primary user whose length is the same as the length of the secondary user password.
  • the password determines that the primary user sub-password is 12356.
  • the terminal may encrypt the determined primary user sub-password using an irreversible encryption algorithm to obtain a sixth irreversible reference value, and obtain a third irreversible reference value of the sub-user password.
  • the terminal may determine the The sixth irreversible reference value is different from the third irreversible reference value, and may determine that the third primary user password satisfies the first compliance; if the sub-user password is 12356, the terminal may determine the sixth irreversible reference value and the The third irreversible reference value is the same, and it can be determined that the third primary user password does not satisfy the first compliance.
  • the terminal may determine the length and the sub-user password in the plurality of primary user sub-keys included in the third primary user password.
  • the primary user sub-password of the same length, the primary user sub-password is a password segment of the primary user password, and when the primary user sub-password is determined.
  • the third primary user password may be determined to satisfy the first compliance, and step S307 may be performed; otherwise, the terminal may determine that the third primary user password does not satisfy the The first compliance, and step S308 is performed.
  • the sixth irreversible reference value of the primary user sub-password may be obtained in the process of the primary user inputting the third primary user password, and the terminal may store the sixth irreversible reference value in a cached manner, that is, in the pair After the third primary user password performs the first compliance detection, the sixth irreversible reference value may be deleted, so that the storage space of the terminal may be saved.
  • the third primary user password is used as the updated primary user password.
  • the first prompt information is used to indicate that the third primary user password does not satisfy the first compliance.
  • steps S301 to S304 in the present application can be explained with reference to the embodiment of FIG. 1 for the explanation of steps S101 to S104.
  • steps S307 and S308 reference may be made to the embodiment of FIG.
  • steps S106 and S107 indicates that the repetition will not be described again.
  • the terminal when modifying the password of the primary user, if the length of the secondary user password is less than the length of the third primary user password (new primary user password), the terminal may determine the sixth irreversible of the primary user sub-password.
  • the reference value is compared with the third irreversible reference value to determine whether the third primary user password satisfies the first compliance, and the third primary user password can be prevented from colliding with the secondary user password, and the user password can be improved. Sex.
  • the password detection method shown in FIG. 4 may include the following steps:
  • step S405. When the length of the sub-user password is equal to the length of the third primary user password, compare the third irreversible reference value with the fifth irreversible reference value to determine whether the third primary user password meets the first Compliance, if satisfied, the terminal may perform step S406; otherwise, perform step S407.
  • the terminal can obtain the length of the secondary user password as 6, and the length of the third primary user password is 6, the terminal can use the third irreversible reference value and the first Comparing the five irreversible reference values, if the sub-user password is 145689, the terminal may determine that the third irreversible reference value is different from the fifth irreversible reference value, and may determine that the third primary user password satisfies the first compliance; If the sub-user password is 123564, the terminal may determine that the third irreversible reference value is the same as the fifth irreversible reference value, and may determine that the third primary user password does not satisfy the first compliance.
  • the terminal may compare the third irreversible reference value with the fifth irreversible reference value, where the third irreversible reference value and the When the fifth irreversible reference value is different, the terminal may determine that the third primary user password satisfies the first compliance, and may perform step S406; When the third irreversible reference value is the same as the fifth irreversible reference value, the terminal may determine that the third primary user password does not satisfy the first compliance, and step S407 may be performed.
  • the third primary user password is used as the updated primary user password.
  • the first prompt information is used to indicate that the third primary user password does not satisfy the first compliance.
  • steps S401 to S404 can be explained with reference to the embodiment of FIG. 1 for the explanation of steps S101 to S104.
  • steps S406 and S407 reference may be made to the embodiment of FIG.
  • the explanation of steps S106 and S107 indicates that the repetition will not be described again.
  • the terminal when modifying the primary user password, if the length of the secondary user password is equal to the length of the third primary user password (new primary user password), the terminal may use the third irreversible reference value of the secondary user password and the Comparing the fifth irreversible reference value of the third primary user password to determine whether the third primary user password satisfies the first compliance, preventing the third primary user password from conflicting with the secondary user password, and improving the user password Security.
  • the password detection method shown in FIG. 5 may include the following steps:
  • the terminal only allows the primary user to register the sub-user password, that is, when receiving the registration request of the sub-user password, the terminal can authenticate the primary user by using a password or a fingerprint.
  • Step S502 can be performed; if the verification fails, the process can be ended, and the prompt information can be output to prompt the input of the password or the fingerprint information is incorrect.
  • S502 Perform a second compliance detection on the sub-user password according to the second irreversible reference value of the current primary user's second primary user password, where the second compliance detection is used to detect whether the sub-user password satisfies the sub-user.
  • the setting condition of the user password if yes, the terminal may perform step S503, otherwise, the terminal may perform step S504.
  • the sub-user password is 1234
  • the second primary user password is 12345. Since the sub-user password overlaps with the first four digits of the second master password, the terminal can use the second irreversible reference of the second primary user password. The value determines that the sub-user password does not satisfy the second compliance; if the sub-user password is 12345, the second primary user password is 1234, because the second primary user password overlaps with the first four digits of the sub-user password, the terminal And determining, according to the second irreversible reference value of the second primary user password, that the secondary user password does not satisfy the second compliance; if the secondary user password is 12345, the second primary user password is 1554, because the second primary user password is The sub-user password does not overlap, so the terminal can determine that the sub-user password satisfies the second compliance according to the second irreversible reference value of the second primary user password.
  • the terminal may perform second compliance detection on the sub-user password according to the second irreversible reference value, thereby preventing the sub-user password from colliding with the second primary user password, that is, preventing the sub-user password and the first
  • the first few bits of the two primary user passwords overlap or may prevent the second primary user password from overlapping with the first few digits of the secondary user password.
  • the terminal may complete the registration of the sub-user password, that is, may store the third irreversible reference value of the sub-user password, and may also store the sub-user password.
  • the irreversible reference value of the plurality of sub-user sub-passwords or the ciphertext storing the irreversible reference value of the plurality of sub-user sub-ciphers may also store the length of the sub-user password and the length of each sub-user sub-password, so that the next time can be obtained Sub-user sub-password
  • the reversible reference value detects the conflict of the primary user password.
  • the terminal may encrypt each of the fourth irreversible reference values (ie, irreversible reference values of multiple sub-user sub-ciphers) by using a preset public key to obtain a density of each of the fourth irreversible reference values. And storing the ciphertext of each of the fourth irreversible reference values, so that the exhaustive security of the sub-user password can be improved.
  • fourth irreversible reference values ie, irreversible reference values of multiple sub-user sub-ciphers
  • the terminal may output a second prompt information, where the second prompt information is used to prompt the sub-user password not to satisfy the second compliance, so that the user You can make corresponding actions according to the prompt information, such as re-entering the sub-user password.
  • the second prompt information that is output may be transmitted in a text manner, or may be outputted in a voice manner, or may be output in a combination of the two, which is not limited by the present invention.
  • the terminal first registers the primary user password and then registers the secondary user password. Therefore, when registering the secondary user password, the secondary user password needs to be tested for compliance.
  • the terminal may perform steps S501 to S504 in the present application before executing steps S101 to S107 in FIG. 1 .
  • the terminal when registering the sub-user password, may perform second compliance detection on the sub-user password according to the second irreversible reference value of the second primary user password, so as to prevent the sub-user password and the second primary user.
  • Password conflicts can improve the security of user passwords.
  • the password detection method shown in FIG. 6 may include the following steps:
  • the length of the sub-user complete password is the same as the length of the second main user password
  • the sub-subscriber password in the sub-user complete password is the same as the sub-user password
  • the sub-password is the length. If the sub-user password is equal to the password length of the sub-user, the second user password is 123456, and the sub-user password is 4564.
  • the sub-user password can be 456401, 456402, 456403. , 456404, 456405, 456406, 456407, 456408, 456409, 456400, 456411, 456412, etc., the complement sub-password is 4564.
  • the terminal may obtain multiple sub-users to complete the password according to the sub-user password, so that the sub-user password can be second-compliant. Detection.
  • the seventh irreversible reference value of each sub-user completes the password is compared with the second irreversible reference value to determine whether the sub-user password satisfies the second compliance. If yes, the terminal may perform step S605. Otherwise, the terminal may perform step S606.
  • the terminal may determine that the sub-user password has a length less than the second primary user password.
  • the length of the sub-users obtained by the terminal can be 14568900, 14568901, 14568902, 14568903, etc.
  • the terminal may determine any of the sub-users
  • the seventh irreversible reference value of the replacement password is different from the second irreversible reference value, and may determine that the sub-user password satisfies the second compliance; if the second primary user password is 14568900, the terminal may confirm the existence of the first
  • the seven irreversible reference value is the same as the second irreversible reference value, and it can be determined that the sub-user password does not satisfy the second compliance.
  • the terminal may compare the seventh irreversible reference value of each sub-user complete password with the second irreversible reference value, when any When the seventh irreversible reference value is different from the second irreversible reference value, it may be determined that the sub-user password satisfies the second compliance, and the terminal may perform step S605; when there is a seventh irreversible reference value and the second irreversible reference value When the terminal can determine that the sub-user password does not satisfy the second compliance, step S606 can be performed.
  • the terminal may perform steps S601 to S606 in the present application before executing steps S101 to S107 in FIG. 1 .
  • step S601 the explanation of the step S501 can be explained with reference to the embodiment in FIG. 5.
  • steps S605-S606 the explanation of the steps S503-S504 can be explained with reference to the embodiment in FIG. , the repetition will not be repeated.
  • the terminal may complete the seventh irreversible reference value of each sub-user and the second main user password.
  • the second irreversible reference value is compared to determine whether the sub-user password satisfies the second compliance, the sub-user password can be prevented from colliding with the second primary user password, and the security of the user password can be improved.
  • the password detection method shown in FIG. 7 may include the following steps:
  • the length of the sub-user password and the length of the second main user password are 8 and 6, respectively, and the length of the sub-user password is greater than the length of the second main user password.
  • the sub-subscriber sub-passwords included in the sub-user password may be 1234567, 123456, 12345, 1234, etc., and the second sub-user sub-password is 123456.
  • the terminal may determine the length and the length of the second primary user password in the plurality of sub-user sub-keys included in the sub-user password.
  • the same second Sub-user sub-password which is a password segment of the sub-user password.
  • the eighth irreversible reference value of the second sub-user sub-password is compared with the second irreversible reference value to determine whether the sub-user password satisfies the second compliance. If yes, the terminal may perform step S705. Otherwise, the terminal may perform step S706.
  • the terminal may determine that the length of the sub-user password is greater than the second primary user password.
  • the length of the sub-user sub-password included in the sub-user password may be 14568, 1456, 145, 14, 1, and the terminal may determine the length and the length of the second main user password.
  • the same second sub-user sub-password, the second sub-user sub-password is 14568, and the second sub-user sub-password is encrypted using an irreversible encryption algorithm, and an eighth irreversible reference value of the second sub-user sub-password is obtained, and The eighth irreversible reference value is compared with the second irreversible reference value stored in the terminal. If the second primary user password is 12345, the terminal may determine that the eighth irreversible reference value is different from the second irreversible reference value. And determining that the sub-user password satisfies the second compliance; if the second primary user password is 14568, the terminal may determine the eighth irreversible reference Irreversible same as the second reference value, and may determine that the password does not meet the second sub-user compliance.
  • the terminal may compare the eighth irreversible reference value of the second sub-user sub-cipher with the second irreversible reference value, when When the eighth irreversible reference value of the second sub-user sub-code is different from the second irreversible reference value, it may be determined that the sub-user password satisfies the second compliance, and the terminal may perform step S711; when the second sub-user When the eighth irreversible reference value of the password is the same as the second irreversible reference value, it may be determined that the sub-user password does not satisfy the second compliance, and the terminal may perform step S712.
  • the terminal may perform steps S701 to S706 in the present application before executing steps S101 to S107 in FIG. 1 .
  • step S701 the explanation of the step S501 can be explained with reference to the embodiment in FIG. 5.
  • steps S705-S706 the explanation of the steps S503-S504 can be explained with reference to the embodiment in FIG. , the repetition will not be repeated.
  • the terminal may use the eighth irreversible reference value of the second sub-user sub-password and the second primary user.
  • the second irreversible reference value of the password is compared to determine whether the sub-user password satisfies the second compliance, the sub-user password can be prevented from colliding with the second primary user password, and the security of the user password can be improved.
  • the password detection method shown in FIG. 8 may include the following steps:
  • the second irreversible reference value is used. Comparing with the third irreversible reference value to determine whether the sub-user password satisfies the second compliance.
  • the terminal may determine that the length of the sub-user password is equal to the length of the second primary user password. And using an irreversible encryption algorithm to encrypt the sub-user password, obtaining a third irreversible reference value of the sub-user password, and comparing the third irreversible reference value with the second irreversible reference value stored in the terminal, if the The second primary user password is 145687, the terminal may confirm that the second irreversible reference value is different from the third irreversible reference value, and may determine that the sub-user password satisfies the second compliance; if the second primary user password is 145689, the terminal may confirm that the second irreversible reference value is the same as the third irreversible reference value, and may determine that the sub-user password does not satisfy the second compliance.
  • the terminal may compare the second irreversible reference value with the third irreversible reference value, when the second irreversible reference value and the When the third irreversible reference value is different, it may be determined that the sub-user password satisfies the second compliance, and the terminal may perform step S804; when the second irreversible reference value is the same as the third irreversible reference value, the sub-determination may be performed. The user password does not satisfy the second compliance, and the terminal may perform step S805.
  • the second prompt information is used to indicate that the sub-user password does not satisfy the second compliance.
  • the terminal may perform steps S801 to S805 in the present application before executing steps S101 to S107 in FIG. 1 .
  • step S801 in the present application can be explained with reference to the embodiment of FIG. 5 for explanation of step S501.
  • steps S804-S805 reference may be made to steps S503-S504 of the embodiment of FIG. The explanations are not repeated here.
  • the terminal when the terminal modifies the sub-user password, the terminal can perform the compliance detection on the newly-input sub-user password, and the detection manner can be repeated in the implementation manners in FIG. 5 to FIG. It will not be repeated here.
  • the terminal may use the second irreversible reference value of the second main user password and the sub-user password.
  • the three irreversible reference values are compared to determine whether the sub-user password satisfies the second compliance, and the sub-user password can be prevented from colliding with the second primary user password, and the security of the user password can be improved.
  • FIG. 9 is a schematic structural diagram of a password detecting apparatus according to an embodiment of the present application.
  • the password detecting apparatus described in this embodiment is applied to a terminal, the terminal supports multiple users, and the multiple users include a primary user and a sub-user.
  • the password detecting apparatus includes:
  • the obtaining module 901 is configured to obtain a modification request of the primary user password, where the modification request carries the input first primary user password, acquires a first irreversible reference value of the first primary user password, and the current user's current The second irreversible reference value of the two primary user passwords.
  • the receiving module 902 is configured to receive when the first irreversible reference value is consistent with the second irreversible reference value Enter the third primary user password.
  • the detecting module 903 is configured to perform first compliance detection on the third primary user password according to a third irreversible reference value of the sub-user password, where the first compliance detection is used to detect the third primary user Whether the password satisfies the setting conditions of the primary user password.
  • the prompting module 904 is configured to: if the third primary user password meets the first compliance, use the third primary user password as the updated primary user password; if the third primary user password is not met The first compliant information is outputting the first prompt information, where the first prompt information is used to prompt the third primary user password not to satisfy the first compliance.
  • the detecting module 903 is specifically configured to obtain a length of the sub-user password and a length of the third primary user password; when the length of the sub-user password is greater than a length of the third primary user password And decrypting the ciphertexts of the fourth fourth irreversible reference value by using the preset private key to obtain each of the fourth irreversible reference values, where the fourth irreversible reference value is a plurality of sub-users included in the sub-user password.
  • An irreversible reference value of the password, the sub-user sub-password is a password segment of the sub-user password; when the fifth irreversible reference value of the third primary user password and the fourth irreversible reference value of the first sub-user sub-password When the difference is different, the third primary user password is determined to satisfy the first compliance, and the length of the first sub-user sub-password is the same as the length of the third primary user password.
  • the derivation module 905 is configured to derive a first derived key according to the first primary user password.
  • the decryption module 906 is configured to decrypt the ciphertext of the preset private key by using the first derivative key to obtain the preset private key.
  • the derivation module 905 is further configured to derive a second derived key according to the second primary user password.
  • the first encryption module 907 is configured to encrypt the preset private key by using the second derived key to obtain a ciphertext of the preset private key.
  • the second encryption module 908 is configured to separately encrypt each of the fourth irreversible reference values by using a preset public key to obtain ciphertexts of each of the fourth irreversible reference values.
  • the detecting module 903 is specifically configured to: when the length of the sub-user password is less than the length of the third primary user password, the multiple primary user sub-passwords included in the third primary user password Determining, in the primary user sub-password of the same length as the length of the sub-user password, the primary user sub-password is a password segment of the third primary user password; and determining the sixth irreversible of the primary user sub-password When the reference value is different from the third irreversible reference value, it is determined that the third primary user password satisfies the first compliance.
  • the detecting module 903 is specifically configured to: when the length of the sub-user password is equal to the length of the third primary user password, and the third irreversible reference value is different from the fifth irreversible reference value At the same time, it is determined that the third primary user password satisfies the first compliance.
  • the obtaining module 901 is further configured to acquire a registration request of a sub-user password, where the registration request carries the input sub-user password.
  • the detecting module 903 is further configured to perform second compliance detection on the sub-user password according to the second irreversible reference value, where the second compliance detection is used to detect the sub-detection Whether the user password satisfies the setting condition of the sub-user password.
  • the registration module 909 is configured to complete registration of the sub-user password if the sub-user password satisfies the second compliance.
  • the prompting module 904 is further configured to: if the sub-user password does not satisfy the second compliance, enter The second prompt information is used to indicate that the sub-user password does not satisfy the second compliance.
  • the detecting module 903 is specifically configured to obtain the length of the sub-user password and the length of the second primary user password; when the length of the sub-user password is less than the length of the second primary user password Obtaining, according to the sub-user password, a plurality of sub-users to complete the password, the length of the sub-subscribing password is the same as the length of the second main user password, and the sub-user completes the sub-password in the password Same as the sub-user password, the replenishment sub-password is a password segment whose length is equal to the length of the sub-user password, and the sub-user completes the password; when any of the sub-users completes the password When the irreversible reference value is different from the second irreversible reference value, it is determined that the sub-user password satisfies the second compliance.
  • the detecting module 903 is specifically configured to: when the length of the sub-user password is greater than the length of the second primary user password, determine, in the multiple sub-sub-sub passwords included in the sub-user password, a second sub-user sub-password having a length equal to a length of the second primary user password, the sub-user sub-password being a password segment of the sub-user password; and an eighth irreversible of the second sub-user sub-password When the reference value is different from the second irreversible reference value, it is determined that the sub-user password satisfies the second compliance.
  • the detecting module 903 is specifically configured to: when the length of the sub-user password is equal to the length of the second primary user password, and the second irreversible reference value is different from the third irreversible reference value At the same time, it is determined that the sub-user password satisfies the second compliance.
  • the password detecting apparatus has a function of realizing the corresponding steps in the password detecting method in the above-described embodiments of FIGS. 1 to 8.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the above modules may be software and/or hardware.
  • the principle and the beneficial effects of the cryptographic detecting device can be referred to the foregoing cryptographic detecting method implementation and the beneficial effects. Therefore, the implementation manner of the cryptographic detecting device can be referred to the foregoing method implementation manner, and the method is repeated. I won't go into details here.
  • the terminal when modifying the primary user password, passes the first irreversible reference value of the input first primary user password with the second irreversible reference of the primary user's current second primary user password (ie, the old primary user password). The value is compared to authenticate the primary user, and the security of the modified password can be improved.
  • the first irreversible reference value is consistent with the second irreversible reference value
  • the input third primary user password is received, and the third is received.
  • the primary user password ie, the new primary user password
  • FIG. 10 is a schematic structural diagram of a password detecting apparatus according to an embodiment of the present application.
  • the password detecting apparatus described in this embodiment is applied to a terminal, the terminal supports multiple users, and the multiple users include a primary user and a sub-user.
  • the password detecting apparatus includes:
  • the obtaining module 101 is configured to acquire a registration request of a sub-user password, where the registration request carries the input sub-user password.
  • the detecting module 102 is configured to perform second compliance detection on the sub-user password according to a second irreversible reference value of a current second primary user password of the primary user, where the second compliance detection is used to detect the Whether the sub-user password satisfies the setting condition of the sub-user password.
  • the registration module 103 is configured to complete the sub-user password if the sub-user password satisfies the second compliance Registration.
  • the prompting module 104 is configured to: if the sub-user password does not satisfy the second compliance, output a second prompt information, where the second prompt information is used to prompt the sub-user password does not satisfy the second Regulatory.
  • the detecting module 102 is specifically configured to obtain a length of the sub-user password and a length of the second primary user password; when the length of the sub-user password is less than a length of the second primary user password Obtaining, according to the sub-user password, a plurality of sub-users to complete the password, the length of the sub-subscribing password is the same as the length of the second main user password, and the sub-user completes the sub-password in the password Same as the sub-user password, the replenishment sub-password is a password segment whose length is equal to the length of the sub-user password, and the sub-user completes the password; when any of the sub-users completes the password When the irreversible reference value is different from the second irreversible reference value, it is determined that the sub-user password satisfies the second compliance.
  • the detecting module 102 is specifically configured to: when the length of the sub-user password is greater than the length of the second primary user password, determine, in the multiple sub-sub-sub passwords included in the sub-user password, a second sub-user sub-password having a length equal to a length of the second primary user password, the sub-user sub-password being a password segment of the sub-user password; and an eighth irreversible of the second sub-user sub-password When the reference value is different from the second irreversible reference value, it is determined that the sub-user password satisfies the second compliance.
  • the detecting module 102 is specifically configured to: when the length of the sub-user password is equal to the length of the second primary user password, and the third irreversible reference value and the third irreversible password of the sub-user password When the reference values are not the same, it is determined that the sub-user password satisfies the second compliance.
  • the obtaining module 101 of FIG. 10 may be equivalent to the acquiring module 901 of FIG. 9, the detecting module 102 of FIG. 10 may be equivalent to the detecting module 903 of FIG. 9, and the registration module 103 of FIG. 10 may be equivalent to the registration of FIG. Module 909, prompt module 104 of FIG. 10 may be equivalent to prompt module 904 of FIG.
  • the password detecting apparatus has a function of realizing the corresponding steps in the password detecting method in the above-described embodiments of FIGS. 5 to 8.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the above modules may be software and/or hardware.
  • the principle and the beneficial effects of the cryptographic detecting device can be referred to the foregoing cryptographic detecting method implementation and the beneficial effects. Therefore, the implementation manner of the cryptographic detecting device can be referred to the foregoing method implementation manner, and the method is repeated. I won't go into details here.
  • the terminal may use the second irreversible reference value of the second main user password and the sub-user password.
  • the three irreversible reference values are compared to determine whether the sub-user password satisfies the second compliance, and the sub-user password can be prevented from colliding with the second primary user password, and the security of the user password can be improved.
  • FIG. 11 is a schematic structural diagram of a terminal according to an embodiment of the present application.
  • the terminal described in the present application supports multiple users, and the multiple users include a primary user and a sub-user.
  • the terminal includes: a user interface 111, a display screen 112, a processor 113, a communication interface 114, a memory 115, and the user interface 111.
  • the display screen 112, the processor 113, the communication interface 114, and the memory 115 may be connected by a bus or may be connected in other manners.
  • the processor 113 may be a central processing unit (English: central processing unit, abbreviated: CPU), a network processor (English: network processor, abbreviated: NP) or a combination of a CPU and an NP.
  • the processor 113 can also be A core used to implement communication identity binding in a multi-core CPU or multi-core NP.
  • the above processor 113 may be a hardware chip.
  • the hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (abbreviated as PLD), or a combination thereof.
  • ASIC application-specific integrated circuit
  • PLD programmable logic device
  • the above PLD can be a complex programmable logic device (English: complex programmable logic device, abbreviation: CPLD), field-programmable gate array (English: field-programmable gate array, abbreviation: FPGA), general array logic (English: generic array Logic, abbreviation: GAL) or any combination thereof.
  • the communication interface 114 can be used for transceiving information or signaling interactions, as well as for receiving and transmitting signals.
  • the communication interface 114 can communicate with the network and other devices via wireless communication.
  • the wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access). , Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), e-mail, SMS (Short Messaging Service), and the like.
  • the user interface 111 can be used to receive input numeric or character information, such as the user interface 111 can be used to receive an input sub-user password or a primary user password, and to generate key signal inputs related to user settings and function control of the terminal.
  • the user interface 111 described above may include a touch panel and other input devices.
  • a touch panel also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like, any suitable object or accessory on or near the touch panel).
  • the corresponding connecting device is driven according to a preset program.
  • the touch panel may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller;
  • the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • touch panels can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the user interface 111 can also include other input devices. Specifically, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display screen 112 can be used to display information input by the user or information provided to the user and various menus of the terminal.
  • the display screen 112 can be used to display prompt information for prompting the user sub-user password or the main user password to meet the compliance. Sex.
  • the display screen 112 can be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
  • the touch panel can cover the display screen 112, and when the touch panel detects a touch operation on or near the touch panel, the touch panel transmits to the processor to determine the type of the touch event, and then the processor displays the display according to the type of the touch event.
  • a corresponding visual output is provided on 112.
  • the touch panel and the display screen 112 function as two separate components to implement the input and output functions of the terminal, in some embodiments, the touch panel can be integrated with the display screen 112 to implement the terminal. Input and output functions.
  • the memory 115 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application storage program required for at least one function (such as a list storage function, an image playing function, etc.), and the like; Data (such as audio data, text data) created in accordance with the use of the terminal may be stored, such as a ciphertext in which the memory 115 may store an irreversible reference value of the sub-user password, or an irreversible reference value in which the primary user password is not. And can Including network communication modules, user interface modules, and so on. Further, the memory may include a high speed random access memory, and may also include a nonvolatile memory such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the above memory 115 is also used to store program instructions.
  • the processor 113 can invoke the program instructions stored in the memory 115 to implement the password detection method as shown in the embodiment of the present application.
  • the processor 113 calls the program instructions stored in the memory 115 to perform the following steps:
  • the third primary user password is used as the updated primary user password
  • the first prompt information is output, where the first prompt information is used to prompt that the third primary user password does not satisfy the first compliance .
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • each fourth irreversible reference value is decrypted by using a preset private key to obtain each of the fourth irreversible reference values.
  • the fourth irreversible reference value is an irreversible reference value of the plurality of sub-user sub-ciphers included in the sub-user password, and the sub-user sub-password is a password segment of the sub-user password;
  • the length of the first sub-user sub-password is the same as the length of the third main user password.
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the determined length is the same as the length of the secondary user password in the plurality of primary user sub-keys included in the third primary user password.
  • Primary user sub-password the primary user sub-password is a password segment of the third primary user password;
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the second prompt information is output, where the second prompt information is used to prompt the sub-user password to not satisfy the second compliance.
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the length of the sub-user password is less than the length of the second primary user password, obtaining a plurality of sub-user supplementary passwords according to the sub-user password, the length of the sub-user completing the password and the second primary user
  • the length of the password is the same, and the sub-subscriber password in the sub-user complete password is the same as the sub-user password, and the sub-subscribe password is the sub-user complete password whose length is equal to the length of the sub-user password.
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the length of the plurality of sub-user sub-keys included in the sub-user password is determined to be the same length as the second primary user password.
  • a second sub-user sub-password where the sub-user sub-password is a password segment of the sub-user password;
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the second prompt information is output, where the second prompt information is used to prompt the sub-user password to not satisfy the second compliance.
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the length of the sub-user password is less than the length of the second primary user password, obtaining a plurality of sub-user supplementary passwords according to the sub-user password, the length of the sub-user completing the password and the second primary user
  • the length of the password is the same, and the sub-subscriber password in the sub-user complete password is the same as the sub-user password, and the sub-subscribe password is the sub-user complete password whose length is equal to the length of the sub-user password.
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the length of the plurality of sub-user sub-keys included in the sub-user password is determined to be the same length as the second primary user password.
  • a second sub-user sub-password where the sub-user sub-password is a password segment of the sub-user password;
  • the foregoing processor 113 by calling the program instructions stored in the foregoing memory 115, may further perform the following steps:
  • the new primary user password or the sub-user password can be checked for compliance to prevent the primary user password from colliding with the child user password, and the user password can be improved. safety.
  • the principle of the terminal to solve the problem in the embodiment of the present invention is similar to the method embodiment of the present invention. Therefore, the implementation of the terminal may refer to the implementation of the method, and is not described here.
  • the application also provides a computer program product comprising a non-computer program stored An instantaneous computer readable storage medium operative to cause a computer to perform the steps of the cryptographic detection method in the corresponding embodiments of FIG. 1 to FIG. 8 above, the implementation of the computer program product and the beneficial effects can be seen in the above figure The embodiment and the beneficial effects of the password detecting method of 1 to 8 are not repeated here.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

本申请实施例公开了一种密码检测方法、装置及终端,其中方法包括:获取主用户密码的修改请求,所述修改请求携带输入的第一主用户密码;获取所述第一主用户密码的第一不可逆参考值,以及所述主用户当前的第二主用户密码的第二不可逆参考值;当所述第一不可逆参考值与所述第二不可逆参考值一致时,接收输入的第三主用户密码;根据子用户密码的第三不可逆参考值,对所述第三主用户密码进行第一合规性检测;若所述第三主用户密码满足所述第一合规性,则将所述第三主用户密码作为更新后的主用户密码;若所述第三主用户密码不满足所述第一合规性,则输出第一提示信息,可以防止用户密码冲突,并可提高用户密码的安全性。

Description

密码检测方法、装置及终端 技术领域
本申请涉及通信技术领域,尤其涉及密码检测方法、装置及终端。
背景技术
随着通信技术的发展,终端(例如智能手机、平板电脑、可穿戴设备等)可以支持多用户访问,为了用户的隐私安全,可以为不同用户设置不同的密码,同时为不同用户设置不同的访问空间,进而,终端可以通过密码来区分用户身份,并允许用户访问与该用户身份匹配的空间,例如,终端可以将主用户密码设置为1234,将子用户密码设置为5678,并允许主用户访问主用户空间,主用户空间可以包括通讯录、相册中的数据等,允许子用户访问子用户空间,子用户空间可以包括音乐应用中的数据等。
通常,终端在接收到用户输入的密码时,可以无需用户输入确认指令而直接进入终端系统,以提高用户体验。但是,在主用户密码与子用户密码的前几位存在重叠时,或者在子用户密码与主用户密码的前几位存在重叠时,会导致主用户密码或者子用户密码无法使用,例如,若终端将主用户密码设置为1234,子用户密码设置为123456,则子用户输入1234时,终端将直接进入主用户空间;若终端将主用户密码设置为123456,子用户密码设置为1234,则主用户输入1234时,终端将直接进入子用户空间。
因此,对于支持多用户访问的终端,如何检测用户密码是否存在冲突是亟待解决的问题。
申请内容
本申请实施例所要解决的技术问题在于,提供一种密码检测方法、装置及终端,可以防止用户密码冲突,并可提高用户密码的安全性。
第一方面,本申请实施例提供了一种密码检测方法,该方法中,终端可以获取主用户密码的修改请求,该修改请求携带输入的第一主用户密码,获取该第一主用户密码的第一不可逆参考值,以及该主用户当前的第二主用户密码的第二不可逆参考值,当该第一不可逆参考值与该第二不可逆参考值一致时,接收输入的第三主用户密码,根据子用户密码的第三不可逆参考值,对该第三主用户密码进行第一合规性检测,该第一合规性检测用于检测该第三主用户密码是否满足该主用户密码的设定条件,若该第三主用户密码满足该第一合规性,则将该第三主用户密码作为更新后的主用户密码,若所述第三主用户密码不满足该第一合规性,则输出第一提示信息,该第一提示信息用于提示该第三主用户密码不满足该第一合规性。
在该技术方案中,终端在修改主用户密码时,终端通过将输入的第一主用户密码的第一不可逆参考值与该主用户当前的第二主用户密码(即旧主用户密码)的第二不可逆参考值进行比较,以对主用户进行身份验证,可以提高修改密码的安全性,当该第一不可逆参考值与该第二不可逆参考值一致时,接收输入的第三主用户密码,并对第三主用户密码(即新主用户密码)进行第一合规性检测,以防止该第三主用户密码与子用户密码冲突,可提 高用户密码的安全性。
作为一种可选的实施方式,终端可以获取该子用户密码的长度及该第三主用户密码的长度,当该子用户密码的长度大于该第三主用户密码的长度时,使用预设私钥对各个第四不可逆参考值的密文进行解密,得到各个该第四不可逆参考值,当该第三主用户密码的第五不可逆参考值与第一子用户子密码的第四不可逆参考值不相同时,确定该第三主用户密码满足该第一合规性。
其中,该第四不可逆参考值为该子用户密码所包含的多个子用户子密码的不可逆参考值,该子用户子密码为该子用户密码的一个密码段,该第一子用户子密码的长度与该第三主用户密码的长度相同。
在该技术方案中,当该子用户密码的长度大于该第三主用户密码的长度,且当该第三主用户密码的第五不可逆参考值与该第一子用户子密码的第四不可逆参考值不相同时,确定该第三主用户密码满足该第一合规性,可以防止该第三主用户密码与子用户密码冲突,并可以提高用户密码的安全性,且该第四不可逆参考值是预先被加密的,可以提高子用户密码的安全性。
作为一种可选的实施方式,终端根据该第一主用户密码派生得到第一派生密钥,使用该第一派生密钥对该预设私钥的密文进行解密,得到该预设私钥。
该技术方案中,终端可以基于第一主用户密码派生得到的第一派生密钥对该预设私钥的密文进行解密,以得到该预设私钥。
作为一种可选的实施方式,根据该第二主用户密码派生得到第二派生密钥,使用该第二派生密钥对该预设私钥进行加密,得到该预设私钥的密文。
该技术方案中,终端可以基于该第二主用户密码派生得到第二派生密钥对该预设私钥进行加密,得到该预设私钥的密文,可以提高该预设私钥的安全性。
作为一种可选的实施方式,终端可以使用预设公钥分别对各个该第四不可逆参考值进行加密,得到各个该第四不可逆参考值的密文。
该技术方案中,终端可以使用预设公钥分别对各个该第四不可逆参考值进行加密,得到各个该第四不可逆参考值的密文,可以提高该第四不可逆参考值的安全性。
作为一种可选的实施方式,当该子用户密码的长度小于该第三主用户密码的长度时,终端可以在该第三主用户密码所包含的多个主用户子密码中,确定长度与该子用户密码的长度相同的主用户子密码,该主用户子密码为该第三主用户密码的一个密码段,当确定出的主用户子密码的第六不可逆参考值与该第三不可逆参考值不相同时,确定该第三主用户密码满足该第一合规性。
该技术方案中,当该子用户密码的长度小于该第三主用户密码的长度时,可以确定出长度与该子用户密码的长度相同的主用户子密码,当确定出的主用户子密码的第六不可逆参考值与该第三不可逆参考值不相同时,确定该第三主用户密码满足该第一合规性,可以防止该第三主用户密码与子用户密码冲突,并可以提高用户密码的安全性。
作为一种可选的实施方式,当该子用户密码的长度等于该第三主用户密码的长度,且该第三不可逆参考值与该第五不可逆参考值不相同时,终端可以确定该第三主用户密码满足该第一合规性。
该技术方案中,当该子用户密码的长度等于该第三主用户密码的长度,且该第三不可逆参考值与该第五不可逆参考值不相同时,确定该第三主用户密码满足该第一合规性,可以防止该第三主用户密码与子用户密码冲突,并可以提高用户密码的安全性。
作为一种可选的实施方式,终端可以获取子用户密码的注册请求,该注册请求携带输入的该子用户密码,根据该第二不可逆参考值,对该子用户密码进行第二合规性检测,该第二合规性检测用于检测该子用户密码是否满足该子用户密码的设定条件,若该子用户密码满足该第二合规性,则完成该子用户密码的注册,若该子用户密码不满足该第二合规性,则输出第二提示信息,该第二提示信息用于提示该子用户密码不满足该第二合规性。
该技术方案中,在注册子用户密码时,可以根据第二主用户密码的第二不可逆参考值,对该子用户密码进行第二合规性检测,以防止子用户密码与该第二主用户密码冲突,可提高用户密码的安全性。
作为一种可选的实施方式,终端可以获取该子用户密码的长度及该第二主用户密码的长度,当该子用户密码的长度小于该第二主用户密码的长度时,根据该子用户密码获取多个子用户补齐密码,当任一该子用户补齐密码的第七不可逆参考值与该第二不可逆参考值不相同时,确定该子用户密码满足该第二合规性。
其中,该子用户补齐密码的长度与该第二主用户密码的长度相同,该子用户补齐密码中的补齐子密码与该子用户密码相同,该补齐子密码为长度与该子用户密码长度相等的该子用户补齐密码的一个密码段。
该技术方案中,当该子用户密码的长度小于该第二主用户密码的长度,且任一该子用户补齐密码的第七不可逆参考值与该第二不可逆参考值不相同时,终端可以确定该子用户密码满足该第二合规性,可以防止该子用户密码与该第二主用户密码冲突,并可提高用户密码的安全性。
作为一种可选的实施方式,当该子用户密码的长度大于该第二主用户密码的长度时,终端可以在该子用户密码所包含的多个子用户子密码中,确定长度与该第二主用户密码的长度相同的第二子用户子密码,该子用户子密码为该子用户密码的一个密码段,当该第二子用户子密码的第八不可逆参考值与该第二不可逆参考值不相同时,确定该子用户密码满足该第二合规性。
该技术方案中,当该子用户密码的长度大于该第二主用户密码的长度,且该第二子用户子密码的第八不可逆参考值与该第二不可逆参考值不相同时,终端可以确定该子用户密码满足该第二合规性,可以防止该子用户密码与该第二主用户密码冲突,并可以提高用户密码的安全性。
作为一种可选的实施方式,当该子用户密码的长度等于该第二主用户密码的长度,且该第二不可逆参考值与该第三不可逆参考值不相同时,终端可以确定该子用户密码满足该第二合规性。
该技术方案中,当该子用户密码的长度等于该第二主用户密码的长度,且该第二不可逆参考值与该第三不可逆参考值不相同时,终端可以确定该子用户密码满足该第二合规性,可以防止该子用户密码与该第二主用户密码冲突,并可提高用户密码的安全性。
第二方面,本申请实施例提供了另一种密码检测方法,该方法中,终端可以获取子用 户密码的注册请求,该注册请求携带输入的该子用户密码,根据主用户当前的第二主用户密码的第二不可逆参考值,对该子用户密码进行第二合规性检测,该第二合规性检测用于检测该子用户密码是否满足该子用户密码的设定条件,若该子用户密码满足该第二合规性,则完成该子用户密码的注册,若该子用户密码不满足该第二合规性,则输出第二提示信息,该第二提示信息用于提示该子用户密码不满足该第二合规性。
该技术方案中,在注册子用户密码时,可以根据第二主用户密码的第二不可逆参考值,对该子用户密码进行第二合规性检测,以防止子用户密码与该第二主用户密码冲突,可提高用户密码的安全性。
作为一种可选的实施方式,终端可以获取该子用户密码的长度及该第二主用户密码的长度,当该子用户密码的长度小于该第二主用户密码的长度时,根据该子用户密码获取多个子用户补齐密码,当任一该子用户补齐密码的第七不可逆参考值与该第二不可逆参考值不相同时,确定该子用户密码满足该第二合规性。
其中,该子用户补齐密码的长度与该第二主用户密码的长度相同,该子用户补齐密码中的补齐子密码与该子用户密码相同,该补齐子密码为长度与该子用户密码长度相等的该子用户补齐密码的一个密码段。
该技术方案中,当该子用户密码的长度小于该第二主用户密码的长度,且任一该子用户补齐密码的第七不可逆参考值与该第二不可逆参考值不相同时,终端可以确定该子用户密码满足该第二合规性,可以防止该子用户密码与该第二主用户密码冲突,并可提高用户密码的安全性。
作为一种可选的实施方式,当该子用户密码的长度大于该第二主用户密码的长度时,终端可以在该子用户密码所包含的多个子用户子密码中,确定长度与该第二主用户密码的长度相同的第二子用户子密码,该子用户子密码为该子用户密码的一个密码段,当该第二子用户子密码的第八不可逆参考值与该第二不可逆参考值不相同时,确定该子用户密码满足该第二合规性。
该技术方案中,当该子用户密码的长度大于该第二主用户密码的长度,且该第二子用户子密码的第八不可逆参考值与该第二不可逆参考值不相同时,终端可以确定该子用户密码满足该第二合规性,可以防止该子用户密码与该第二主用户密码冲突,并可以提高用户密码的安全性。
作为一种可选的实施方式,当该子用户密码的长度等于该第二主用户密码的长度,且该第二不可逆参考值与该子用户密码的第三不可逆参考值不相同时,终端可以确定该子用户密码满足该第二合规性。
该技术方案中,当该子用户密码的长度等于该第二主用户密码的长度,且该第二不可逆参考值与该第三不可逆参考值不相同时,终端可以确定该子用户密码满足该第二合规性,可以防止该子用户密码与该第二主用户密码冲突,并可提高用户密码的安全性。
第三方面,本申请实施例提供了一种密码检测装置,该密码检测装置具有实现上述第一方面或第一方面可能的实现方式中行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块,该模块可以是软件和/或硬件。基于同一发明构思,由于该密码检测装置解决问题的原理以及有 益效果可以参见上述第一方面和第一方面的各可能的方法实施方式以及所带来的有益效果,因此该密码检测装置的实施可以参见上述第一方面和第一方面的各可能的方法实施方式,重复之处不再赘述。
第四方面,本申请实施例提供了另一种密码检测装置,该密码检测装置具有实现上述第二方面或第二方面可能的实现方式中行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块,该模块可以是软件和/或硬件。基于同一发明构思,由于该密码检测装置解决问题的原理以及有益效果可以参见上述第二方面和第二方面的各可能的方法实施方式以及所带来的有益效果,因此该密码检测装置的实施可以参见上述第二方面和第二方面的各可能的方法实施方式,重复之处不再赘述。
第五方面,本申请实施例提供了一种终端,该终端包括:存储器,用于存储一个或多个程序;处理器,用于调用存储在该存储器中的程序以实现上述第一方面的方法设计中的方案,该终端解决问题的实施方式以及有益效果可以参见上述第一方面、第二方面、第一方面及第二方面的各可能的方法的实施方式以及有益效果,重复之处不再赘述。
第六方面,本申请实施例提供了一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被至少一个处理器执行时,可以实现上述第一方面、第二方面、第一方面及第二方面的各可能的实施方式以及有益效果,重复之处不再赘述。
第七方面,本申请实施例提供了一种计算机程序产品,该计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,该计算机程序可操作来使计算机实现上述第一方面、第二方面的方法的步骤,该计算机程序产品解决问题的实施方式以及有益效果可以参见上述第一方面、第二方面、第一方面及第二方面各可能的方法的实施方式以及有益效果,重复之处不再赘述。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种密码检测方法的流程示意图;
图2是本申请实施例提供的再一种密码检测方法的流程示意图;
图3是本申请实施例提供的另一种密码检测方法的流程示意图;
图4是本申请实施例提供的又一种密码检测方法的流程示意图;
图5是本申请实施例提供的又一种密码检测方法的流程示意图;
图6是本申请实施例提供的又一种密码检测方法的流程示意图;
图7是本申请实施例提供的又一种密码检测方法的流程示意图;
图8是本申请实施例提供的又一种密码检测方法的流程示意图;
图9是本申请实施例提供的一种密码检测装置的结构示意图;
图10是本申请实施例提供的另一种密码检测装置的结构示意图;
图11是本申请实施例提供的一种终端的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例进行说明。
本发明中,终端在接收到用户输入的密码时,可以无需用户输入确认指令而直接进入终端系统,以提高用户体验。但是,对于支持多用户的终端,在主用户密码与子用户密码的前几位存在重叠时,或者在子用户密码与主用户密码的前几位存在重叠时,会导致主用户密码或者子用户密码无法使用。基于此本发明提出一种密码检测方法及装置,可以防止用户密码冲突,并可提高用户密码的安全性,以下分别进行详细说明。
本发明中,主用户可以是指访问权限较高的用户,子用户可以是指访问权限较低的用户,例如,主用户可以访问私密数据,如访问通信录中的数据、支付应用中的数据等,子用户可以访问游戏应用中的数据等,同时,主用户可以设置或修改子用户密码,主用户还可以设置子用户的访问空间。
需要说明的是,本发明的执行主体可以是终端,终端可以将主用户密码及子用户密码应用于终端屏幕解锁场景或访问终端中的应用(如访问支付应用或社交应用)场景中,例如,终端可以设置接收到主用户密码,才对终端的屏幕进行解锁;终端还可以设置接收到主用户密码,才允许该主用户密码对应的用户访问支付应用;终端还可以设置接收到子用户密码,才允许该子用户密码对应的用户访问浏览器应用中的数据。
本发明中的终端可以是智能手机、平板电脑或智能可穿戴设备等支持多用户的设备,本发明对此不做限定。
以下对本发明实施例提供的密码检测方法、装置及终端进行详细介绍。
请参阅图1,是本申请实施例提供的一种密码检测方法的流程示意图。如图1所示的密码检测方法,包括以下几个步骤:
S101、获取主用户密码的修改请求,该修改请求携带输入的第一主用户密码。
本申请中,终端可以获取主用户密码的修改请求,该修改请求可以携带用户输入的第一主用户密码,该第一主用户密码用于对主用户的身份验证,以提高修改密码的安全性。
作为一种可选的实施例,终端在执行步骤S101之前还可以执行以下步骤:终端可以获取主用户密码的注册请求,该注册请求携带输入的第二主用户密码,并获取该第二主用户密码的第二不可逆参考值。
本申请中,通常终端会首先对主用户密码注册,然后对子用户密码注册,因此,终端在对主用户密码注册时,可以不对主用户密码进行合规性检测。终端可以获取主用户密码的注册请求,该注册请求携带输入用户的第二主用户密码,并使用不可逆加密算法对该第二主用户密码进行加密,以获取该第二主用户密码的第二不可逆参考值,并可以将该第二不可逆参考值存储在终端中,由于终端中存储的不是该第二密码的明文,因此可以提高主用户密码的安全性。
需要说明的是,该不可逆加密算法可以包括基于密码的密钥派生函数(Password-Based Key Derivation Function 2,PBKDF2)、基于哈希运算的消息认证码(Hash-based Message  Authentication Code,HMAC)或消息摘要算法(Message Digest Algorithm 5,MD5)等加密算法,上述加密算法仅是举例,而非穷举,包含但不限于上述加密算法。为了增加各个不可逆参考值的可比性,本发明中,均使用同一种不可逆加密算法对各个主用户密码及子用户密码进行加密。另外,子用户密码或者主用户密码的不可逆参考值可以包括数值、中文文字、字母或符号中的一种或多种。
需要进一步说明的是,若终端存储子用户密码的明文或主用户密码的明文,则容易导致主用户密码或子用户密码泄漏,因此本发明中,终端存储的是子用户密码的不可逆参考值或主用户密码的不可逆参考值,可以提高用户密码的安全性。
S102、获取该第一主用户密码的第一不可逆参考值,以及该主用户当前的第二主用户密码的第二不可逆参考值。
本申请中,终端可以使用不可逆加密算法对第一主用户密码进行加密,以获取该第一主用户密码的第一不可逆参考值,以及可以从该终端中获取该主用户当前的第二主用户密码的第二不可逆参考值。
S103、判断该第一不可逆参考值与该第二不可逆参考值是否一致,若一致,则可以执行步骤S104,否则,结束本次流程。
本申请中,终端可以将该第一不可逆参考值与该第二不可逆参考值进行比较,以判断该第一不可逆参考值与该第二不可逆参考值是否一致,以对该主用户进行身份验证,并可以提高修改密码的安全性。当该第一不可逆参考值与该第二不可逆参考值一致时,终端可以执行步骤S104,否则,结束本次流程,同时,终端也可以输出提示信息,以提示输入密码错误。
需要说明的是,步骤S101~S103是使用接收用户输入密码的方式对主用户进行身份验证,终端还可以接收用户输入指纹的方式对主用户进行身份验证,也可以使用其他方式对该主用户进行身份验证,本发明对此不做限定。
S104、接收输入的第三主用户密码。
本申请中,当该第一不可逆参考值与该第二不可逆参考值一致时,终端可以接收输入的第三主用户密码,以便可以对该第三主用户密码进行第一合规性检测。
S105、根据子用户密码的第三不可逆参考值,对该第三主用户密码进行第一合规性检测,该第一合规性检测用于检测该第三主用户密码是否满足该主用户密码的设定条件,若满足,则终端可以执行步骤S106,否则,执行步骤S107。
举例来说,若子用户密码为12345,该第三主用户密码为1234,由于该第三主用户密码与该子用户密码的前四位重叠,因此终端可以根据子用户密码的第三不可逆参考值,确定该第三主用户密码不满足该第一合规性;若子用户密码为12345,该第三主用户密码为123456,由于该子用户密码与该第三主用户密码的前五位重叠,因此终端可以根据子用户密码的第三不可逆参考值,确定该第三主用户密码不满足第一合规性;若子用户密码为12345,该第三主用户密码为45614,由于该子用户密码与第三主用户密码不重叠,因此终端可以根据子用户密码的第三不可逆参考值,确定该第三主用户密码满足第一合规性。
本申请中,终端可以根据该第三不可逆参考值,对该第三主用户密码进行第一合规性检测,可以防止该第三主用户密码与子用户密码冲突,即可以防止该第三主用户密码与该 子用户密码的前几位重叠或者防止子用户密码与该第三主用户密码的前几位重叠。
需要说明的是,终端在对该第三主用户密码进行第一合规性检测之前,可以检测是否已经注册子用户密码,若已经注册,则终端可以执行步骤S105对第三主用户密码进行第一合规性检测;否则,终端可以结束本次流程。
S106、将该第三主用户密码作为更新后的主用户密码。
本申请中,若该第三主用户密码满足该第一合规性,即在该第三主用户密码与子用户密码不冲突时,终端可以将该第三主用户密码作为更新后的主用户密码。
具体的,若该第三主用户密码满足该第一合规性,则终端可以将该第三主用户密码作为第二主用户密码,将第三主用户密码的不可逆参考值作为该第二主用户密码的不可逆参考值,并存储该第二主用户密码的不可逆参考值及该第二主用户密码的长度。
S107、输出第一提示信息,该第一提示信息用于提示所述第三主用户密码不满足该第一合规性。
本申请中,若所述第三主用户密码不满足该第一合规性,即在该第三主用户密码与子用户密码冲突时,终端可以输出第一提示信息,该第一提示信息用于提示该第三主用户密码不满足该第一合规性,以便用户可以根据提示信息做出相应的操作,如重新输入第三主用户密码。
需要说明的是,输出的第一提示信息可以是以文字的方式传输的,还可以是以语音的方式输出的,还可以是两者结合的方式输出的,本发明对此不做限定。
需要说明的是,如果子用户密码或主用户密码的长度太短,子用户密码和主用户密码容易被破解,即用户密码的安全性较低;如果子用户密码或主用户密码的长度太长,需要较长时间来进行冲突检测,从而导致用户密码的可用性较低,因此可以综合考虑用户密码的安全性及可用性来限制子用户密码或主用户密码的长度。
需要说明的是,终端可以在子用户密码注册之前,对主用户密码进行修改;也可以在子用户密码注册之后,对主用户密码进行修改,若终端在子用户密码注册之前,对主用户密码进行修改,则不需要对主用户密码进行合规性检测;若终端在子用户密码注册之后,对主用户密码进行修改,则需要对主用户密码进行合规性检测。
本申请中,终端在修改主用户密码时,终端通过将输入的第一主用户密码的第一不可逆参考值与该主用户当前的第二主用户密码(即旧主用户密码)的第二不可逆参考值进行比较,以对主用户进行身份验证,可以提高修改密码的安全性,当该第一不可逆参考值与该第二不可逆参考值一致时,接收输入的第三主用户密码,并对第三主用户密码(即新主用户密码)进行第一合规性检测,以防止该第三主用户密码与子用户密码冲突,可以提高用户密码的安全性。
基于上述密码检测方法的实施例的描述,本申请实施例提供的再一种密码检测方法的流程示意图。请参见图2,如图2所示的密码检测方法,可以包括以下几个步骤:
S201、根据主用户当前的第二主用户密码派生得到第二派生密钥。
S202、使用该第二派生密钥对预设私钥进行加密,得到该预设私钥的密文。
举例来说,终端可以使用PBKDF2算法对第二主用户密码派生出第一派生密钥(即 AES-KEY),并使用AES-KEY对该预设私钥进行加密,以得到该预设私钥的密文。或使用PBKDF2算法对第二主用户密码派生出固定值,并基于该固定值派生出第一派生密钥(即ECIES公私钥对),使用ECIES公私钥对,对该预设私钥进行加密,以得到该预设私钥的密文。上述对该预设私钥进行加密的方式仅是举例,而非穷举,包含但不限于上述加密方式。
本申请中,终端可以执行步骤S201及S202,基于该第二主用户密码派生得到第二派生密钥对该预设私钥进行加密,得到该预设私钥的密文,可以提高该预设私钥的安全性。
S203、使用预设公钥分别对各个第四不可逆参考值进行加密,得到各个该第四不可逆参考值的密文。
本申请中,终端可以使用预设公钥分别对各个该第四不可逆参考值进行加密,得到各个该第四不可逆参考值的密文,可以提高该第四不可逆参考值的安全性。
需要说明的是,上述预设公钥和预设私钥可以是公私钥对,该公私钥对可以是安全性较高的非对称加密算法的公私钥对,如非对称加密算法(Rivest Shamir Adleman-2048,RSA-2048)或ECIES-256的公私钥对。上述的公私钥对仅是举例,而非穷举,包含但不限于上述公私钥对。
需要说明的是,该第四不可逆参考值为该子用户密码所包含的多个子用户子密码的不可逆参考值,该子用户子密码为该子用户密码的一个密码段,如该子用户子密码为1456,则该子用户密码所包含的多个子用户子密码为145、14、1,该第四不可逆参考值为该多个子用户子密码的不可逆参考值。
需要说明的是,终端可以在主用户密码注册时执行步骤S201及S202,在子用户密码注册时,执行步骤S203。
S204、获取主用户密码的修改请求,该修改请求携带输入的第一主用户密码。
S205、获取该第一主用户密码的第一不可逆参考值,以及该主用户当前的第二主用户密码的第二不可逆参考值。
S206、当该第一不可逆参考值与该第二不可逆参考值一致时,接收输入的第三主用户密码。
S207、获取该子用户密码的长度及该第三主用户密码的长度。
S208、当该子用户密码的长度大于该第三主用户密码的长度时,根据该第一主用户密码派生得到第一派生密钥。
S209、使用该第一派生密钥对该预设私钥的密文进行解密,得到该预设私钥。
举例来说,终端可以使用PBKDF2算法对第一主用户密码派生出第一派生密钥(即AES-KEY),并使用高级加密标准密钥(Advanced Encryption Standard-KEY,AES-KEY)对该预设私钥的密文进行解密,以得到该预设私钥。或使用PBKDF2算法对第一主用户密码派生出固定值,并基于该固定值派生出第一派生密钥(即ECIES公私钥对),使用椭圆曲线集成加密策略(Elliptic Curve Integrated Encryption Scheme,ECIES)公私钥对,对该预设私钥的密文进行解密,得到该预设私钥。上述对该预设私钥的密文进行解密的方式仅是举例,而非穷举,包含但不限于上述解密方式,同时在实际操作中,由于解密过程是加密过程的逆过程,因此解密方式主要由加密方式确定。
本申请中,终端可以执行步骤S208及S209,根据该第一主用户密码派生得到第一派生密钥,使用该第一派生密钥对该预设私钥的密文进行解密,得到该预设私钥,以便可以使用该预设私钥对第四不可逆参考值的密文进行解密。
S210、使用预设私钥对各个第四不可逆参考值的密文进行解密,得到各个该第四不可逆参考值。
本申请中,当该子用户密码的长度大于该第三主用户密码的长度时,终端可以将子用户子密码的第四不可逆参考值与第三主用户的第五不可逆参考值进行比较,以判断该第三主用户密码是否与该子用户密码冲突,另外,终端将子用户子密码的第四不可逆参考值进行加密存储,可提高子用户密码的穷举安全性。因此,当该子用户密码的长度大于该第三主用户密码的长度时,终端可以使用预设私钥对各个第四不可逆参考值的密文进行解密,得到各个该第四不可逆参考值。
S211、将该第三主用户密码的第五不可逆参考值与第一子用户子密码的第四不可逆参考值进行比较,以判断该第三主用户密码是否满足该第一合规性,若满足,则终端可以执行步骤S212;否则,执行步骤S213。
本申请中,终端可以使用该第一子用户子密码的第四不可逆参考值与该第五不可逆参考值进行比较,不仅可以判断该第三主用户密码是否满足该第一合规性,即可以判断该第三主用户密码是否与该子用户密码冲突,还可以避免将所有的第四不可逆参考值与该第五不可逆参考值进行比较带来较大的系统内存消耗,进而可以提高冲突检测的效率。具体的,当该第三主用户密码的第五不可逆参考值与第一子用户子密码的第四不可逆参考值不相同时,可以确定该第三主用户密码满足该第一合规性;当该第三主用户密码的第五不可逆参考值与第一子用户子密码的第四不可逆参考值相同时,可以确定该第三主用户密码不满足该第一合规性。
需要说明的是,该第一子用户子密码的长度与该第三主用户密码的长度相同,如,第三主用户密码为123564,该子用户密码为14568456,则该第一子用户子密码可以为145684。
举例来说,假如第三主用户密码为123564,终端获取到的该子用户密码的长度为8,及该第三主用户密码的长度为6。终端可以使用不可逆加密算法对该第三主用户密码进行加密,以得到该第三主用户密码的第五不可逆参考值。终端可以将可以使用预设私钥对各个第四不可逆参考值的密文进行解密,得到各个该第四不可逆参考值,该第四不可逆参考值为该子用户密码所包含的多个子用户子密码的不可逆参考值。终端可以将该第一子用户子密码的第四不可逆参考值与该第五不可逆参考值进行比较,若该子用户子密码为14568456,则终端可以确定该第五不可逆参考值与第一子用户子密码(该第一子用户子密码为145684)的第四不可逆参考值不相同,并可以确定该第三主用户密码满足该第一合规性;若该子用户子密码为12356445,则终端可以确定该第五不可逆参考值与第一子用户子密码(该第一子用户子密码为123564)的第四不可逆参考值相同,并可以确定该第三主用户密码不满足该第一合规性。
S212、将该第三主用户密码作为更新后的主用户密码。
S213、输出第一提示信息,该第一提示信息用于提示该第三主用户密码不满足该第一合规性。
需要说明的是,本申请中对步骤S204~S206的解释说明可以参考图1中的实施例对步骤S101~S104的解释说明,对步骤S212和S213的解释说明可以参考图1中的实施例对步骤S106和S107的解释说明,重复之处不再赘述。
本申请中,在对主用户密码进行修改时,如果该子用户密码的长度大于该第三主用户密码(新主用户密码)的长度,终端可以将该第三主用户密码的第五不可逆参考值与第一子用户子密码的第四不可逆参考值进行比较,以判断该第三主用户密码是否满足该第一合规性,可以防止第三主用户密码与子用户密码冲突,并可以提高用户密码的安全性,另外,终端将子用户子密码的第四不可逆参考值进行加密存储,提高了子用户密码的穷举安全性。
基于上述密码检测方法的实施例的描述,本申请实施例提供的另一种密码检测方法的流程示意图。请参见图3,如图3所示的密码检测方法,可以包括以下几个步骤:
S301、获取主用户密码的修改请求,该修改请求携带输入的第一主用户密码。
S302、获取该第一主用户密码的第一不可逆参考值,以及该主用户当前的第二主用户密码的第二不可逆参考值。
S303、当该第一不可逆参考值与该第二不可逆参考值一致时,接收输入的第三主用户密码。
S304、获取该子用户密码的长度及该第三主用户密码的长度。
S305、当该子用户密码的长度小于该第三主用户密码的长度时,在该第三主用户密码所包含的多个主用户子密码中,确定长度与该子用户密码的长度相同的主用户子密码,该主用户子密码为该第三主用户密码的一个密码段。
本申请中,当该子用户密码的长度小于该第三主用户密码的长度时,终端可以在该第三主用户密码所包含的多个主用户子密码中,确定长度与该子用户密码的长度相同的主用户子密码,以便可以对第三主用户密码进行第一合规性检测。
S306、将确定出的主用户子密码的第六不可逆参考值与该第三不可逆参考值进行比较,以判断该第三主用户密码是否满足该第一合规性,若满足,则终端可以执行步骤S307;否则,执行步骤S308。
举例来说,假如第三主用户密码为123564,终端获取到的该子用户密码的长度为5,及该第三主用户密码的长度为6,该第三主用户密码所包含的多个主用户子密码包括1、12、123、1235、12356、123564,终端可以在该第三主用户密码所包含的多个主用户子密码中,确定长度与该子用户密码的长度相同的主用户子密码,确定出的主用户子密码为12356。终端可以使用不可逆加密算法对该确定出的主用户子密码进行加密,以得到第六不可逆参考值,并获取该子用户密码的第三不可逆参考值,若子用户密码为14568,则终端可以确定该第六不可逆参考值与该第三不可逆参考值不相同,并可以确定该第三主用户密码满足该第一合规性;若子用户密码为12356,则终端可以确定该第六不可逆参考值与该第三不可逆参考值相同,并可以确定该第三主用户密码不满足该第一合规性。
本申请中,当该子用户密码的长度小于该第三主用户密码的长度时,终端可以在该第三主用户密码所包含的多个主用户子密码中,确定长度与该子用户密码的长度相同的主用户子密码,该主用户子密码为该主用户密码的一个密码段,当确定出的主用户子密码的第 六不可逆参考值与该第三不可逆参考值不相同时,可以确定该第三主用户密码满足该第一合规性,可以执行步骤S307;否则,终端可以确定该第三主用户密码不满足该第一合规性,并执行步骤S308。
需要说明的是,主用户子密码的第六不可逆参考值可以是在主用户输入该第三主用户密码的过程中获取的,终端可以以缓存的方式存储该第六不可逆参考值,即在对第三主用户密码进行第一合规性检测后,可以将该第六不可逆参考值删除,以便可以节省终端的存储空间。
S307、将该第三主用户密码作为更新后的主用户密码。
S308、输出第一提示信息,该第一提示信息用于提示该第三主用户密码不满足该第一合规性。
需要说明的是,本申请中对步骤S301~S304的解释说明可以参考图1中的实施例对步骤S101~S104的解释说明,对步骤S307和S308的解释说明可以参考图1中的实施例对步骤S106和S107的解释说明,重复之处不再赘述。
本申请中,在对主用户密码进行修改时,如果该子用户密码的长度小于该第三主用户密码(新主用户密码)的长度,终端可以将确定出的主用户子密码的第六不可逆参考值与该第三不可逆参考值进行比较,以判断该第三主用户密码是否满足该第一合规性,可以防止第三主用户密码与该子用户密码冲突,并可以提高用户密码的安全性。
基于上述密码检测方法的实施例的描述,本申请实施例提供的又一种密码检测方法的流程示意图。请参见图4,如图4所示的密码检测方法,可以包括以下几个步骤:
S401、获取主用户密码的修改请求,该修改请求携带输入的第一主用户密码。
S402、获取该第一主用户密码的第一不可逆参考值,以及该主用户当前的第二主用户密码的第二不可逆参考值。
S403、当该第一不可逆参考值与该第二不可逆参考值一致时,接收输入的第三主用户密码。
S404、获取该子用户密码的长度及该第三主用户密码的长度。
S405、当该子用户密码的长度等于该第三主用户密码的长度时,将该第三不可逆参考值与该第五不可逆参考值进行比较,以判断该第三主用户密码是否满足该第一合规性,若满足,则终端可以执行步骤S406;否则,执行步骤S407。
举例来说,假如第三主用户密码为123564,终端可以获取到该子用户密码的长度为6,及该第三主用户密码的长度为6,终端可以将该第三不可逆参考值与该第五不可逆参考值进行比较,若子用户密码为145689,则终端可以确定该第三不可逆参考值与该第五不可逆参考值不相同,并可以确定该第三主用户密码满足该第一合规性;若子用户密码为123564,则终端可以确定该第三不可逆参考值与该第五不可逆参考值相同,并可以确定该第三主用户密码不满足该第一合规性。
本申请中,当该子用户密码的长度等于该第三主用户密码的长度时,终端可以将该第三不可逆参考值与该第五不可逆参考值进行比较,在该第三不可逆参考值与该第五不可逆参考值不相同时,终端可以确定该第三主用户密码满足该第一合规性,可以执行步骤S406; 在该第三不可逆参考值与该第五不可逆参考值相同时,终端可以确定该第三主用户密码不满足该第一合规性,可以执行步骤S407。
S406、将该第三主用户密码作为更新后的主用户密码。
S407、输出第一提示信息,该第一提示信息用于提示该第三主用户密码不满足该第一合规性。
需要说明的是,本申请中对步骤S401~S404的解释说明可以参考图1中的实施例对步骤S101~S104的解释说明,对步骤S406和S407的解释说明可以参考图1中的实施例对步骤S106和S107的解释说明,重复之处不再赘述。
本申请中,在对主用户密码进行修改时,如果该子用户密码的长度等于该第三主用户密码(新主用户密码)的长度,终端可以将子用户密码的第三不可逆参考值与该第三主用户密码的第五不可逆参考值进行比较,以判断该第三主用户密码是否满足该第一合规性,可以防止第三主用户密码与该子用户密码冲突,并可以提高用户密码的安全性。
基于上述密码检测方法的实施例的描述,本申请实施例提供的又一种密码检测方法的流程示意图。请参见图5,如图5所示的密码检测方法,可以包括以下几个步骤:
S501、获取子用户密码的注册请求,该注册请求携带输入的该子用户密码。
需要说明的是,通常终端仅允许主用户对子用户密码进行注册,即在接收到子用户密码的注册请求时,终端可以使用密码或指纹的方式对主用户进行身份验证,在身份验证成功时,可以执行步骤S502;若验证失败,可以结束本次流程,并可以输出提示信息,以提示输入密码或者指纹信息错误。
S502、根据该当前主用户的第二主用户密码第二不可逆参考值,对该子用户密码进行第二合规性检测,该第二合规性检测用于检测该子用户密码是否满足该子用户密码的设定条件,若满足,则终端可执行步骤S503,否则,终端可以执行步骤S504。
举例来说,子用户密码为1234,第二主用户密码为12345,由于该子用户密码与该第二主密码的前四位重叠,因此终端可以根据该第二主用户密码的第二不可逆参考值,确定该子用户密码不满足第二合规性;若子用户密码为12345,该第二主用户密码为1234,由于该第二主用户密码与该子用户密码的前四位重叠,因此终端可以根据该第二主用户密码的第二不可逆参考值,确定该子用户密码不满足第二合规性;若子用户密码为12345,该第二主用户密码为1554,由于该第二主用户密码与该子用户密码不重叠,因此终端可以根据该第二主用户密码的第二不可逆参考值,确定该子用户密码满足第二合规性。
本申请中,终端可以根据该第二不可逆参考值,对该子用户密码进行第二合规性检测,可以防止该子用户密码与第二主用户密码冲突,即可以防止子用户密码与该第二主用户密码的前几位重叠或者可以防止该第二主用户密码与该子用户密码的前几位重叠。
S503、完成该子用户密码的注册。
本申请中,若该子用户密码满足该第二合规性,则终端可以完成该子用户密码的注册,即可以存储该子用户密码的第三不可逆参考值,还可以存储该子用户密码所包含的多个子用户子密码的不可逆参考值或存储该多个子用户子密码的不可逆参考值的密文,也可以存储该子用户密码的长度及各个子用户子密码的长度,以便下次可以获取子用户子密码的不 可逆参考值对主用户密码进行冲突检测。
作为一种可选的实施例,终端可以使用预设公钥分别对各个该第四不可逆参考值(即多个子用户子密码的不可逆参考值)进行加密,得到各个该第四不可逆参考值的密文,并存储各个该第四不可逆参考值的密文,以便可以提高子用户密码的穷举安全性。
S504、输出第二提示信息,该第二提示信息用于提示该子用户密码不满足该第二合规性。
本申请中,若该子用户密码不满足该第二合规性,则终端可以输出第二提示信息,该第二提示信息用于提示该子用户密码不满足该第二合规性,以便用户可以根据提示信息做出相应的操作,如重新输入子用户密码。
需要说明的是,输出的第二提示信息可以是以文字的方式传输的,还可以是以语音的方式输出的,还可以是两者结合的方式输出的,本发明对此不做限定。
需要说明的是,通常终端会首先对主用户密码注册,然后对子用户密码注册,因此在对子用户密码注册时,需要对子用户密码进行合规性检测。
需要说明的是,终端可以在执行图1中的步骤S101~S107之前,执行本申请中的步骤S501~S504。
本申请中,在注册子用户密码时,终端可以根据第二主用户密码的第二不可逆参考值,对该子用户密码进行第二合规性检测,以防止子用户密码与该第二主用户密码冲突,可提高用户密码的安全性。
基于上述密码检测方法的实施例的描述,本申请实施例提供的又一种密码检测方法的流程示意图。请参见图6,如图6所示的密码检测方法,可以包括以下几个步骤:
S601、获取子用户密码的注册请求,该注册请求携带输入的该子用户密码。
S602、获取该子用户密码的长度及该第二主用户密码的长度。
S603、当该子用户密码的长度小于该第二主用户密码的长度时,根据该子用户密码获取多个子用户补齐密码。
需要说明的是,该子用户补齐密码的长度与该第二主用户密码的长度相同,该子用户补齐密码中的补齐子密码与该子用户密码相同,该补齐子密码为长度与该子用户密码长度相等的该子用户补齐密码的一个密码段,如,该第二主用户密码为123456,子用户密码为4564,则该子用户补齐密码可以为456401,456402,456403,456404,456405,456406,456407,456408,456409,456400,456411,456412等,补齐子密码为4564。
本申请中,当该子用户密码的长度小于该第二主用户密码的长度时,终端可以根据该子用户密码获取多个子用户补齐密码,以便可以对该子用户密码进行第二合规性检测。
S604、将各个子用户补齐密码的第七不可逆参考值与该第二不可逆参考值进行比较,以判断该子用户密码是否满足该第二合规性,若满足,则终端可以执行步骤S605,否则,终端可以执行步骤S606。
举例来说,假如该子用户密码为145689,终端获取到的该第二主用户密码长度为8及该子用户密码长度为6,终端可以确定该子用户密码的长度小于该第二主用户密码的长度,终端获取得到的多个子用户补齐密码可以为14568900,14568901,14568902,14568903等 (即该多个子用户补齐密码为该子用户密码后面添加00~99中的任一两位),并根据不可逆加密算法对该多个子用户补齐密码进行加密,得到该多个子用户补齐密码的第七不可逆参考值,将各个该第七不可逆参考值分别与终端中存储的该第二不可逆参考值进行比较,若该第二主用户密码为15645565,则终端可以确定任一该子用户补齐密码的第七不可逆参考值与该第二不可逆参考值不相同,并可以确定该子用户密码满足该第二合规性;若该第二主用户密码为14568900,则终端可以确认存在第七不可逆参考值与该第二不可逆参考值相同,并可以确定该子用户密码不满足该第二合规性。
本申请中,当该子用户密码的长度小于该第二主用户密码的长度时,终端可以将各个子用户补齐密码的第七不可逆参考值与该第二不可逆参考值进行比较,当任一第七不可逆参考值与该第二不可逆参考值不相同时,可以确定该子用户密码满足该第二合规性,终端可以执行步骤S605;当存在第七不可逆参考值与该第二不可逆参考值相同时,终端可以确定该子用户密码不满足该第二合规性,可以执行步骤S606。
S605、完成该子用户密码的注册。
S606、输出第二提示信息,该第二提示信息用于提示该子用户密码不满足该第二合规性。
需要说明的是,终端可以在执行图1中步骤S101~S107之前,执行本申请中的步骤S601~S606。
其中,本申请中对步骤S601的解释说明可以参考图5中的实施例对步骤S501的解释说明,对步骤S605~S606的解释说明可以参考图5中的实施例对步骤S503~S504的解释说明,重复之处不再赘述。
本申请中,在注册子用户密码时,如果该子用户密码的长度小于该第二主用户密码的长度,终端可以将各个子用户补齐密码的第七不可逆参考值与该第二主用户密码的第二不可逆参考值进行比较,以判断该子用户密码是否满足该第二合规性,可以防止子用户密码与该第二主用户密码冲突,并可提高用户密码的安全性。
基于上述密码检测方法的实施例的描述,本申请实施例提供的又一种密码检测方法的流程示意图。请参见图7,如图7所示的密码检测方法,可以包括以下几个步骤:
S701、获取子用户密码的注册请求,该注册请求携带输入的该子用户密码。
S702、获取该子用户密码的长度及该第二主用户密码的长度。
S703、当该子用户密码的长度大于该第二主用户密码的长度时,在该子用户密码所包含的多个子用户子密码中,确定长度与该第二主用户密码的长度相同的第二子用户子密码,该子用户子密码为该子用户密码的一个密码段。
举例来说,终端获取到的子用户密码长度及第二主用户密码长度分别为8和6,可以确定该子用户密码的长度大于该第二主用户密码的长度,若子用户密码为12345678,该子用户密码所包含的多个子用户子密码可以为1234567、123456、12345、1234等,则第二子用户子密码为123456。
本申请中,当该子用户密码的长度大于该第二主用户密码的长度时,终端可以在该子用户密码所包含的多个子用户子密码中,确定长度与该第二主用户密码的长度相同的第二 子用户子密码,该子用户子密码为该子用户密码的一个密码段。
S704、将该第二子用户子密码的第八不可逆参考值与该第二不可逆参考值进行比较,以判断该子用户密码是否满足该第二合规性,若满足,则终端可以执行步骤S705;否则,终端可以执行步骤S706。
举例来说,假如该子用户密码为145689,终端获取到的该第二主用户密码长度为5及该子用户密码长度为6,终端可以确定该子用户密码的长度大于该第二主用户密码的长度,终端可以获取该子用户密码所包含的多个子用户子密码,该多个子用户子密码可以包括14568,1456,145,14,1,终端可以确定长度与该第二主用户密码的长度相同的第二子用户子密码,该第二子用户子密码为14568,并使用不可逆加密算法对第二子用户子密码加密,得到该第二子用户子密码的第八不可逆参考值,并将该第八不可逆参考值与终端中存储的该第二不可逆参考值进行比较,若该第二主用户密码为12345,则终端可以确定该第八不可逆参考值与该第二不可逆参考值不相同,并可以确定该子用户密码满足该第二合规性;若该第二主用户密码为14568,则终端可以确定该第八不可逆参考值与该第二不可逆参考值相同,并可以确定该子用户密码不满足该第二合规性。
本申请中,当该子用户密码的长度大于该第二主用户密码的长度时,终端可以将该第二子用户子密码的第八不可逆参考值与该第二不可逆参考值进行比较,当该第二子用户子密码的第八不可逆参考值与该第二不可逆参考值不相同时,可以确定该子用户密码满足该第二合规性,终端可以执行步骤S711;当该第二子用户子密码的第八不可逆参考值与该第二不可逆参考值相同时,可以确定该子用户密码不满足该第二合规性,终端可以执行步骤S712。
S705、完成该子用户密码的注册。
S706、输出第二提示信息,该第二提示信息用于提示该子用户密码不满足该第二合规性。
需要说明的是,终端可以在执行图1中步骤S101~S107之前,执行本申请中的步骤S701~S706。
其中,本申请中对步骤S701的解释说明可以参考图5中的实施例对步骤S501的解释说明,对步骤S705~S706的解释说明可以参考图5中的实施例对步骤S503~S504的解释说明,重复之处不再赘述。
本申请中,在注册子用户密码时,如果该子用户密码的长度大于该第二主用户密码的长度,终端可以将该第二子用户子密码的第八不可逆参考值与该第二主用户密码的第二不可逆参考值进行比较,以判断该子用户密码是否满足该第二合规性,可以防止子用户密码与该第二主用户密码冲突,并可提高用户密码的安全性。
基于上述密码检测方法的实施例的描述,本申请实施例提供的又一种密码检测方法的流程示意图。请参见图8,如图8所示的密码检测方法,可以包括以下几个步骤:
S801、获取子用户密码的注册请求,该注册请求携带输入的该子用户密码。
S802、获取该子用户密码的长度及该第二主用户密码的长度。
S803、当该子用户密码的长度等于该第二主用户密码的长度,将该第二不可逆参考值 与该第三不可逆参考值进行比较,以判断该子用户密码是否满足该第二合规性。
举例来说,假如该子用户密码为145689,终端获取到该第二主用户密码长度及该子用户密码长度都为6,终端可以确定该子用户密码的长度等于该第二主用户密码的长度,并可以使用不可逆加密算法对子用户密码进行加密,得到该子用户密码的第三不可逆参考值,将该第三不可逆参考值与终端中存储的该第二不可逆参考值进行比较,若该第二主用户密码为145687,则终端可以确认该第二不可逆参考值与该第三不可逆参考值不相同,并可以确定该子用户密码满足该第二合规性;若该第二主用户密码为145689,则终端可以确认该第二不可逆参考值与该第三不可逆参考值相同,并可以确定该子用户密码不满足该第二合规性。
本申请中,当该子用户密码的长度等于该第二主用户密码的长度时,终端可以将该第二不可逆参考值与该第三不可逆参考值进行比较,当该第二不可逆参考值与该第三不可逆参考值不相同时,可以确定该子用户密码满足该第二合规性,终端可以执行步骤S804;当该第二不可逆参考值与该第三不可逆参考值相同时,可以确定该子用户密码不满足该第二合规性,终端可以执行步骤S805。
S804、完成该子用户密码的注册。
S805、输出第二提示信息,该第二提示信息用于提示该子用户密码不满足该第二合规性。
需要说明的是,终端可以在执行图1中步骤S101~S107之前,执行本申请中的步骤S801~S805。
需要说明的是,本申请中对步骤S801的解释说明可以参考图5中的实施例对步骤S501的解释说明,对步骤S804~S805的解释说明可以参考图5中的实施例对步骤S503~S504的解释说明,重复之处不再赘述。
作为一种可选的实施方式,终端在对子用户密码进行修改时,可以对新输入的子用户密码进行合规性检测,其检测的方式可以参见图5~图8中的实施方式,重复之处不再赘述。
本申请中,在注册子用户密码时,如果该子用户密码的长度等于该第二主用户密码的长度,终端可以将该第二主用户密码的第二不可逆参考值与该子用户密码的第三不可逆参考值进行比较,以判断该子用户密码是否满足该第二合规性,可以防止子用户密码与该第二主用户密码冲突,并可以提高用户密码的安全性。
上述详细阐述了本申请实施例的密码检测方法,下面为了便于更好地实施本申请实施例的上述方案,相应地,下面还提供用于配合实施上述方案的相关设备。
请参阅图9,为本申请实施例提供的一种密码检测装置的结构示意图。本实施例中所描述的密码检测装置,应用于终端,所述终端支持多用户,所述多用户包括主用户和子用户,该密码检测装置包括:
获取模块901,用于获取主用户密码的修改请求,所述修改请求携带输入的第一主用户密码,获取所述第一主用户密码的第一不可逆参考值,以及所述主用户当前的第二主用户密码的第二不可逆参考值。
接收模块902,用于当所述第一不可逆参考值与所述第二不可逆参考值一致时,接收 输入的第三主用户密码。
检测模块903,用于根据子用户密码的第三不可逆参考值,对所述第三主用户密码进行第一合规性检测,所述第一合规性检测用于检测所述第三主用户密码是否满足所述主用户密码的设定条件。
提示模块904,用于若所述第三主用户密码满足所述第一合规性,则将所述第三主用户密码作为更新后的主用户密码;若所述第三主用户密码不满足所述第一合规性,则输出第一提示信息,所述第一提示信息用于提示所述第三主用户密码不满足所述第一合规性。
可选的,所述检测模块903,具体用于获取所述子用户密码的长度及所述第三主用户密码的长度;当所述子用户密码的长度大于所述第三主用户密码的长度时,使用预设私钥对各个第四不可逆参考值的密文进行解密,得到各个所述第四不可逆参考值,所述第四不可逆参考值为所述子用户密码所包含的多个子用户子密码的不可逆参考值,所述子用户子密码为所述子用户密码的一个密码段;当所述第三主用户密码的第五不可逆参考值与第一子用户子密码的第四不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性,所述第一子用户子密码的长度与所述第三主用户密码的长度相同。
可选的,派生模块905,用于根据所述第一主用户密码派生得到第一派生密钥。
可选的,解密模块906,用于使用所述第一派生密钥对所述预设私钥的密文进行解密,得到所述预设私钥。
可选的,所述派生模块905,还用于根据所述第二主用户密码派生得到第二派生密钥。
可选的,第一加密模块907,用于使用所述第二派生密钥对所述预设私钥进行加密,得到所述预设私钥的密文。
可选的,第二加密模块908,用于使用预设公钥分别对各个所述第四不可逆参考值进行加密,得到各个所述第四不可逆参考值的密文。
可选的,所述检测模块903,具体用于当所述子用户密码的长度小于所述第三主用户密码的长度时,在所述第三主用户密码所包含的多个主用户子密码中,确定长度与所述子用户密码的长度相同的主用户子密码,所述主用户子密码为所述第三主用户密码的一个密码段;当确定出的主用户子密码的第六不可逆参考值与所述第三不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性。
可选的,所述检测模块903,具体用于当所述子用户密码的长度等于所述第三主用户密码的长度,且所述第三不可逆参考值与所述第五不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性。
可选的,所述获取模块901,还用于获取子用户密码的注册请求,所述注册请求携带输入的所述子用户密码。
可选的,所述检测模块903,还用于根据所述第二不可逆参考值,对所述子用户密码进行第二合规性检测,所述第二合规性检测用于检测所述子用户密码是否满足所述子用户密码的设定条件。
可选的,注册模块909,用于若所述子用户密码满足所述第二合规性,则完成所述子用户密码的注册。
可选的,所述提示模块904,还用于若所述子用户密码不满足所述第二合规性,则输 出第二提示信息,所述第二提示信息用于提示所述子用户密码不满足所述第二合规性。
可选的,所述检测模块903,具体用于获取所述子用户密码的长度及所述第二主用户密码的长度;当所述子用户密码的长度小于所述第二主用户密码的长度时,根据所述子用户密码获取多个子用户补齐密码,所述子用户补齐密码的长度与所述第二主用户密码的长度相同,所述子用户补齐密码中的补齐子密码与所述子用户密码相同,所述补齐子密码为长度与所述子用户密码长度相等的所述子用户补齐密码的一个密码段;当任一所述子用户补齐密码的第七不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
可选的,所述检测模块903,具体用于当所述子用户密码的长度大于所述第二主用户密码的长度时,在所述子用户密码所包含的多个子用户子密码中,确定长度与所述第二主用户密码的长度相同的第二子用户子密码,所述子用户子密码为所述子用户密码的一个密码段;当所述第二子用户子密码的第八不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
可选的,所述检测模块903,具体用于当所述子用户密码的长度等于所述第二主用户密码的长度,且所述第二不可逆参考值与所述第三不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
本申请中,该密码检测装置具有实现上述图1至图8对应实施例中的密码检测方法中相应步骤的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。上述模块可以是软件和/或硬件。基于同一发明构思,由于该密码检测装置解决问题的原理以及有益效果可以参见上述密码检测方法实施方式以及所带来的有益效果,因此该密码检测装置的实施方式可以参见上述方法实施方式,重复之处不再赘述。
本申请中,在修改主用户密码时,终端通过将输入的第一主用户密码的第一不可逆参考值与该主用户当前的第二主用户密码(即旧主用户密码)的第二不可逆参考值进行比较,以对主用户进行身份验证,可以提高修改密码的安全性,当该第一不可逆参考值与该第二不可逆参考值一致时,接收输入的第三主用户密码,并对第三主用户密码(即新主用户密码)进行第一合规性检测,以防止该第三主用户密码与子用户密码冲突,可以提高用户密码的安全性。
请参阅图10,为本申请实施例提供的一种密码检测装置的结构示意图。本实施例中所描述的密码检测装置,应用于终端,所述终端支持多用户,所述多用户包括主用户和子用户,该密码检测装置包括:
获取模块101,用于获取子用户密码的注册请求,所述注册请求携带输入的所述子用户密码。
检测模块102,用于根据主用户当前的第二主用户密码的第二不可逆参考值,对所述子用户密码进行第二合规性检测,所述第二合规性检测用于检测所述子用户密码是否满足所述子用户密码的设定条件。
注册模块103,用于若所述子用户密码满足所述第二合规性,则完成所述子用户密码 的注册。
提示模块104,用于若所述子用户密码不满足所述第二合规性,则输出第二提示信息,所述第二提示信息用于提示所述子用户密码不满足所述第二合规性。
可选的,所述检测模块102,具体用于获取所述子用户密码的长度及所述第二主用户密码的长度;当所述子用户密码的长度小于所述第二主用户密码的长度时,根据所述子用户密码获取多个子用户补齐密码,所述子用户补齐密码的长度与所述第二主用户密码的长度相同,所述子用户补齐密码中的补齐子密码与所述子用户密码相同,所述补齐子密码为长度与所述子用户密码长度相等的所述子用户补齐密码的一个密码段;当任一所述子用户补齐密码的第七不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
可选的,所述检测模块102,具体用于当所述子用户密码的长度大于所述第二主用户密码的长度时,在所述子用户密码所包含的多个子用户子密码中,确定长度与所述第二主用户密码的长度相同的第二子用户子密码,所述子用户子密码为所述子用户密码的一个密码段;当所述第二子用户子密码的第八不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
可选的,所述检测模块102,具体用于当所述子用户密码的长度等于所述第二主用户密码的长度,且所述第二不可逆参考值与所述子用户密码的第三不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
需要说明的是,图10的获取模块101可以相当于图9的获取模块901,图10的检测模块102可以相当于图9的检测模块903,图10的注册模块103可以相当于图9的注册模块909,图10的提示模块104可以相当于图9的提示模块904。
本申请中,该密码检测装置具有实现上述图5至图8对应实施例中的密码检测方法中相应步骤的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。上述模块可以是软件和/或硬件。基于同一发明构思,由于该密码检测装置解决问题的原理以及有益效果可以参见上述密码检测方法实施方式以及所带来的有益效果,因此该密码检测装置的实施方式可以参见上述方法实施方式,重复之处不再赘述。
本申请中,在注册子用户密码时,如果该子用户密码的长度等于该第二主用户密码的长度,终端可以将该第二主用户密码的第二不可逆参考值与该子用户密码的第三不可逆参考值进行比较,以判断该子用户密码是否满足该第二合规性,可以防止子用户密码与该第二主用户密码冲突,并可以提高用户密码的安全性。
请参阅图11,为本申请实施例提供的一种终端的结构示意图。本申请中所描述的终端支持多用户,所述多用户包括主用户和子用户,所述终端包括:用户接口111,显示屏112,处理器113,通信接口114,存储器115,上述用户接口111,显示屏112,处理器113,通信接口114以及存储器115可以通过总线连接,也可以以其他方式连接。
处理器113可以是中央处理器(英文:central processing unit,缩写:CPU),网络处理器(英文:network processor,缩写:NP)或者CPU和NP的组合。处理器113也可以是 多核CPU或多核NP中用于实现通信标识绑定的核。
上述处理器113可以是硬件芯片。上述硬件芯片可以是专用集成电路(英文:application-specific integrated circuit,缩写:ASIC),可编程逻辑器件(英文:programmable logic device,缩写:PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(英文:complex programmable logic device,缩写:CPLD),现场可编程逻辑门阵列(英文:field-programmable gate array,缩写:FPGA),通用阵列逻辑(英文:generic array logic,缩写:GAL)或其任意组合。
通信接口114可用于收发信息或信令的交互,以及信号的接收和发送,特别地,通信接口114可以通过无线通信与网络和其他设备进行通信。所述无线通信可以使用任一通信标准或协议,包括但不限于GSM(Global System of Mobile communication,全球移动通讯系统)、GPRS(General Packet Radio Service,通用分组无线服务)、CDMA(Code Division Multiple Access,码分多址)、WCDMA(Wideband Code Division Multiple Access,宽带码分多址)、LTE(Long Term Evolution,长期演进)、电子邮件、SMS(Short Messaging Service,短消息服务)等。
用户接口111可用于接收输入的数字或字符信息,如用户接口111可用于接收输入的子用户密码或主用户密码,以及产生与该终端的用户设置以及功能控制有关的键信号输入。具体地,上述用户接口111可包括触控面板以及其他输入设备。触控面板,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板上或在触控面板附近的操作),并根据预先设定的程式驱动相应的连接装置。
可选的,触控面板可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器,并能接收处理器发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板。除了触控面板,用户接口111还可以包括其他输入设备。具体地,其他输入设备可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示屏112可用于显示由用户输入的信息或提供给用户的信息以及该终端的各种菜单,如,显示屏112可用于显示提示信息,用于提示用户子用户密码或主用户密码满足合规性。显示屏112可以采用LCD(Liquid Crystal Display,液晶显示器)、OLED(Organic Light-Emitting Diode,有机发光二极管)等形式来配置。进一步的,触控面板可覆盖显示屏112,当触控面板检测到在其上或附近的触摸操作后,传送给处理器以确定触摸事件的类型,随后处理器根据触摸事件的类型在显示屏112上提供相应的视觉输出。虽然在图11中,触控面板与显示屏112是作为两个独立的部件来实现终端的输入和输出功能,但是在某些实施例中,可以将触控面板与显示屏112集成而实现终端的输入和输出功能。
上述存储器115可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用存储程序(比如列表存储功能、图象播放功能等)等;存储数据区可存储根据终端的使用所创建的数据(比如音频数据、文字数据)等,如存储器115可存储子用户密码的不可逆参考值的密文,或主用户密码不的不可逆参考值等。并可以 包括网络通信模块、用户接口模块等。此外,存储器可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
上述存储器115还用于存储程序指令。上述处理器113可以调用上述存储器115存储的程序指令,实现如本申请实施例所示的密码检测方法。
具体的,上述处理器113调用存储在上述存储器115存储的程序指令执行以下步骤:
获取主用户密码的修改请求,所述修改请求携带输入的第一主用户密码;
获取所述第一主用户密码的第一不可逆参考值,以及所述主用户当前的第二主用户密码的第二不可逆参考值;
当所述第一不可逆参考值与所述第二不可逆参考值一致时,接收输入的第三主用户密码;
根据子用户密码的第三不可逆参考值,对所述第三主用户密码进行第一合规性检测,所述第一合规性检测用于检测所述第三主用户密码是否满足所述主用户密码的设定条件;
若所述第三主用户密码满足所述第一合规性,则将所述第三主用户密码作为更新后的主用户密码;
若所述第三主用户密码不满足所述第一合规性,则输出第一提示信息,所述第一提示信息用于提示所述第三主用户密码不满足所述第一合规性。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
获取所述子用户密码的长度及所述第三主用户密码的长度;
当所述子用户密码的长度大于所述第三主用户密码的长度时,使用预设私钥对各个第四不可逆参考值的密文进行解密,得到各个所述第四不可逆参考值,所述第四不可逆参考值为所述子用户密码所包含的多个子用户子密码的不可逆参考值,所述子用户子密码为所述子用户密码的一个密码段;
当所述第三主用户密码的第五不可逆参考值与第一子用户子密码的第四不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性,所述第一子用户子密码的长度与所述第三主用户密码的长度相同。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
根据所述第一主用户密码派生得到第一派生密钥;
使用所述第一派生密钥对所述预设私钥的密文进行解密,得到所述预设私钥。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
根据所述第二主用户密码派生得到第二派生密钥;
使用所述第二派生密钥对所述预设私钥进行加密,得到所述预设私钥的密文。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
使用预设公钥分别对各个所述第四不可逆参考值进行加密,得到各个所述第四不可逆 参考值的密文。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
当所述子用户密码的长度小于所述第三主用户密码的长度时,在所述第三主用户密码所包含的多个主用户子密码中,确定长度与所述子用户密码的长度相同的主用户子密码,所述主用户子密码为所述第三主用户密码的一个密码段;
当确定出的主用户子密码的第六不可逆参考值与所述第三不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
当所述子用户密码的长度等于所述第三主用户密码的长度,且所述第三不可逆参考值与所述第五不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
获取子用户密码的注册请求,所述注册请求携带输入的所述子用户密码;
根据所述第二不可逆参考值,对所述子用户密码进行第二合规性检测,所述第二合规性检测用于检测所述子用户密码是否满足所述子用户密码的设定条件;
若所述子用户密码满足所述第二合规性,则完成所述子用户密码的注册;
若所述子用户密码不满足所述第二合规性,则输出第二提示信息,所述第二提示信息用于提示所述子用户密码不满足所述第二合规性。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
获取所述子用户密码的长度及所述第二主用户密码的长度;
当所述子用户密码的长度小于所述第二主用户密码的长度时,根据所述子用户密码获取多个子用户补齐密码,所述子用户补齐密码的长度与所述第二主用户密码的长度相同,所述子用户补齐密码中的补齐子密码与所述子用户密码相同,所述补齐子密码为长度与所述子用户密码长度相等的所述子用户补齐密码的一个密码段;
当任一所述子用户补齐密码的第七不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
当所述子用户密码的长度大于所述第二主用户密码的长度时,在所述子用户密码所包含的多个子用户子密码中,确定长度与所述第二主用户密码的长度相同的第二子用户子密码,所述子用户子密码为所述子用户密码的一个密码段;
当所述第二子用户子密码的第八不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
当所述子用户密码的长度等于所述第二主用户密码的长度,且所述第二不可逆参考值与所述第三不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
获取子用户密码的注册请求,所述注册请求携带输入的所述子用户密码;
根据主用户当前的第二主用户密码的第二不可逆参考值,对所述子用户密码进行第二合规性检测,所述第二合规性检测用于检测所述子用户密码是否满足所述子用户密码的设定条件;
若所述子用户密码满足所述第二合规性,则完成所述子用户密码的注册;
若所述子用户密码不满足所述第二合规性,则输出第二提示信息,所述第二提示信息用于提示所述子用户密码不满足所述第二合规性。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
获取所述子用户密码的长度及所述第二主用户密码的长度;
当所述子用户密码的长度小于所述第二主用户密码的长度时,根据所述子用户密码获取多个子用户补齐密码,所述子用户补齐密码的长度与所述第二主用户密码的长度相同,所述子用户补齐密码中的补齐子密码与所述子用户密码相同,所述补齐子密码为长度与所述子用户密码长度相等的所述子用户补齐密码的一个密码段;
当任一所述子用户补齐密码的第七不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
当所述子用户密码的长度大于所述第二主用户密码的长度时,在所述子用户密码所包含的多个子用户子密码中,确定长度与所述第二主用户密码的长度相同的第二子用户子密码,所述子用户子密码为所述子用户密码的一个密码段;
当所述第二子用户子密码的第八不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
可选的,上述处理器113调用存储在上述存储器115存储的程序指令还可以执行以下步骤:
当所述子用户密码的长度等于所述第二主用户密码的长度,且所述第二不可逆参考值与所述子用户密码的第三不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
本申请中,在修改主用户密码或在注册子用户密码时,可以对新主用户密码或子用户密码进行合规性检测,以防止该主用户密码与子用户密码冲突,可以提高用户密码的安全性。
基于同一发明构思,本发明实施例中提供的终端解决问题的原理与本发明方法实施例相似,因此该终端的实施可以参见方法的实施,为简洁描述,在这里不再赘述。
本申请还提供了一种计算机程序产品,该计算机程序产品包括存储了计算机程序的非 瞬时性计算机可读存储介质,该计算机程序可操作来使计算机执行上述图1至图8对应实施例中的密码检测方法的步骤,该计算机程序产品解决问题的实施方式以及有益效果可以参见上述图1至图8的密码检测方法的实施方式以及有益效果,重复之处不再赘述。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,上述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,上述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。

Claims (33)

  1. 一种密码检测方法,应用于终端,所述终端支持多用户,所述多用户包括主用户和子用户,其特征在于,包括:
    获取主用户密码的修改请求,所述修改请求携带输入的第一主用户密码;
    获取所述第一主用户密码的第一不可逆参考值,以及所述主用户当前的第二主用户密码的第二不可逆参考值;
    当所述第一不可逆参考值与所述第二不可逆参考值一致时,接收输入的第三主用户密码;
    根据子用户密码的第三不可逆参考值,对所述第三主用户密码进行第一合规性检测,所述第一合规性检测用于检测所述第三主用户密码是否满足所述主用户密码的设定条件;
    若所述第三主用户密码满足所述第一合规性,则将所述第三主用户密码作为更新后的主用户密码;
    若所述第三主用户密码不满足所述第一合规性,则输出第一提示信息,所述第一提示信息用于提示所述第三主用户密码不满足所述第一合规性。
  2. 如权利要求1所述的方法,其特征在于,所述根据子用户密码的第三不可逆参考值,对所述第三主用户密码进行第一合规性检测,包括:
    获取所述子用户密码的长度及所述第三主用户密码的长度;
    当所述子用户密码的长度大于所述第三主用户密码的长度时,使用预设私钥对各个第四不可逆参考值的密文进行解密,得到各个所述第四不可逆参考值,所述第四不可逆参考值为所述子用户密码所包含的多个子用户子密码的不可逆参考值,所述子用户子密码为所述子用户密码的一个密码段;
    当所述第三主用户密码的第五不可逆参考值与第一子用户子密码的第四不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性,所述第一子用户子密码的长度与所述第三主用户密码的长度相同。
  3. 如权利要求2所述的方法,其特征在于,所述使用预设私钥对各个第四不可逆参考值的密文进行解密,得到各个所述第四不可逆参考值之前,所述方法还包括:
    根据所述第一主用户密码派生得到第一派生密钥;
    使用所述第一派生密钥对所述预设私钥的密文进行解密,得到所述预设私钥。
  4. 如权利要求3所述的方法,其特征在于,所述使用所述第一派生密钥对所述预设私钥的密文进行解密,得到所述预设私钥之前,所述方法还包括:
    根据所述第二主用户密码派生得到第二派生密钥;
    使用所述第二派生密钥对所述预设私钥进行加密,得到所述预设私钥的密文。
  5. 如权利要求2所述的方法,其特征在于,所述使用预设私钥对各个第四不可逆参考值的密文进行解密,得到各个所述第四不可逆参考值之前,还包括:
    使用预设公钥分别对各个所述第四不可逆参考值进行加密,得到各个所述第四不可逆参考值的密文。
  6. 如权利要求2所述的方法,其特征在于,所述获取所述子用户密码的长度和所述第三主用户密码的长度之后,还包括:
    当所述子用户密码的长度小于所述第三主用户密码的长度时,在所述第三主用户密码所包含的多个主用户子密码中,确定长度与所述子用户密码的长度相同的主用户子密码,所述主用户子密码为所述第三主用户密码的一个密码段;
    当确定出的主用户子密码的第六不可逆参考值与所述第三不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性。
  7. 如权利要求2所述的方法,其特征在于,所述获取所述子用户密码的长度和所述第三主用户密码的长度之后,所述方法还包括:
    当所述子用户密码的长度等于所述第三主用户密码的长度,且所述第三不可逆参考值与所述第五不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性。
  8. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    获取子用户密码的注册请求,所述注册请求携带输入的所述子用户密码;
    根据所述第二不可逆参考值,对所述子用户密码进行第二合规性检测,所述第二合规性检测用于检测所述子用户密码是否满足所述子用户密码的设定条件;
    若所述子用户密码满足所述第二合规性,则完成所述子用户密码的注册;
    若所述子用户密码不满足所述第二合规性,则输出第二提示信息,所述第二提示信息用于提示所述子用户密码不满足所述第二合规性。
  9. 如权利要求8所述的方法,其特征在于,所述根据所述第二不可逆参考值,对所述子用户密码进行第二合规性检测,包括:
    获取所述子用户密码的长度及所述第二主用户密码的长度;
    当所述子用户密码的长度小于所述第二主用户密码的长度时,根据所述子用户密码获取多个子用户补齐密码,所述子用户补齐密码的长度与所述第二主用户密码的长度相同,所述子用户补齐密码中的补齐子密码与所述子用户密码相同,所述补齐子密码为长度与所述子用户密码长度相等的所述子用户补齐密码的一个密码段;
    当任一所述子用户补齐密码的第七不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  10. 如权利要求9所述的方法,其特征在于,所述获取所述子用户密码的长度及所述第二主用户密码的长度之后,所述方法还包括:
    当所述子用户密码的长度大于所述第二主用户密码的长度时,在所述子用户密码所包含的多个子用户子密码中,确定长度与所述第二主用户密码的长度相同的第二子用户子密 码,所述子用户子密码为所述子用户密码的一个密码段;
    当所述第二子用户子密码的第八不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  11. 如权利要求9所述的方法,其特征在于,所述获取所述子用户密码的长度及所述第二主用户密码的长度之后,所述方法还包括:
    当所述子用户密码的长度等于所述第二主用户密码的长度,且所述第二不可逆参考值与所述第三不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  12. 一种密码检测方法,应用于终端,所述终端支持多用户,所述多用户包括主用户和子用户,其特征在于,包括:
    获取子用户密码的注册请求,所述注册请求携带输入的所述子用户密码;
    根据主用户当前的第二主用户密码的第二不可逆参考值,对所述子用户密码进行第二合规性检测,所述第二合规性检测用于检测所述子用户密码是否满足所述子用户密码的设定条件;
    若所述子用户密码满足所述第二合规性,则完成所述子用户密码的注册;
    若所述子用户密码不满足所述第二合规性,则输出第二提示信息,所述第二提示信息用于提示所述子用户密码不满足所述第二合规性。
  13. 如权利要求12所述的方法,其特征在于,所述根据所述主用户当前的第二主用户密码的第二不可逆参考值,对所述子用户密码进行第二合规性检测,包括:
    获取所述子用户密码的长度及所述第二主用户密码的长度;
    当所述子用户密码的长度小于所述第二主用户密码的长度时,根据所述子用户密码获取多个子用户补齐密码,所述子用户补齐密码的长度与所述第二主用户密码的长度相同,所述子用户补齐密码中的补齐子密码与所述子用户密码相同,所述补齐子密码为长度与所述子用户密码长度相等的所述子用户补齐密码的一个密码段;
    当任一所述子用户补齐密码的第七不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  14. 如权利要求13所述的方法,其特征在于,所述获取所述子用户密码的长度及所述第二主用户密码的长度之后,所述方法还包括:
    当所述子用户密码的长度大于所述第二主用户密码的长度时,在所述子用户密码所包含的多个子用户子密码中,确定长度与所述第二主用户密码的长度相同的第二子用户子密码,所述子用户子密码为所述子用户密码的一个密码段;
    当所述第二子用户子密码的第八不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  15. 如权利要求13所述的方法,其特征在于,所述获取所述子用户密码的长度及所述 第二主用户密码的长度之后,所述方法还包括:
    当所述子用户密码的长度等于所述第二主用户密码的长度,且所述第二不可逆参考值与所述子用户密码的第三不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  16. 一种密码检测装置,应用于终端,所述终端支持多用户,所述多用户包括主用户和子用户,其特征在于,包括:
    获取模块,用于获取主用户密码的修改请求,所述修改请求携带输入的第一主用户密码,获取所述第一主用户密码的第一不可逆参考值,以及所述主用户当前的第二主用户密码的第二不可逆参考值;
    接收模块,用于当所述第一不可逆参考值与所述第二不可逆参考值一致时,接收输入的第三主用户密码;
    检测模块,用于根据子用户密码的第三不可逆参考值,对所述第三主用户密码进行第一合规性检测,所述第一合规性检测用于检测所述第三主用户密码是否满足所述主用户密码的设定条件;
    提示模块,用于若所述第三主用户密码满足所述第一合规性,则将所述第三主用户密码作为更新后的主用户密码;若所述第三主用户密码不满足所述第一合规性,则输出第一提示信息,所述第一提示信息用于提示所述第三主用户密码不满足所述第一合规性。
  17. 如权利要求16所述的装置,其特征在于,
    所述检测模块,具体用于获取所述子用户密码的长度及所述第三主用户密码的长度;当所述子用户密码的长度大于所述第三主用户密码的长度时,使用预设私钥对各个第四不可逆参考值的密文进行解密,得到各个所述第四不可逆参考值,所述第四不可逆参考值为所述子用户密码所包含的多个子用户子密码的不可逆参考值,所述子用户子密码为所述子用户密码的一个密码段;当所述第三主用户密码的第五不可逆参考值与第一子用户子密码的第四不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性,所述第一子用户子密码的长度与所述第三主用户密码的长度相同。
  18. 如权利要求17所述的装置,其特征在于,
    所述装置还包括:
    派生模块,用于根据所述第一主用户密码派生得到第一派生密钥;
    解密模块,用于使用所述第一派生密钥对所述预设私钥的密文进行解密,得到所述预设私钥。
  19. 如权利要求18所述的装置,其特征在于,
    所述派生模块,还用于根据所述第二主用户密码派生得到第二派生密钥;
    所述装置还包括:
    第一加密模块,用于使用所述第二派生密钥对所述预设私钥进行加密,得到所述预设 私钥的密文。
  20. 如权利要求17所述的装置,其特征在于,
    所述装置还包括:
    第二加密模块,用于使用预设公钥分别对各个所述第四不可逆参考值进行加密,得到各个所述第四不可逆参考值的密文。
  21. 如权利要求17所述的装置,其特征在于,
    所述检测模块,具体用于当所述子用户密码的长度小于所述第三主用户密码的长度时,在所述第三主用户密码所包含的多个主用户子密码中,确定长度与所述子用户密码的长度相同的主用户子密码,所述主用户子密码为所述第三主用户密码的一个密码段;当确定出的主用户子密码的第六不可逆参考值与所述第三不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性。
  22. 如权利要求17所述的装置,其特征在于,
    所述检测模块,具体用于当所述子用户密码的长度等于所述第三主用户密码的长度,且所述第三不可逆参考值与所述第五不可逆参考值不相同时,确定所述第三主用户密码满足所述第一合规性。
  23. 如权利要求16所述的装置,其特征在于,
    所述获取模块,还用于获取子用户密码的注册请求,所述注册请求携带输入的所述子用户密码;
    所述检测模块,还用于根据所述第二不可逆参考值,对所述子用户密码进行第二合规性检测,所述第二合规性检测用于检测所述子用户密码是否满足所述子用户密码的设定条件;
    所述装置还包括:
    注册模块,用于若所述子用户密码满足所述第二合规性,则完成所述子用户密码的注册;
    所述提示模块,还用于若所述子用户密码不满足所述第二合规性,则输出第二提示信息,所述第二提示信息用于提示所述子用户密码不满足所述第二合规性。
  24. 如权利要求23所述的装置,其特征在于,
    所述检测模块,具体用于获取所述子用户密码的长度及所述第二主用户密码的长度;当所述子用户密码的长度小于所述第二主用户密码的长度时,根据所述子用户密码获取多个子用户补齐密码,所述子用户补齐密码的长度与所述第二主用户密码的长度相同,所述子用户补齐密码中的补齐子密码与所述子用户密码相同,所述补齐子密码为长度与所述子用户密码长度相等的所述子用户补齐密码的一个密码段;当任一所述子用户补齐密码的第七不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合 规性。
  25. 如权利要求24所述的装置,其特征在于,
    所述检测模块,具体用于当所述子用户密码的长度大于所述第二主用户密码的长度时,在所述子用户密码所包含的多个子用户子密码中,确定长度与所述第二主用户密码的长度相同的第二子用户子密码,所述子用户子密码为所述子用户密码的一个密码段;当所述第二子用户子密码的第八不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  26. 如权利要求24所述的装置,其特征在于,
    所述检测模块,具体用于当所述子用户密码的长度等于所述第二主用户密码的长度,且所述第二不可逆参考值与所述第三不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  27. 一种密码检测装置,应用于终端,所述终端支持多用户,所述多用户包括主用户和子用户,其特征在于,包括:
    获取模块,用于获取子用户密码的注册请求,所述注册请求携带输入的所述子用户密码;
    检测模块,用于根据主用户当前的第二主用户密码的第二不可逆参考值,对所述子用户密码进行第二合规性检测,所述第二合规性检测用于检测所述子用户密码是否满足所述子用户密码的设定条件;
    注册模块,用于若所述子用户密码满足所述第二合规性,则完成所述子用户密码的注册;
    提示模块,用于若所述子用户密码不满足所述第二合规性,则输出第二提示信息,所述第二提示信息用于提示所述子用户密码不满足所述第二合规性。
  28. 如权利要求27所述的装置,其特征在于,
    所述检测模块,具体用于获取所述子用户密码的长度及所述第二主用户密码的长度;当所述子用户密码的长度小于所述第二主用户密码的长度时,根据所述子用户密码获取多个子用户补齐密码,所述子用户补齐密码的长度与所述第二主用户密码的长度相同,所述子用户补齐密码中的补齐子密码与所述子用户密码相同,所述补齐子密码为长度与所述子用户密码长度相等的所述子用户补齐密码的一个密码段;当任一所述子用户补齐密码的第七不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  29. 如权利要求28所述的装置,其特征在于,
    所述检测模块,具体用于当所述子用户密码的长度大于所述第二主用户密码的长度时,在所述子用户密码所包含的多个子用户子密码中,确定长度与所述第二主用户密码的长度 相同的第二子用户子密码,所述子用户子密码为所述子用户密码的一个密码段;当所述第二子用户子密码的第八不可逆参考值与所述第二不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  30. 如权利要求28所述的装置,其特征在于,
    所述检测模块,具体用于当所述子用户密码的长度等于所述第二主用户密码的长度,且所述第二不可逆参考值与所述子用户密码的第三不可逆参考值不相同时,确定所述子用户密码满足所述第二合规性。
  31. 一种终端,所述终端支持多用户,所述多用户包括主用户和子用户,所述终端包括至少一个处理器、存储器及存储在所述存储器上并可被所述至少一个处理器执行的指令,其特征在于,所述至少一个处理器执行所述指令,以实现权利要求1至15中任一项所述的密码检测方法的步骤。
  32. 一种计算机可读存储介质,其特征在于,所述计算机存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行如权利要求1至15中任一项所述的密码检测方法的步骤。
  33. 一种计算机程序产品,其特征在于,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机实现权利要求1至15中任一项所述的密码检测方法的步骤。
PCT/CN2017/094711 2016-11-30 2017-07-27 密码检测方法、装置及终端 WO2018099115A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201780005389.0A CN108476225B (zh) 2016-11-30 2017-07-27 密码检测方法、装置及终端

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201611083505.4 2016-11-30
CN201611083505 2016-11-30
CN201710194157.6 2017-03-28
CN201710194157 2017-03-28

Publications (1)

Publication Number Publication Date
WO2018099115A1 true WO2018099115A1 (zh) 2018-06-07

Family

ID=62242788

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/094711 WO2018099115A1 (zh) 2016-11-30 2017-07-27 密码检测方法、装置及终端

Country Status (2)

Country Link
CN (1) CN108476225B (zh)
WO (1) WO2018099115A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119342A (zh) * 2007-09-21 2008-02-06 腾讯科技(深圳)有限公司 一种登录即时通讯软件的方法和系统
CN104580118A (zh) * 2013-10-28 2015-04-29 深圳市腾讯计算机系统有限公司 一种密码修改方式的推荐方法及装置
CN104917740A (zh) * 2014-03-14 2015-09-16 中国移动通信集团广东有限公司 一种密码重置方法、密码验证方法及装置
CN105959309A (zh) * 2016-07-01 2016-09-21 乐视控股(北京)有限公司 一种用户权限管理方法及系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7552467B2 (en) * 2006-04-24 2009-06-23 Jeffrey Dean Lindsay Security systems for protecting an asset
US20080126808A1 (en) * 2006-07-05 2008-05-29 Cms Products, Inc. Encrypted dataset access by custodians
WO2013162296A1 (ko) * 2012-04-25 2013-10-31 주식회사 로웸 패스코드 운영 시스템과 패스코드 장치 및 슈퍼 패스코드 생성 방법
CN105245596B (zh) * 2015-09-30 2019-02-05 深圳市先河系统技术有限公司 一种远程控制方法和服务器

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119342A (zh) * 2007-09-21 2008-02-06 腾讯科技(深圳)有限公司 一种登录即时通讯软件的方法和系统
CN104580118A (zh) * 2013-10-28 2015-04-29 深圳市腾讯计算机系统有限公司 一种密码修改方式的推荐方法及装置
CN104917740A (zh) * 2014-03-14 2015-09-16 中国移动通信集团广东有限公司 一种密码重置方法、密码验证方法及装置
CN105959309A (zh) * 2016-07-01 2016-09-21 乐视控股(北京)有限公司 一种用户权限管理方法及系统

Also Published As

Publication number Publication date
CN108476225A (zh) 2018-08-31
CN108476225B (zh) 2020-03-20

Similar Documents

Publication Publication Date Title
ES2836114T3 (es) Método de envío de información, método de recepción de información, aparato y sistema
WO2018133686A1 (zh) 一种密码保护方法、装置及存储介质
CN112596802B (zh) 一种信息处理方法及装置
WO2021022701A1 (zh) 信息传输方法、装置、客户端、服务端及存储介质
US9807610B2 (en) Method and apparatus for seamless out-of-band authentication
WO2019218919A1 (zh) 区块链场景下的私钥管理方法、装置及系统
WO2015192670A1 (zh) 用户身份认证方法、终端和服务端
KR102456959B1 (ko) 보안 인증을 가능하게 하는 시스템 및 방법
CN108769027B (zh) 安全通信方法、装置、移动终端和存储介质
US10924289B2 (en) Public-private key pair account login and key manager
US20120303964A1 (en) Portable terminal, and method for securing data transmitted between hardware modules
KR20160097323A (ko) Nfc 인증 메커니즘
EP3319032A1 (en) Method for processing data, wearable electronic equipment and system
CN112425114A (zh) 受公钥-私钥对保护的密码管理器
CN105512576A (zh) 一种数据安全存储的方法及电子设备
EP4174689A1 (en) Blockchain-based user information processing method and system
JP2014006691A (ja) デバイス認証方法及びシステム
US20130073840A1 (en) Apparatus and method for generating and managing an encryption key
US11606196B1 (en) Authentication system for a multiuser device
US9270649B1 (en) Secure software authenticator data transfer between processing devices
CN106453335B (zh) 一种数据传输方法及装置
WO2018099115A1 (zh) 密码检测方法、装置及终端
CN114117388A (zh) 设备注册方法、设备注册装置、电子设备以及存储介质
KR20130041033A (ko) 휴대용 단말의 암호화 키 생성 및 관리 방법 및 그 장치
US11949772B2 (en) Optimized authentication system for a multiuser device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17875957

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17875957

Country of ref document: EP

Kind code of ref document: A1