WO2019179313A1 - 用于管理密码的方法、装置和计算机存储介质 - Google Patents

用于管理密码的方法、装置和计算机存储介质 Download PDF

Info

Publication number
WO2019179313A1
WO2019179313A1 PCT/CN2019/077169 CN2019077169W WO2019179313A1 WO 2019179313 A1 WO2019179313 A1 WO 2019179313A1 CN 2019077169 W CN2019077169 W CN 2019077169W WO 2019179313 A1 WO2019179313 A1 WO 2019179313A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
character
registration
transformation
mapping relationship
Prior art date
Application number
PCT/CN2019/077169
Other languages
English (en)
French (fr)
Inventor
才华
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Publication of WO2019179313A1 publication Critical patent/WO2019179313A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • the present invention relates to cryptography, and more particularly to a method for managing a password, an apparatus for implementing the method, and a computer readable storage medium comprising the computer program implementing the method.
  • KeePass and 1Password A number of password management software have been developed for the industry, such as KeePass and 1Password. These password management software works by storing the user's password in an encrypted file that can only be accessed by a master password, so the user only needs to remember one master password.
  • the disadvantage of these password management software is that in order to increase the encryption strength of the encrypted file, the length and complexity of the master password are very high, which causes inconvenience to the user. In addition, no matter what encryption algorithm is used, the encrypted file theoretically still has the risk of being compromised.
  • a method for managing a password in accordance with an aspect of the present invention includes the following steps:
  • transformation logic for registering a password, wherein the transformation logic defines a mapping relationship between a character of the registration password and a corresponding character after performing the transformation logic;
  • a transformation of the login password is provided to the remote server for verification of the identity of the user.
  • the transformation logic comprises:
  • the remote server If the number of digits of the registration password is less than the number of digits rule set by the remote server, perform a complement operation on the registration password so that the number of digits of the converted password conforms to the number of digits rule;
  • the remote server If the number of digits of the registration password is greater than the number of digits rule set by the remote server, perform a deletion operation on the registration password so that the number of digits of the converted password conforms to the number of digits rule;
  • the replacement operation is performed on the character that does not meet the value rule.
  • the method further comprises the following steps:
  • the transformation logic comprises:
  • a replacement operation is performed on the characters of one or more specified bits of the registered password.
  • the replacing operation comprises at least one of converting any character into a random number, converting any character into a random uppercase letter, converting any character into a random lowercase letter, and Any character is converted to a random symbol.
  • the mapping relationship between the character of the registration password and the corresponding character after performing the transformation logic is stored in the mapping relationship table in a random order.
  • the mapping relationship table further includes an additional mapping relationship between the confusing character and the corresponding transformed character, the additional mapping relationship being stored in the mapping relationship table in a random order and the mapping relationship, the confusing The character has no relevance to the registered password.
  • the registration password is classified into one of a plurality of cipher suites having different security levels and password rules.
  • An apparatus for managing a password according to another aspect of the present invention includes:
  • a first module configured to set a transformation logic for registering a password, wherein the transformation logic defines a mapping relationship between a character of the registration password and a corresponding character after performing the transformation logic;
  • a second module configured to provide a remote server with a transformed form of a registration password
  • a third module configured to receive a login password from the input device
  • a fourth module configured to perform a transform operation on the login password based on the transformation logic
  • the fifth module is configured to provide a remote server with a transformation form of the login password for verifying the identity of the user.
  • An apparatus for managing a password in accordance with another aspect of the present invention includes a memory, a processor, and a computer program stored on the memory and executable on the processor to perform the method as described above.
  • the present invention has many advantages over the prior art. For example, since the storage logic is stored instead of registering the password itself, there is no risk of password being illegally stolen. Moreover, in some transformation logic, the cipher characters are mapped to other characters in a random manner, so for different applications, the same cipher has different conversion ciphers after logical transformation, thereby facilitating the user to manage the password without It will have an impact on security. Further, when the mapping relationship of the respective cipher characters is stored in a random order, even if the mapping relationship is known, the conversion cipher cannot be copied. Finally, security can be further improved by mixing the additional mapping relationship between the confusing character and the corresponding transformed character in a random order and a mapping relationship.
  • FIG. 1 is a schematic diagram of the architecture of a distributed system.
  • FIG. 2 is a flow chart of a method for managing a password in accordance with one embodiment of the present invention.
  • FIG. 3 is a flow chart of a method for managing a password in accordance with another embodiment of the present invention.
  • FIG. 4 is a block diagram of an apparatus for managing a password in accordance with another embodiment of the present invention.
  • FIG. 5 is a block diagram of an apparatus for managing passwords in accordance with another embodiment of the present invention.
  • FIG. 1 is a schematic diagram of the architecture of a distributed system.
  • the distributed system 10 shown in FIG. 1 includes a client 110 and a remote server or website 120.
  • client 110 can implement a direct communication connection with remote server 120 or a communication connection via network 20.
  • the means for managing the password can obtain a corresponding conversion password (also referred to as a transformed form of the registration password) by performing transformation logic on the registration password, and the conversion password is stored.
  • a corresponding conversion password also referred to as a transformed form of the registration password
  • the transformation logic instead of registering the password itself or changing the password, which is used to manage the password when the user enters the login password via the client or the input device of the device for managing the password.
  • the device generates a transformed form of the login password by executing transformation logic that is sent to the remote server and is not permanently stored in the client or in the device for managing the password (eg, deleted after transmission) .
  • the transformation logic described herein should be broadly understood to be various algorithms for converting a registration cipher into other ciphers that define the mapping between the characters of the registration cipher and the corresponding characters after the transformation logic is executed.
  • the transformation logic may comprise the following transformation operations: performing a complement operation on the registration password to increase the number of bits of the transformed password; performing a delete operation on the registration password to reduce the number of bits of the transformed password; and registering The characters in the password perform a replacement.
  • the above replacement operation comprises at least one of converting any character to a random number, converting any character to a random uppercase letter, converting any character to a random lowercase letter, and converting any of the characters to Random symbol.
  • the device for managing a password described herein may be a physical device that is independent of a client and a remote server and capable of communicating with a client and a remote server, or may be integrated as a component unit within the client (eg, a client application) form).
  • the client described herein can be one of the following: a smartphone, a personal computer, a laptop, a tablet, and a personal digital assistant.
  • the mapping relationship between the character of the registration password and the character after the execution of the transformation logic is stored in the form of a mapping relationship table, wherein the mapping relationship of the characters of the registration password is stored in the mapping table in a random order.
  • the mapping relationship table further includes an additional mapping relationship between the confusing character and the corresponding transformed character, and the additional mapping relationship is stored in a mapping relationship between the characters in the random order and the registered password, and the confusion is described herein.
  • the character has no relevance to the registered password.
  • a plurality of cipher suites can be predefined based on security levels and password rules, and each registration password is categorized into one of the plurality of cipher suites.
  • FIG. 2 is a flow chart of a method for managing a password in accordance with one embodiment of the present invention.
  • the method of the present embodiment is described by taking the distributed system shown in FIG. 1 as an example, and it is assumed that the application scenario is a process in which the user performs registration of the service A to the remote server or the website 120 via the client 110. It should be noted, however, that the method of the present embodiment is not limited to a distributed system of a specific architecture.
  • the means for managing the password obtains the address of the website 120 and the password rules for the registered service A.
  • the password rules include, for example, but are not limited to, the number of bits of the password, the value of the password character, and the case of the letter.
  • the means for managing the password may further obtain information such as the current time and the user unique ID provided by the website 120.
  • the means for managing the password includes a scanning device to obtain the above information by scanning the two-dimensional code displayed on the website interface.
  • the device for managing the password classifies the registration password of the service A into one of the plurality of cipher groups according to the type of the service A (for example, financial payment, e-commerce shopping, general browsing, etc.). Specifically, if service A is a financial payment service that requires high security, it can be automatically classified into a high security cipher group. If service A is a general e-commerce shopping service that requires security, it can be automatically classified. To the medium security password group, if service A is a website browsing service with lower security requirements, it can be automatically classified into a low security password group.
  • the user may also select a corresponding password group for the registration password of the service A.
  • the means for managing the password receives the registration password for service A from its own input device or input device of client 110.
  • the registration password is "1Ab_p".
  • the device for managing the password determines whether the registration password is "1Ab_p" according to the password rule of the service A. If not, proceed to step 209, and if yes, proceed to step 211.
  • step 209 for example, assuming that the length specification requires a password length of 6 bits, the device for managing the password will perform a complement operation on the registration password "1Ab_p", ie, at a certain location of the registration password (eg, header, trailer) Or place a character in the middle (for example, by adding a fixed character (such as "O") at the end of the registration password to get the parking password registration password of the length specification is "1AB_pO"). Moreover, if the length specification requires a password length of 4 bits, the device for managing the password will perform a deletion operation on the registration password "1AB_p", that is, one of the characters of the registration password (for example, the header, the tail, or the middle) The character of the position). After the execution of step 209 is completed, the process proceeds to step 211.
  • step 211 the means for managing the password determines whether the registration password is "1AB_pO" according to the password rule of the service A. If not, proceed to step 213, and if yes, proceed to step 215.
  • Examples of the value specification described herein include, but are not limited to, the first character of the registration password must be a letter, and characters such as "_", "*", and " ⁇ " must not appear in the registration password, and at least the registration password must be present. Contains an uppercase letter and a lowercase letter, etc. and the same password cannot appear in the registered password.
  • the means for managing the password performs a replacement operation on the characters in the registration password processed by step 209 or not processed in step 209 that do not conform to the value specification.
  • the replacement operation comprises at least one of converting any character to a random number, converting any character to a random uppercase letter, converting any character to a random lowercase letter, and converting any character to a random symbol.
  • the corresponding conversion functions FS(x), FD(x), FX(x), FF(x) can be written in the above various types of replacement operations, wherein the function FS(x) is used to convert any character x into For random numbers, FD(x) converts any character x to a random uppercase letter, FX(x) converts any character to a random lowercase letter, and FF(x) converts any character to a random symbol.
  • the following replacement operation can be performed: the first character “1” needs to be replaced with a letter because it is a non-alphabetic character, so the function FX can be utilized ( x) The conversion is performed; the fourth character “_” needs to be replaced because it belongs to a non-value range, so the conversion can be performed using the function FS(x). It may be assumed that the registration password after the replacement operation is "sAB9pO".
  • the registration password "1AB_p" input by the user is converted into “sAB9pO” after the processing based on the transformation logic, wherein the character of the registration password has the following mapping relationship with the corresponding character after executing the transformation logic: "1" - "s", “A” - “A”, “B” - “B”, “_” - “9” and "p” - "p". Since "O” is a character added by the complement operation, there is no corresponding character in the registered password input by the user.
  • step 215 the means for managing the password performs a replacement operation on some or all of the characters in the registration password processed by step 209 or not processed in step 209.
  • the following replacement operation can be performed in step 215: for the character "1”, the function FS(x) can be used for conversion; for the character “A”, “B” and “O” can be converted using the function FD(x), and can be converted by the FF(x) for the character “_”, and converted by the function FX(x) for the character "p". It may be assumed that the registration password after the replacement operation is "7ZK ⁇ qO".
  • the registration password "1AB_p" input by the user is converted into “7ZK ⁇ qO” after the processing based on the transformation logic, wherein the character of the registration password has the following mapping relationship with the corresponding character after performing the transformation logic: “1 "-” "7", “A” - “Z”, “B” - “K”, “_” - “ ⁇ ” and “p” - “q”.
  • "O" is a character added by the complement operation, there is no corresponding character in the registered password input by the user.
  • step 217 the device for managing the password proceeds to step 217 to determine whether it is necessary to increase the security of the registered password by adding the confusion bit. If it is not necessary to improve the security, proceed to step 219, otherwise, proceed to step 221.
  • the above determination may be based on the type of the registered service A or based on the user's selection.
  • the means for managing the password stores the transformation logic that converts the registration password from "1AB_p" to "sAB9pO" or the registration password "1AB_p” to "7ZK ⁇ qO".
  • the transformation logic can also be viewed as a collection of chronological transformation operations steps.
  • the mapping relationship between the characters of the registration password and the corresponding characters after performing the transformation logic is stored in the mapping relationship table in a random order.
  • mapping relationship between "1AB_p" and “7ZK ⁇ qO” may be stored in the order of the following character input order different from the registration password: "A” - "Z”, “B” - “K”, “ p” - “q”, “_” - “ ⁇ ” and "1” - "7".
  • the means for managing the password stores the transformation logic in which the registration password is converted from “1AB_p" to "sAB9pO" or the registration password "1AB_p" is converted to "7ZK ⁇ qO".
  • the mapping relationship between the character storing the registration password and the corresponding character after executing the transformation logic an additional mapping relationship between the confusing character and the corresponding transformed character is also stored.
  • the additional mapping relationship is stored in the mapping relationship table in a random order and a mapping relationship.
  • mapping relationship is as follows: “G” - "T”, “+” - "!, then mapping relationship and additional mapping for "1AB_p" and "7ZK ⁇ qO"
  • the storage of the relationship may be, for example, “A” - “Z”, “G” - “T”, “B” - “K”, “+” - "!, “p” - "q”, “_” - “ ⁇ ” and "1” - "7".
  • step 223 the device for managing the password passes the logically transformed registration password (for example, the conversion password "sAB9pO" or "7ZK ⁇ qO" generated in step 213 or 215) together with the user registration.
  • the username is sent to the remote server 120 and the login password and its variants within the device for managing the password are subsequently deleted.
  • information such as current time and user unique ID may also be included in the message sent to the website 120.
  • step 215 is an optional step. After determining in step 211 that the registration password conforms to the value specification, the method flow may proceed directly to step 223 to send a registration password to the website 120.
  • steps 217 and 221 are also optional steps, and at this time, step 219 can be directly performed after performing step 213 or 215.
  • FIG. 3 is a flow chart of a method for managing a password in accordance with another embodiment of the present invention.
  • the method of the present embodiment is described herein by taking the distributed system shown in FIG. 1 as an example, and the application scenario is a process in which the user accesses the remote server or the service A on the website 120 via the client 110. It should be noted, however, that the method of the present embodiment is not limited to a distributed system of a specific architecture.
  • the means for managing the password obtains the address of the website 120.
  • the means for managing the password includes the scanning device to obtain the above information by scanning the two-dimensional code displayed on the website interface.
  • the means for managing the password determines the cipher group to which the service A belongs according to the website address and/or the type of the service A, thereby determining the storage location of the transformation logic regarding the registration password of the service A.
  • the means for managing the password receives the login password for service A from its own input device or input device of client 110.
  • the login password is "1Ab_p".
  • the means for managing the password converts the login password "1Ab_p" according to the conversion logic of the registration password of the service A.
  • the transformation operation may include the following steps:
  • the login password "1Ab_p” is converted to “1Ab_pO”; then, based on the mapping relationship stored in the mapping relationship table, the characters “1", “A”, “b”, “_” in “1Ab_pO” are used. And “p” are mapped to “s”, “A”, “B”, “9”, and “p”, thereby obtaining a conversion form "sAB9pO" of the login password.
  • the means for managing the password transmits a transformed form of the login password (e.g., the transformed password "sAB9pO" generated in step 307) along with the username to the remote server 120 for verification by the remote server of the identity of the user.
  • a transformed form of the login password e.g., the transformed password "sAB9pO" generated in step 307
  • information such as current time and user unique ID may also be included in the message sent to the website 120.
  • FIG. 4 is a block diagram of an apparatus for managing a password in accordance with another embodiment of the present invention.
  • the apparatus 40 for managing a password of this embodiment includes a first module 410, a second module 420, a third module 430, a fourth module 440, and a fifth module 450.
  • the first module 410 is configured to set a transformation logic for registering a password, wherein the transformation logic defines a mapping relationship between a character of the registration password and a corresponding character after performing the transformation logic; and the second module is configured to provide the registration password to the remote server.
  • a transformation form a third module 430 for receiving a login password from the input device; a fourth module 440 for performing a transformation operation on the login password based on the transformation logic; and a fourth module 450 for providing a login password to the remote server Transform form for verifying user identity.
  • FIG. 5 is a block diagram of an apparatus for managing passwords in accordance with another embodiment of the present invention.
  • the apparatus 50 shown in FIG. 5 includes a memory 510, a processor 520, and a computer program 530 stored on the memory 510 and executable on the processor 520, wherein the computer program 530 is executable by operating on the processor 520, as described above
  • the apparatus 50 shown in FIG. 5 may be a physically separate physical device or integrated within a client (eg, in the form of a client application).
  • client eg, in the form of a client application
  • device 50 can further include an operational keyboard, a display screen, a scanning device, and an I/O communication component for communicating with client 110 and a remote server.
  • memory 510, processor 520 are security chips to provide a trusted execution environment to computer program 530.
  • a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the method of the embodiment described with reference to Figures 1-3.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及密码技术,特别涉及用于管理密码的方法、实施该方法的装置以及包含实施该方法的计算机程序的计算机可读存储介质。按照本发明一个方面的用于管理密码的方法包含下列步骤:设置和存储对注册密码的变换逻辑,其中,所述变换逻辑定义注册密码的字符与执行变换逻辑后的相应字符之间的映射关系;向远程服务器提供注册密码的变换形式;从输入设备接收登录密码;基于所述变换逻辑,对登录密码执行变换操作;以及向远程服务器提供登录密码的变换形式以用于对用户身份进行验证。

Description

用于管理密码的方法、装置和计算机存储介质 技术领域
本发明涉及密码技术,特别涉及用于管理密码的方法、实施该方法的装置以及包含实施该方法的计算机程序的计算机可读存储介质。
背景技术
信息化时代下,人们每天工作和生活的场景需要频繁输入密码进行身份验证以完成系统登录、操作授权和确认支付等任务。在面对多个应用时,要求记忆各种密码将对用户造成极大的负担。此外,出于安全性等方面的考虑,不同的应用往往具有各自特定的密码规则(例如密码的位数、密码字符的取值和字母的大小写区分等),这种密码规则的多样性进一步加重了用户的负担。
为此业界开发了多款密码管理软件,例如KeePass和1Password。这些密码管理软件的工作原理是将用户的密码存储在一个加密文件中,该加密文件只能通过一个主密码访问,因此用户仅需要记忆一个主密码即可。这些密码管理软件的不足之处在于,为了提高加密文件的加密强度,对主密码的长度和复杂性的要求都很高,这造成用户使用的不便。此外,无论采用何种加密算法,加密文件理论上还是存在被攻破的风险隐患。
因此迫切需要一种管理密码的方法和装置能够同时在安全性和便捷性两方面都提供令人满意的性能。
发明内容
本发明的一个目的是提供一种用于管理密码的方法和装置,其具有安全性高和使用便捷等优点。
按照本发明一个方面的用于管理密码的方法包含下列步骤:
设置和存储对注册密码的变换逻辑,其中,所述变换逻辑定义注册密码的字符与执行变换逻辑后的相应字符之间的映射关系;
向远程服务器提供注册密码的变换形式;
从输入设备接收登录密码;
基于所述变换逻辑,对登录密码执行变换操作;以及
向远程服务器提供登录密码的变换形式以用于对用户身份进行验证。
优选地,在上述方法中,所述变换逻辑包括:
如果注册密码的位数小于远程服务器设定的位数规则,则对注册密码执行补位操作以使变换后的密码的位数符合位数规则;
如果注册密码的位数大于远程服务器设定的位数规则,则对注册密码执行删位操作以使变换后的密码的位数符合位数规则;以及
如果注册密码存在不符合远程服务器设定的取值规则的字符,则对不符合取值规则的字符执行替换操作。
优选地,在上述方法中,进一步包括下列步骤:
删除登录密码及其变换形式。
优选地,在上述方法中,所述变换逻辑包括:
对于注册密码的一个或多个指定位的字符执行替换操作。
优选地,在上述方法中,所述替换操作包括下列中的至少一种:将任一字符转换为随机数字、将任一字符转换为随机大写字母、将任一字符转换为随机小写字母以及将任一字符转换为随机符号。
优选地,在上述方法中,注册密码的字符与执行变换逻辑后的相应字符之间的映射关系以随机顺序存储在映射关系表中。更好地,所述映射关系表还包含混淆字符与相应的变换字符之间的附加映射关系,该附加映射关系以随机顺序与所述映射关系混合存储在所述映射关系表中,所述混淆字符与注册密码无相关性。
优选地,在上述方法中,注册密码被归类为多个密码组中的一个,所述多个密码组具有各不相同的安全等级和密码规则。
在按照本发明另一个方面的用于管理密码的装置包含:
第一模块,用于设置对注册密码的变换逻辑,其中,所述变换逻 辑定义注册密码的字符与执行变换逻辑后的相应字符之间的映射关系;
第二模块,用于向远程服务器提供注册密码的变换形式;
第三模块,用于从输入设备接收登录密码;
第四模块,用于基于所述变换逻辑,对登录密码执行变换操作;以及
第五模块,用于向远程服务器提供登录密码的变换形式以用于对用户身份进行验证。
在按照本发明另一个方面的用于管理密码的装置包含存储器、处理器以及存储在所述存储器上并可在所述处理器上运行的计算机程序以执行如上所述的方法。
本发明的还有一个目的是提供一种计算机可读存储介质,其上存储计算机程序,该程序被处理器执行时实现如上所述的方法。
与现有技术相比,本发明具有诸多优点。例如,由于存储的是变换逻辑而非注册密码本身,因此无密码被非法窃取之风险。再者,在一些变换逻辑中,密码字符以随机方式被映射为另外的字符,因此对于不同的应用,相同的密码经逻辑变换后具有不同的变换密码,从而在方便用户管理密码的同时又不会对安全性造成影响。此外,当各个密码字符的映射关系以随机顺序存储时,即使知晓映射关系,仍然无法复制出变换密码。最后,通过将混淆字符与相应的变换字符之间的附加映射关系以随机顺序与映射关系混合存储时,可以进一步提高安全性。
附图说明
本发明的上述和/或其它方面和优点将通过以下结合附图的各个方面的描述变得更加清晰和更容易理解,附图中相同或相似的单元采用相同的标号表示。附图包括:
图1为一种分布式系统的架构示意图。
图2为按照本发明一个实施例的用于管理密码的方法的流程图。
图3为按照本发明另一个实施例的用于管理密码的方法的流程图。
图4为按照本发明另一个实施例的用于管理密码的装置的框图。
图5为按照本发明另一个实施例的用于管理密码的装置的框图。
具体实施方式
下面参照其中图示了本发明示意性实施例的附图更为全面地说明本发明。但本发明可以按不同形式来实现,而不应解读为仅限于本文给出的各实施例。给出的上述各实施例旨在使本文的披露全面完整,以将本发明的保护范围更为全面地传达给本领域技术人员。
在本说明书中,诸如“包含”和“包括”之类的用语表示除了具有在说明书和权利要求书中有直接和明确表述的单元和步骤以外,本发明的技术方案也不排除具有未被直接或明确表述的其它单元和步骤的情形。
图1为一种分布式系统的架构示意图。示例性地,图1所示的分布式系统10包括客户端110和远程服务器或网站120。在所示的分布式系统中,客户端110可以与远程服务器120实现直接的通信连接,或者经网络20实现通信连接。
按照本发明的一个方面,对于用户的一个注册密码,用于管理密码的装置通过对该注册密码执行变换逻辑可以得到对应的变换密码(也称为注册密码的变换形式),该变换密码被存储在远程服务器处以用于用户的身份验证。特别是,在用于管理密码的装置中存储的是变换逻辑而非注册密码本身或者变换密码,当用户经客户端或用于管理密码的装置的输入设备输入登录密码时,用于管理密码的装置通过执行变换逻辑而生成登录密码的变换形式,该变换形式的登录密码被发送至远程服务器并且不会被永久性地保存在客户端或用于管理密码的装置内(例如发送后即删除)。
这里所述的变换逻辑应广义理解为将注册密码转换为其它密码 的各种算法,其可定义注册密码的字符与执行变换逻辑后的相应字符之间的映射关系。优选地,变换逻辑可以包括下列变换操作:对注册密码执行补位操作以使变换后的密码的位数增加;对注册密码执行删位操作以使变换后的密码的位数减少;以及对注册密码中的字符执行替换操作。
更好地,上述替换操作包括下列中的至少一种:将任一字符转换为随机数字、将任一字符转换为随机大写字母、将任一字符转换为随机小写字母以及将任一字符转换为随机符号。
这里所述的用于管理密码的装置可以是独立于客户端和远程服务器并且能够与客户端和远程服务器通信的物理设备,也可以作为组成单元被集成在客户端内(例如客户端应用程序的形式)。这里所述的客户端可以为下列设备中的一种:智能手机、个人电脑、笔记本电脑、平板电脑和个人数字助理。
按照本发明的另一个方面,注册密码的字符与执行变换逻辑之后的字符之间的映射关系以映射关系表的形式存储,其中,注册密码的各个字符的映射关系以随机顺序存储在映射关系表中。优选地,映射关系表还包含混淆字符与相应的变换字符之间的附加映射关系,该附加映射关系以随机顺序与注册密码的字符的映射关系混合存储在映射关系表中,这里所述的混淆字符与注册密码无相关性。
按照本发明的还有一个方面,可以基于安全等级和密码规则预定义多个密码组,并且将每个注册密码归类到这多个密码组中的一个。
图2为按照本发明一个实施例的用于管理密码的方法的流程图。示例性地,这里以图1所示的分布式系统为例来描述本实施例的方法,并且假设应用场景为用户经客户端110向远程服务器或网站120进行业务A的注册的过程。但是需要指出的是,本实施例的方法不局限于特定架构的分布式系统。
参见图2,在步骤201,用于管理密码的装置获取网站120的地址和关于所注册业务A的密码规则。在本实施例中,密码规则例如包 括但不限于密码的位数、密码字符的取值和字母的大小写区分等。此外,用于管理密码的装置还可进一步获取网站120提供的当前时间和用户唯一ID等信息。优选地,用于管理密码的装置包含扫描设备以通过扫描网站界面上所显示的二维码获取上述信息。
接着进入步骤203,用于管理密码的装置根据业务A的类型(例如金融支付、电商购物和普通浏览等)将业务A的注册密码归类到多个密码组中的其中一个。具体而言,如果业务A为对安全性要求较高的金融支付业务,则可以自动归类到高安全密码组,如果业务A为对安全性要求一般的电商购物业务,则可以自动归类到中安全密码组,如果业务A为对安全性要求较低的网站浏览业务,则可以自动归类到低安全密码组。可选地,在本步骤中,也可以由用户为业务A的注册密码自行选择相应的密码组。
随后进入步骤205,用于管理密码的装置从其自带的输入设备或者客户端110的输入设备接收关于业务A的注册密码。示例性地,假设注册密码为“1Ab_p”。
接着进入步骤207,用于管理密码的装置根据业务A的密码规则确定注册密码为“1Ab_p”是否符合长度规范。如果不符合,则进入步骤209,如果符合,则进入步骤211。
在分支步骤209,例如假设长度规范要求的密码长度为6位,则用于管理密码的装置将对注册密码“1Ab_p”进行补位操作,即,在注册密码的某个位置(例如首部、尾部或中间的某个位置)放置字符(例如通过在注册密码的尾部添加固定的字符(例如“O”)而得到符合长度规范的驻车密码注册密码为“1AB_pO”)。又,如果长度规范要求的密码长度为4位,则用于管理密码的装置将对注册密码“1AB_p”进行删位操作,即,在注册密码的其中一个字符(例如首部、尾部或中间的某个位置的字符)。步骤209执行完成之后进入步骤211。
在步骤211,用于管理密码的装置根据业务A的密码规则确定注 册密码为“1AB_pO”是否符合取值规范。如果不符合,则进入步骤213,如果符合,则进入步骤215。这里所述的取值规范的例子包括但不限于:注册密码的首个字符必需为字母、注册密码中不得出现“_”、“*”和“·”之类的字符、注册密码中必需至少包含一个大写字母和一个小写字母等和注册密码中不得出现连续相同的字符串等。
在分支步骤213中,用于管理密码的装置对经过步骤209处理或者未经步骤209处理的注册密码中的不符合取值规范的字符进行替换操作。
优选地,替换操作包括下列中的至少一种:将任一字符转换为随机数字、将任一字符转换为随机大写字母、将任一字符转换为随机小写字母以及将任一字符转换为随机符号。为此可以上述各种类型的替换操作编写相应的转换函数FS(x)、FD(x)、FX(x)、FF(x),其中,函数FS(x)用于将任何字符x转换为随机数字,FD(x)将任何字符x转换为随机大写字母,FX(x)将任何字符转换为随机小写字母,FF(x)将任何字符转换成随机符号。
以注册密码“1AB_pO”为例并且假设采用上述取值规范的例子,则可以施行如下的替换操作:首个字符“1”由于为非字母字符而需要被替换为字母,因此可利用函数FX(x)进行转换;第四个字符“_”因为属于非取值范围而需要被替换,因此可利用函数FS(x)进行转换。不妨假设替换操作后的注册密码为“sAB9pO”。由此,用户输入的注册密码“1AB_p”经过基于变换逻辑的处理之后变换为“sAB9pO”,其中,注册密码的字符与执行变换逻辑后的相应字符之间具有如下的映射关系:“1”—“s”,“A”—“A”,“B”—“B”,“_”—“9”和“p”—“p”。由于“O”为补位操作添加的字符,因此在用户输入的注册密码中无对应字符。
在另一分支步骤215中,用于管理密码的装置对经过步骤209处理或者未经步骤209处理的注册密码中的部分或全部字符进行替换操作。
仍然以注册密码“1AB_pO”为例但是假设其符合取值规范,则在步骤215中可以施行如下的替换操作:对于字符“1”可利用函数FS(x)进行转换;对于字符“A”、“B”和“O”可利用函数FD(x)进行转换,对于字符“_”可利用FF(x)进行转换,对于字符“p”,可利用函数FX(x)进行转换。不妨假设替换操作后的注册密码为“7ZK^qO”。由此,用户输入的注册密码“1AB_p”经过基于变换逻辑的处理之后变换为“7ZK^qO”,其中,注册密码的字符与执行变换逻辑后的相应字符之间具有如下的映射关系:“1”—“7”,“A”—“Z”,“B”—“K”,“_”—“^”和“p”—“q”。同样地,由于“O”为补位操作添加的字符,因此在用户输入的注册密码中无对应字符。
在执行步骤213和215之后均进入步骤217,用于管理密码的装置进入步骤217,判断是否需要通过增加混淆位来提高注册密码的安全性。如果不需要提高安全性,则进入步骤219,否则,则进入步骤221。在步骤217中,上述判断可以基于注册业务A的类型,也可以基于用户的选择。
在分支步骤219中,用于管理密码的装置存储注册密码由“1AB_p”变换为“sAB9pO”的变换逻辑或注册密码“1AB_p”变换为“7ZK^qO”的变换逻辑。在本实施例中,变换逻辑也可以视为是一系列具有时间先后顺序的变换操作步骤的集合。优选地,注册密码的字符与执行变换逻辑后的相应字符之间的映射关系以随机顺序存储在映射关系表中。
示例性地,可以依照下列不同于注册密码的字符输入顺序的顺序存储“1AB_p”与“7ZK^qO”之间的映射关系:“A”—“Z”,“B”—“K”,“p”—“q”,“_”—“^”和“1”—“7”。
在另一分支步骤221中,用于管理密码的装置存储注册密码由“1AB_p”变换为“sAB9pO”的变换逻辑或注册密码“1AB_p”变换为“7ZK^qO”的变换逻辑。特别是,除了存储注册密码的字符与 执行变换逻辑后的相应字符之间的映射关系以外,还存储混淆字符与相应的变换字符之间的附加映射关系。优选地,该附加映射关系以随机顺序与映射关系混合存储在映射关系表中。示例性地,假设增加2个混淆位,其附加映射关系如下:“G”—“T”,“+”—“!”,则对于“1AB_p”与“7ZK^qO”,映射关系和附加映射关系的存储例如可以是:“A”—“Z”,“G”—“T”,“B”—“K”,“+”—“!”,“p”—“q”,“_”—“^”和“1”—“7”。
在执行步骤219和221之后均进入步骤223,用于管理密码的装置将经过逻辑变换后的注册密码(例如步骤213或215中生成的变换密码“sAB9pO”或“7ZK^qO”)连同用户注册的用户名发送给远程服务器120并随后删除用于管理密码的装置内的登录密码及其变换形式。可选地,在发送给网站120的消息中还可包含当前时间和用户唯一ID等信息。
需要指出的是,在本实施例中,步骤215是可选的步骤。当在步骤211中确定注册密码符合取值规范后,所示方法流程可直接转至步骤223,向网站120发送注册密码。此外,步骤217和221也是可选的步骤,此时,在执行步骤213或215之后可直接进入步骤219。
图3为按照本发明另一个实施例的用于管理密码的方法的流程图。示例性地,这里以图1所示的分布式系统为例来描述本实施例的方法,并且假设应用场景为用户经客户端110访问远程服务器或网站120上的业务A的过程。但是需要指出的是,本实施例的方法不局限于特定架构的分布式系统。
参见图3,在步骤301,用于管理密码的装置获取网站120的地址。在本实施例中,优选地,用于管理密码的装置包含扫描设备以通过扫描网站界面上所显示的二维码获取上述信息。
接着进入步骤303,用于管理密码的装置根据网站地址和/或业务A的类型确定业务A所属的密码组,从而确定关于业务A的注册密码的变换逻辑的存储位置。
随后进入步骤305,用于管理密码的装置从其自带的输入设备或者客户端110的输入设备接收关于业务A的登录密码。示例性地,这里仍然假设登录密码为“1Ab_p”。
接着进入步骤307,用于管理密码的装置根据业务A的注册密码的变换逻辑对登录密码“1Ab_p”进行变换。具体而言,假设注册密码“1Ab_p”经历了步骤209和213的变换处理,则变换操作可包括下列步骤:
首先基于长度规范,将登录密码“1Ab_p”变换为“1Ab_pO”;随后基于映射关系表中存储的映射关系,将“1Ab_pO”中的字符“1”、“A”、“b”、“_”和“p”映射为“s”、“A”、“B”、“9”和“p”,由此得到登录密码的变换形式“sAB9pO”。
随后进入步骤309,用于管理密码的装置将登录密码的变换形式(例如步骤307中生成的变换密码“sAB9pO”)连同用户名发送给远程服务器120以供远程服务器对用户身份进行验证。可选地,在发送给网站120的消息中还可包含当前时间和用户唯一ID等信息。
图4为按照本发明另一个实施例的用于管理密码的装置的框图。
如图4所示,本实施例的用于管理密码的装置40包括第一模块410、第二模块420、第三模块430、第四模块440和第五模块450。第一模块410用于设置对注册密码的变换逻辑,其中,所述变换逻辑定义注册密码的字符与执行变换逻辑后的相应字符之间的映射关系;第二模块用于向远程服务器提供注册密码的变换形式;第三模块430用于从输入设备接收登录密码;第四模块440用于基于所述变换逻辑,对登录密码执行变换操作;以及第四模块450用于向远程服务器提供登录密码的变换形式以用于对用户身份进行验证。
图5为按照本发明另一个实施例的用于管理密码的装置的框图。
图5所示的装置50包含存储器510、处理器520以及存储在存储器510上并可在处理器520上运行的计算机程序530,其中,计算机程序530通过在处理器520上运行以可执行如上借助图1-3所述实施 例的方法。
在本实施例中,图5所示的装置50可以是在物理上独立于的物理设备或者被集成在客户端内(例如客户端应用程序的形式)。当作为独立实体设备存在时,装置50可进一步包含操作键盘、显示屏幕、扫描设备和用于与客户端110和远程服务器通信的I/O通信组件。优选地,存储器510、处理器520为安全芯片以向计算机程序530提供可信的执行环境。
按照本发明的一个方面,提供一种计算机可读存储介质,其上存储计算机程序,该程序被处理器执行时实现借助图1-3所述实施例的方法。
提供本文中提出的实施例和示例,以便最好地说明按照本技术及其特定应用的实施例,并且由此使本领域的技术人员能够实施和使用本发明。但是,本领域的技术人员将会知道,仅为了便于说明和举例而提供以上描述和示例。所提出的描述不是意在涵盖本发明的各个方面或者将本发明局限于所公开的精确形式。
鉴于以上所述,本公开的范围通过以下权利要求书来确定。

Claims (14)

  1. 一种用于管理密码的方法,其特征在于,所述方法包含下列步骤:
    设置和存储对注册密码的变换逻辑,其中,所述变换逻辑定义注册密码的字符与执行变换逻辑后的相应字符之间的映射关系;
    向远程服务器提供注册密码的变换形式;
    从输入设备接收登录密码;
    基于所述变换逻辑,对登录密码执行变换操作;以及
    向远程服务器提供登录密码的变换形式以用于对用户身份进行验证。
  2. 如权利要求1所述的方法,其中,进一步包括下列步骤:
    删除登录密码及其变换形式。
  3. 如权利要求1所述的方法,其中,所述变换逻辑包括:
    如果注册密码的位数小于远程服务器设定的位数规则,则对注册密码执行补位操作以使变换后的密码的位数符合位数规则;
    如果注册密码的位数大于远程服务器设定的位数规则,则对注册密码执行删位操作以使变换后的密码的位数符合位数规则;以及
    如果注册密码存在不符合远程服务器设定的取值规则的字符,则对不符合取值规则的字符执行替换操作。
  4. 如权利要求1所述的方法,其中,所述变换逻辑包括:
    对于注册密码的一个或多个指定位的字符执行替换操作。
  5. 如权利要求3或4所述的方法,其中,所述替换操作包括下列中的至少一种:将任一字符转换为随机数字、将任一字符转换为随机大写字母、将任一字符转换为随机小写字母以及将任一字符转换为随机符号。
  6. 如权利要求1所述的方法,其中,注册密码的字符与执行变换逻辑后的相应字符之间的映射关系以随机顺序存储在映射关系表中。
  7. 如权利要求6所述的方法,其中,所述映射关系表还包含混淆字符与相应的变换字符之间的附加映射关系,该附加映射关系以随机顺序与所述映射关系混合存储在所述映射关系表中,所述混淆字符与注册密码无相关性。
  8. 如权利要求1所述的方法,其中,注册密码被归类为多个密码组中的一个,所述多个密码组具有各不相同的安全等级和密码规则。
  9. 一种用于管理密码的装置,其特征在于,包含:
    第一模块,用于设置对注册密码的变换逻辑,其中,所述变换逻辑定义注册密码的字符与执行变换逻辑后的相应字符之间的映射关系;
    第二模块,用于向远程服务器提供注册密码的变换形式;
    第三模块,用于从输入设备接收登录密码;
    第四模块,用于基于所述变换逻辑,对登录密码执行变换操作;以及
    第五模块,用于向远程服务器提供登录密码的变换形式以用于对用户身份进行验证。
  10. 如权利要求9所述的装置,其中,所述装置被集成在所述客户端内。
  11. 一种用于管理密码的装置,所述装置包含存储器、处理器以及存储在所述存储器上并可在所述处理器上运行的计算机程序,其特征在于,执行如权利要求1-8中任意一项所述的方法。
  12. 如权利要求11所述的装置,其中,所述装置被集成在客户端内,所述客户端为下列设备中的一种:智能手机、个人电脑、笔记本电脑、平板电脑和个人数字助理。
  13. 如权利要求12所述的装置,其中,所述计算机程序在可信环境下执行。
  14. 一种计算机可读存储介质,其上存储计算机程序,其特征在于,该程序被处理器执行时实现如权利要求1-8中任一项所述的方法。
PCT/CN2019/077169 2018-03-22 2019-03-06 用于管理密码的方法、装置和计算机存储介质 WO2019179313A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810239743.2A CN108696499A (zh) 2018-03-22 2018-03-22 用于管理密码的方法、装置和计算机存储介质
CN201810239743.2 2018-03-22

Publications (1)

Publication Number Publication Date
WO2019179313A1 true WO2019179313A1 (zh) 2019-09-26

Family

ID=63844257

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/077169 WO2019179313A1 (zh) 2018-03-22 2019-03-06 用于管理密码的方法、装置和计算机存储介质

Country Status (3)

Country Link
CN (1) CN108696499A (zh)
TW (1) TWI701930B (zh)
WO (1) WO2019179313A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109784072B (zh) * 2018-12-28 2021-04-30 北京思源理想控股集团有限公司 一种安全文件管理方法和系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633650A (zh) * 2002-02-13 2005-06-29 小川秀治 用户认证方法及用户认证系统
CN103580873A (zh) * 2013-11-15 2014-02-12 清华大学 身份认证方法、系统以及密码保护装置
CN103580874A (zh) * 2013-11-15 2014-02-12 清华大学 身份认证方法、系统以及密码保护装置
CN105100035A (zh) * 2014-05-23 2015-11-25 国网山西省电力公司电力科学研究院 一种密码设置方法及系统
CN106559412A (zh) * 2016-10-11 2017-04-05 北京元心科技有限公司 增强身份认证安全的方法和系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7900252B2 (en) * 2006-08-28 2011-03-01 Lenovo (Singapore) Pte. Ltd. Method and apparatus for managing shared passwords on a multi-user computer
US8230455B2 (en) * 2007-07-11 2012-07-24 International Business Machines Corporation Method and system for enforcing password policy for an external bind operation in a distributed directory
US8935805B2 (en) * 2007-07-11 2015-01-13 International Business Machines Corporation Method and system for enforcing password policy in a distributed directory
US9813245B2 (en) * 2014-08-29 2017-11-07 Visa International Service Association Methods for secure cryptogram generation
CN104348609B (zh) * 2014-09-18 2017-06-06 成都西山居互动娱乐科技有限公司 一种非存储的密码管理算法
CN105357210B (zh) * 2015-11-23 2018-04-13 贾如银 动态密码的生成方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633650A (zh) * 2002-02-13 2005-06-29 小川秀治 用户认证方法及用户认证系统
CN103580873A (zh) * 2013-11-15 2014-02-12 清华大学 身份认证方法、系统以及密码保护装置
CN103580874A (zh) * 2013-11-15 2014-02-12 清华大学 身份认证方法、系统以及密码保护装置
CN105100035A (zh) * 2014-05-23 2015-11-25 国网山西省电力公司电力科学研究院 一种密码设置方法及系统
CN106559412A (zh) * 2016-10-11 2017-04-05 北京元心科技有限公司 增强身份认证安全的方法和系统

Also Published As

Publication number Publication date
CN108696499A (zh) 2018-10-23
TW201941561A (zh) 2019-10-16
TWI701930B (zh) 2020-08-11

Similar Documents

Publication Publication Date Title
CN109150499B (zh) 动态加密数据的方法、装置、计算机设备和存储介质
JP3222165U (ja) 相互認証構成によるユーザ認証に対する汎用分散型ソリューションを実現するシステム
RU2676231C2 (ru) Функция выработки ключа на основе изображения
EP3701668B1 (en) Methods for recording and sharing a digital identity of a user using distributed ledgers
JP3499680B2 (ja) スマート・カードからのプライベート鍵操作をホスト・ベースの暗号サービスと透過的に統合するシステム及び方法
US8918633B2 (en) Information processing device, information processing system, and program
US10083311B2 (en) Cryptographic key
CN107612683B (zh) 一种加解密方法、装置、系统、设备和存储介质
CN110166423B (zh) 用户信用的确定方法、装置、系统和数据的处理方法
US20180337904A1 (en) System, methods and software application for sending secured messages on decentralized networks
JP5968156B2 (ja) ジョブ処理システム、情報処理システム、ジョブ処理方法、情報処理方法、およびプログラム
US20140359746A1 (en) Authentication system, authentication server, authentication method, and authentication program
US20150143107A1 (en) Data security tools for shared data
US11128457B2 (en) Cryptographic key generation using external entropy generation
JP2012074079A (ja) 情報処理装置、情報処理システム及びプログラム
US10909264B2 (en) Personal data providing system, personal data providing method, and information processing apparatus
CN112733180A (zh) 数据查询方法、装置和电子设备
CN114268447B (zh) 一种文件传输方法、装置、电子设备和计算机可读介质
WO2019179313A1 (zh) 用于管理密码的方法、装置和计算机存储介质
KR20130134932A (ko) 암호화 파일의 생성 방법 및 해독 방법과 이 방법을 실행시키기 위한 프로그램을 기록한 컴퓨터로 판독 가능한 기록 매체
KR101809976B1 (ko) 다중 사용자의 인증요소를 조합하여 보안키를 생성하는 보안인증방법
JPWO2011058629A1 (ja) 情報管理システム
CN116472694A (zh) 生成、保护和维护表情符号序列数字令牌的系统及方法
JP2013150309A (ja) 情報処理装置および情報処理方法およびプログラム
CN117034370B (zh) 基于区块链网络的数据处理方法及相关设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19772480

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19772480

Country of ref document: EP

Kind code of ref document: A1