WO2020095120A1 - Password generation method which simultaneously satisfies security and usability - Google Patents

Password generation method which simultaneously satisfies security and usability Download PDF

Info

Publication number
WO2020095120A1
WO2020095120A1 PCT/IB2019/052719 IB2019052719W WO2020095120A1 WO 2020095120 A1 WO2020095120 A1 WO 2020095120A1 IB 2019052719 W IB2019052719 W IB 2019052719W WO 2020095120 A1 WO2020095120 A1 WO 2020095120A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
substitution
string
character
software
Prior art date
Application number
PCT/IB2019/052719
Other languages
French (fr)
Chinese (zh)
Inventor
苏云
希莫
Original Assignee
苏云
希莫
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏云, 希莫 filed Critical 苏云
Priority to PCT/IB2019/052719 priority Critical patent/WO2020095120A1/en
Priority to CN201980094701.7A priority patent/CN113841146A/en
Publication of WO2020095120A1 publication Critical patent/WO2020095120A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Definitions

  • the present invention relates to the field of identity authentication of username + password, and in particular to a method for generating an authentication password that can satisfy both ease of use and security. Background technique
  • the general operation method of this authentication mode is that, first, an authentication password needs to be generated, and the user selects several single characters according to a certain habit or password security policy among Arabic numerals, uppercase and lowercase Latin characters, and punctuation characters. , Combined into a string, which is used as the user's authentication password. Then, through a physical or virtual keyboard, enter the characters one by one into a password form that requires identity authentication, such as a computer, mobile phone, various software, email, website, database, or copy and paste this password into this In the password form, in order to carry out identity authentication, and then access to the relevant protected resources.
  • identity authentication such as a computer, mobile phone, various software, email, website, database, or copy and paste this password into this In the password form, in order to carry out identity authentication, and then access to the relevant protected resources.
  • Some websites provide password security checking services for educational purposes, and determine the time required to crack a password through technical means to determine whether the password is safe.
  • the ButterBuys website uses 2019 technology to conduct a 12-digit password “abcdefghi jkl” composed entirely of lowercase letters. After the inspection, the results showed that it would take 100 years to crack it.
  • the test result of the same 12-digit password "ABCdef-2016g” with some numbers, punctuation marks, and uppercase and lowercase letters shows that it takes 726,526,000 years to crack it, and it is almost impossible to crack a password that is more than 700 million years old. Cracked!
  • any security strategy is some artificial rules, recommendations or requirements. For example, select some words from the dictionary to set the password, use techniques such as "L8” instead of “Late”, and choose irrelevant
  • the vocabulary consists of "passphrase”, such as "correct horse battery staple”, and even designs some "vocabulary” that only you can understand.
  • password security policy conflicts with the requirements of randomness. The more artificial factors, the worse the randomness, and the less secure the generated password. Because it is undeniable that such a security strategy is helpful for users to set a strong password, but it is more helpful to unauthorized users and hackers, because they rely on exactly this security strategy to crack passwords, and they This is better than the average user or even an industry expert. Another point is that the use of English vocabulary will greatly limit the scope of users.
  • the present invention provides the following technical solutions:
  • a password management software (hereinafter referred to as the software) developed based on the technical solutions of the present invention, the user arbitrarily selects a single character from the keyboard When entering this character, the software immediately converts it into a random character string, defined as a substitution character string, whose length or number of characters is greater than or equal to 1. For example, the character "n” is converted into the character string "& 0m (o" ( Figure 1).
  • This software corresponds to a character “n” entered by the user from the keyboard, and corresponds to a character string “& 0m (o” stored in it.
  • the software reads from its memory The corresponding string "& 0m (o
  • any character can be subjected to such random conversion in this software, for example, the capital letter “K” can be converted into the substitution string “# X9v”, and the number “7” can be converted into “c ⁇ 6EL", Will symbol Change to "P9g”, convert the number "0” to "l? SG”, and so on ( Figure 2). Now, the user uses these five single characters to form a password "nK7 @ 0", which is defined as an apparent password, and the characters are defined as apparent characters.
  • substitution strings are not the actual passwords that ultimately implement the authentication, but are only the products of some intermediate processes, have no practical meaning in themselves, and are separately encrypted and stored in the memory of the software.
  • the password required for authentication can be generated.
  • the software will immediately replace the corresponding corresponding characters
  • the character strings are sequentially called out from the memory, and then these substitution character strings are sequentially combined according to a special order called premixing method preset by the user to form a longer character string.
  • This is the real implementation of authentication password.
  • use the one-key function of this software to export it to the password form for external authentication, or copy and paste it into this password form.
  • the apparent password and the real password are defined as a password pair.
  • the present invention emphasizes the important role of randomness in irreplaceable password security.
  • Password length is undoubtedly a necessary condition for security, but if a long password lacks randomness, such as a "passphrase” or "password” generated based on a certain password security policy, the important role of password length will be great discount.
  • the man-made strategy is to eliminate some uncertainties, and thus lacks randomness. It helps users and gives hackers an opportunity. Therefore, only by increasing the randomness of the password and increasing its uncertainty, so that it can be found irregularly and without policy, can it be unique, and therefore it cannot be used by hackers. Therefore, randomness is a sufficient condition for password security.
  • FIG. 1 is a schematic diagram of a method for converting a single character into a character string provided by an embodiment of the present invention.
  • FIG. 2 is a schematic diagram of converting a set of apparent characters into a set of substitution character strings provided by an embodiment of the present invention.
  • FIG. 3 is a flowchart of generating a real password according to a preset mixed interpolation method provided by an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of modifying and outputting a real password provided by an embodiment of the present invention. Description of Examples
  • Embodiments of the present invention provide a method for generating an identity authentication password that is both safe and very easy to use, to solve the contradiction between password security and ease of use in the prior art.
  • the core of the present invention is to introduce an intermediate variable called substitution string, which divides the password input from the keyboard and the password output from the software for identity authentication into two different concepts, giving different definitions, and Different generation methods.
  • substitution string which divides the password input from the keyboard and the password output from the software for identity authentication into two different concepts, giving different definitions, and Different generation methods.
  • the purpose of this character substitution is first to ensure the security and convenience of the password entered from the keyboard. Because the real password for identity authentication is not entered through the keyboard, the password can be set very personally according to the principle of simplicity. The second is to ensure the security and convenience of the password for identity authentication output from this software.
  • the present invention reinforces the security and ease of use on these two passwords, respectively, and solves the problem that the prior art has never been able to achieve the ease of use and security of the authentication password at the same time.
  • the detailed description of the embodiment will be developed in several steps below.
  • FIG. 1 is a schematic diagram of a method for converting a single character into a substitution character string according to an embodiment of the present invention.
  • Any universal character used by a computer can perform such character conversion, for example, converting the capital Latin letter "K” into a substitution string “# X9v”, and converting the number “7” into “c ⁇ ” 6EL “, will Convert to "P9g”, convert the number "0” to "l? SG”, etc.
  • FIG. 2 is a schematic diagram of converting a set of apparent characters into a set of substitution character strings according to an embodiment of the present invention.
  • substitution strings are generated immediately. Click on them respectively to change the character combination, or you can directly click on the "Substitution String” field and change their character combination with one click. After the setting is completed, all substitution strings are separately encrypted and stored in the software.
  • FIG. 3 shows the process of combining and outputting real passwords according to the special order set by the user: This is based on FIG. 2 and adds a method and sequence for combining various substitution character strings, that is, a mixed insertion method.
  • a mixed insertion method In the drop-down menu under the "Mixed Insertion Mode” column, you can select the mixed insertion mode of each substitution character string, such as "6wP", etc. The specific meaning of such labels will be explained in detail below. You can also directly click on the "Mixed Insertion” column and change them with one click.
  • the apparent password “nK7 @ 0” is displayed at the bottom left of FIG. 3, click this button, and a 21-digit string “& 0m ( O # X9 VC ⁇ 6ELP9gl? SG ”, this is the real password that is output to the outside for identity authentication.
  • This is the simplest end-to-end mixed interpolation method, which combines 5 substitution strings to generate a real password, including 5 Arabic numerals, 6 lowercase letters, 5 uppercase letters, 5 punctuation marks.
  • the apparent password box and the real password box at the bottom of FIG. 3 are simulated password boxes added to illustrate the technical solution of the present invention, and it is not the real function of the software, because the software does not The real password of each account is not saved.
  • the apparent password is not the password for actual identity authentication, it can be set more simple and personalized, as long as the user is easy to remember and use, but it must be converted into a strong real password, remember!
  • the real password generated by this software is very complex and safe enough, users do not need to remember it or enter it manually for identity authentication. It can be seen that the security and ease of use of the password are also reflected in this password pair.
  • the software only saves all substitution strings, but does not save the real password of any account, which pushes the security of the account password to the extreme and makes up for the biggest hidden danger of the existing password management software.
  • Embodiment 1 In order to further strengthen the security of the real password, the user may select a more complicated method for generating the real password, which mainly depends on the selection of the mixed interpolation method. Taking the mode of FIG. 3 as an example, the description is as follows: Embodiment 1
  • the first type of mixed interpolation method is to treat the character string "# X9v" as a whole and insert it into the previous character string
  • each label represents a mixed insertion substitution string sequence and method.
  • the label “6wP” in FIG. 3 means that at the end of the previous substitution character string “& 0m (o), that is, at the sixth insertion point, the character string“ # X9v "Whole, positive sequence insertion, get 9-digit temporary character string” &# X9v0m (o ".
  • the mixed way marked” 10wP is to insert the temporary character of the replacement character string" c ⁇ 6EL "whole, positive sequence
  • the far right of the string, the 10th insertion point gets a 14-bit temporary string.
  • the second type of mixed insertion method is to imitate the card shuffling method of the poker game, set the software to insert the substitution string of "K” into the string of "n”, and mark this with the letter "s” Type of mixed interpolation. Select the position "3" of the replacement character string "& 0m (o” as the insertion point, insert the character string "# X9v” in a positive order, and insert it at intervals of "1", thus obtaining a 9-digit temporary character string "& 0 #mX (9ov ", this mixed interpolation method is marked as” 3sPGl ", the letter” G “indicates equal interval, and the" 1 "on the right side is the interval value.
  • the mixed insertion method will be set in this software for users to choose and use. In actual use, the user may understand the meaning of various signs, without having to remember them, as far as possible, use the one-click function of the "mixed insertion method" column, Give full play to the convenience of password setting. [0037]
  • the reason why the mixed interpolation method is important is that, although all the substitution strings are randomly generated and encrypted, they have no practical meaning, but after storage, their character structure is fixed Down, that is, the order between characters is fixed, which is equivalent to a certain regularity.
  • FIG. 4 is a schematic diagram of an account modification and output of a real password. Separate two parts to elaborate:
  • the authentication functions of the three pop-up password forms under the “Password” column of FIG. 4 are all optional, and the user can set them all to the apparent password of this account, or can directly enter without clicking them by clicking the password box
  • click the arrow icon to output the real password with one key
  • click the copy icon to paste and output the real password.
  • setting these three apparent passwords is to build a second line of defense for their accounts. Since you can enter the password pair setting mode by clicking the password box under the "Password” column, the apparent passwords, substitution strings, and mixed insertion methods of this account will be at a glance, so it is very important to set an authentication password for this modification function. necessary.
  • the apparent password is responsible for the password authentication of the three functions under the "Password" column in Figure 4.
  • the real password in the password pair is a password that is generated immediately and needs to be externally authenticated when it needs to be output, and it is not saved in the software.
  • This software is a tool for realizing the technical solution of the present invention.
  • this password management software can be developed. After introducing the concept of substitution character string, it simultaneously satisfies the ease of use and security of the authentication password, breaks through the bottleneck of the existing technology, and embodies the value of the present invention in practical applications. Compared with the prior art, the beneficial effects of the present invention are:
  • the characters involved in the present invention are mainly ASCI I characters, but are not limited thereto. Characters that can be processed and printed by operating systems in any language can be used in the password setting of the present invention, such as UNICODE, even radicals in Chinese, Japanese pseudonyms, etc., further increasing the difficulty of cracking passwords. List of reference signs
  • [0056] 144 digit table, limiting the total digits of all substitution strings in the account, or the digits of the real password
  • Patent Literature 1 Systems and methods for evaluating a password policy.
  • Patent Literature 2 Cloud-based active password manager.
  • Patent Literature 3 Systems and methods for providing a covert password
  • Patent Literature 4 Method and system for efficient password input. United States Patent: 10075430 (Filed:). September 2018. Guo. Non-Patent Literature
  • Non-Patent Document 1 Shay, et al. "Correct horse battery staple: exploring the usability of system-assigned passphrases.," Symposium on Usable Privacy and Security (SOUPS) 2012, Jul. 11-13, 2012, pp . 1-20.
  • Non-Patent Literature 2 Li. Zhiwei, et al. “The Emperor ’s New Password
  • Non-Patent Literature 3 Dashlane, áURL: https://www.dashlane.com/
  • Non-Patent Literature 4 IPassword, áURL: https://lpassword.com/>
  • Non-Patent Literature 5 LastPass, URL: https: // www. Lastpass. Com />
  • Non-Patent Document 6 Yubikey, URL: https: // www. Yubico. Com />
  • Non-Patent Document 7 Troy Hunt, “A brief Sony password analysis.” Jun. 6, 2011. áURL: https://www.troyhunt.com/brief-sony-password-analysis/>
  • Non-Patent Literature 8 BetterBuy, “Estimating your password cracking times.,’ URL: https: // www. Betterbuys.com/estimating-passwords-cracking-times/>
  • Non-Patent Document 9 John Hall, "SplashData, s Top 100 Worst Passwords of 2018 ⁇ " Dec. 13, 2018. áURL: https:.. // www teamid com / splashdatas_top-100- worst-passwords-of -2018>
  • Non-Patent Literature 10 Grassi, et al. “Digital Identity Guideline, NIST
  • Non-Patent Document 11 Microsoft, "Password Must Meet Complexity
  • Non-Patent Document 12 Tayler McDowell, "The 10 Password Commandments.” Now.
  • Non-Patent Document 13 Issac Sabes, Pandora Security, “10 Commandments of Password Security.,’ URL: https: // www. Pandoralabs. Net / 10-commandments-of-password-security />
  • Non-Patent Literature 14 Dennis 0, Reilly, "Keep your data safe by following the password commandments.” CNET News, Feb. 27, 2008. áURL:
  • Non-Patent Document 15 Randall Stross, “A strong password is n’t the
  • Non-Patent Document 16 Ives B., Walsh KR and Schneider H. (2004) "The Domino Effect of Password Reuse.," Communications of the ACM, 47: 4, 75-78.
  • Non-Patent Literature 17 AMP Bank Ltd., Account access and operating terms and conditions, pp. 16-17.
  • ⁇ URL ⁇ URL

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The present invention relates to an authentication password generation method which is both very secure and very easy to use. Intermediate variables, which are referred to as substitute character strings, are set in a piece of password management software developed on the basis of the technical solution of the present invention, and a string of characters, which is inputted by means of a keyboard and known as an apparent password, is converted into a real password, which is outputted externally for identity authentication. The apparent password does not participate in the actual identity authentication, and may therefore be set in a simple manner. In addition, the substitute character strings stored in the software do not have any actual significance, and are only promptly combined according to a preset mixed insertion means when outputting an authentication password, to generate the real password, which is then outputted by means of a single key to an external password authentication form, for the actual identity authentication.

Description

说明书  Instructions
发明名称: [同时满足安全性和易用性的密码生成方 Name of invention: [Password generator that satisfies both security and ease of use
Figure imgf000003_0001
Figure imgf000003_0001
[0001]本发明涉及一种用户名 +密码的身份认证领域, 尤其涉及可同时满足易用性和 安全性的认证密码的生成方法。 背景技术 [0001] The present invention relates to the field of identity authentication of username + password, and in particular to a method for generating an authentication password that can satisfy both ease of use and security. Background technique
[0002]用户名 +密码的身份认证模式问世至今已有半个多世纪了, 通过这种方式登录 自己的各种各样的账户, 不但是信息技术时代人们的工作不可或缺的组成部分, 更 是人们日常生活的重要组成部分。 [0002] It has been more than half a century since the identity authentication model of username and password has been available. Logging in to various accounts in this way is not only an integral part of people ’s work in the information technology era It is also an important part of people's daily life.
[0003]这种认证模式的一般操作方法是, 首先需要生成一个认证密码, 用户在阿拉伯 数字、 大小写拉丁字母、 标点符号等字符中, 依据某种习惯或密码安全策略来选择 几个单个字符, 组合成一个字符串, 以此作为用户的认证密码。 然后通过一个物理 的或虚拟的键盘, 将其中的字符逐个输入到诸如计算机、 手机、 各种软件、 电子邮 箱、 网站、 数据库等需要身份认证的密码表单中, 或将这个密码拷贝后粘贴进这个 密码表单中, 以便进行身份认证, 进而接触相关的受保护的资源。 [0003] The general operation method of this authentication mode is that, first, an authentication password needs to be generated, and the user selects several single characters according to a certain habit or password security policy among Arabic numerals, uppercase and lowercase Latin characters, and punctuation characters. , Combined into a string, which is used as the user's authentication password. Then, through a physical or virtual keyboard, enter the characters one by one into a password form that requires identity authentication, such as a computer, mobile phone, various software, email, website, database, or copy and paste this password into this In the password form, in order to carry out identity authentication, and then access to the relevant protected resources.
[0004]设计一个复杂的密码是这种认证模式安全与否的关键, 在这个过程中所谓的密 码安全策略似乎起了至关重要的作用。 半个多世纪以来, 人们开发了许多被认为是 安全性高, 且易于使用的密码管理方法和策略, 有些甚至是强制性的, 许多大型企 业、 各类机构和网站都纷纷推出了自己的密码安全策略, 甚至开发了一些硬件产品。 由于这种认证模式的跨行业属性, 参与其中的几乎涉及了所有行业以及普通人的日 常生活, 渐渐地, 人们建立了一些规则和标准, 达成了一些基本的共识。 主流的观 点认为, 密码的长度、 包含多种字符、 随机性和唯一性, 是安全密码的关键要素, 其中密码的长度尤为重要。 一个足够长度, 例如 10位数以上, 同时混合了数字、 大小写字母和标点符号, 且无序组合而成的长字符串被认为是安全的密码。 [0004] Designing a complex password is the key to the security of this authentication mode. In this process, the so-called password security strategy seems to play a vital role. For more than half a century, people have developed many password management methods and strategies that are considered to be highly secure and easy to use. Some are even mandatory. Many large enterprises, various institutions and websites have all launched their own passwords. Security strategy, and even developed some hardware products. Due to the cross-industry nature of this certification model, the participation involves almost all industries and the daily lives of ordinary people. Gradually, people have established some rules and standards and reached some basic consensus. The mainstream view is that the length of a password, including multiple characters, randomness and uniqueness are the key elements of a secure password, and the length of the password is particularly important. A long string of sufficient length, such as more than 10 digits, mixed with numbers, uppercase and lowercase letters, and punctuation marks, and combined out of order, is considered a secure password.
[0005]一些网站提供了以教育为目的的密码安全性检查服务, 通过技术手段来确定破 解一个密码所需要的时间, 以此判断该密码是否安全。 例如 ButterBuys网站运用 2019年的技术, 对一个 12位的完全用小写字母组成的密码“abcdefghi jkl”进行 了检查, 结果显示, 需要用 100年的时间才能破解它。 然而同样 12位数, 混合了 一些数字、 标点符号和大小写字母的密码“ABCdef-2016g” 的检测结果显示, 破解 它需要 726, 526, 000年, 7亿多年才能破解的密码几乎是不可破解的! 如果打乱密 码中的字母、 数字和符号的顺序, 密码的随机性就会增加, 因而会进一步增加破解 的难度。 测试的结果和网站的分析表明, 足够长度且无序混合各种字符的密码, 是 难以破解的安全密码。 [0005] Some websites provide password security checking services for educational purposes, and determine the time required to crack a password through technical means to determine whether the password is safe. For example, the ButterBuys website uses 2019 technology to conduct a 12-digit password “abcdefghi jkl” composed entirely of lowercase letters. After the inspection, the results showed that it would take 100 years to crack it. However, the test result of the same 12-digit password "ABCdef-2016g" with some numbers, punctuation marks, and uppercase and lowercase letters shows that it takes 726,526,000 years to crack it, and it is almost impossible to crack a password that is more than 700 million years old. Cracked! If the order of letters, numbers and symbols in the password is disrupted, the randomness of the password will increase, which will further increase the difficulty of cracking. The test results and the analysis of the website show that a password of sufficient length and disorderly mixing various characters is a secure password that is difficult to crack.
[0006]然而问题的关键在于, 密码位数越多、 越复杂、 越无序, 自然越符合密码安全 性的要求, 但用户记忆这种密码的难度也就越大, 使用的难度也会非常大, 也就是 说, 非常复杂的安全密码的易用性非常低。 作为一个用户, 自然希望在密码使用方 便的同时, 也能够保证密码的安全性, 然而长期以来, 密码的安全性与易用性之间 似乎是一种对立的关系, 而且两者间的障碍看似难以逾越, 这成了密码认证领域的 超级难题。 结果导致在实际操作过程中, 密码的安全性往往屈从于使用的便利性。 用户在安全策略的帮助下虽然设置了看似安全的密码, 却因为太过复杂而无奈地将 其抄了下来, 张贴到屏幕上, 或明码保存在电子设备中。 使用起来固然方便了, 可 密码的安全却形同虚设, 使账户面临了巨大的风险。 更令人担心的是, 许多用户干 脆使用诸如“123456” 、 “password”来做密码, 使这样的超级弱密码连续数年荣 登美国安全软件与服务提供商 SplashData 网站年度最差密码排行榜的第一、 二名, 突显出现有技术下大多数用户的无奈与无助。 凡此种种, 不禁令用户感叹: 唯一安 全的就是那个你记不住的密码! [0006] However, the key to the problem is that the more digits, the more complex, and the more disordered the password, the more naturally it meets the requirements of password security, but the greater the difficulty for users to remember such passwords, and the difficulty of use Large, that is, the ease of use of very complex security passwords is very low. As a user, it is natural to hope that while the password is convenient to use, it can also ensure the security of the password. However, for a long time, the security of the password and the ease of use seem to be a contradictory relationship, and the obstacles between the two It seems insurmountable, which has become a super problem in the field of password authentication. As a result, in the actual operation process, the security of the password often succumbs to the convenience of use. With the help of the security policy, the user set a seemingly safe password, but because it is too complicated to copy it down, post it on the screen, or save it in the electronic device in clear code. Although it is convenient to use, the security of the password is virtually useless, which makes the account face huge risks. What's more worrying is that many users simply use passwords such as "123456" and "password" to make such super weak passwords top the list of the worst passwords of the US security software and service provider SplashData website for several consecutive years. First and second, highlight the helplessness and helplessness of most users with technology. In all these cases, users can't help but sigh: The only security is the password you can't remember!
[0007]早在 2003年, 美国国家标准与技术研究所撰写了一份报告 《NIST特别出版物 800-63, 附录 A》 , 对设置安全密码提出了一些指导性建议: 使用字符、 数字和大 小写字母, 而且要定期更换密码。 2017年, NIST修订了上述报告, 强调了密码长 度的重要性, 推荐使用一组英文单词组成密码, 而非单个字符, 即用“passphrase” 代替“password” , 不再建议定期更改密码, 并弱化了混合字符的作用。 因为单词 比较容易记忆, 因此可以设置和使用较长的密码。 鉴于 NIST的权威性, 上述报告 早已成为政府部门、 企业、 机构和个人用户默认的密码安全策略, 事实上成为了行 业的标准。 [0007] As early as 2003, the National Institute of Standards and Technology wrote a report "NIST Special Publication 800-63, Appendix A", which made some guidelines for setting up secure passwords: use characters, numbers, and sizes Write letters and change the password regularly. In 2017, NIST revised the above report to emphasize the importance of password length. It is recommended to use a set of English words to form a password instead of a single character, that is, use "passphrase" instead of "password". It is no longer recommended to change the password regularly and weaken it. The role of mixed characters. Because words are easier to remember, longer passwords can be set and used. In view of the authority of NIST, the above report has already become the default password security strategy for government departments, enterprises, institutions and individual users, and in fact has become the industry standard.
[0008]我们知道, 任何安全策略都是一些人为的规则、 建议或要求。 例如从字典中选 取一些词汇来设置密码, 采用诸如用 “L8”代替“Late”之类的技巧, 挑选不相干 的词汇组成“passphrase” , 例如“correct horse battery staple” , 甚至设计 一些只有自己才懂得的“词汇” 。 可是, 这样的密码安全策略与随机性的要求是有 冲突的, 人为的因素越多, 随机性就越差, 由此生成的密码就越不安全。 因为不可 否认的是, 这样的安全策略对用户设置一个强密码是有帮助的, 可它对非授权用户 和黑客的帮助更大, 因为他们依赖的恰恰是这样的安全策略来破解密码, 而且他们 要比一般用户甚至是行业专家更擅长此道。 还有一点是, 使用英语词汇将极大地限 制用户的范围。 [0008] We know that any security strategy is some artificial rules, recommendations or requirements. For example, select some words from the dictionary to set the password, use techniques such as "L8" instead of "Late", and choose irrelevant The vocabulary consists of "passphrase", such as "correct horse battery staple", and even designs some "vocabulary" that only you can understand. However, such a password security policy conflicts with the requirements of randomness. The more artificial factors, the worse the randomness, and the less secure the generated password. Because it is undeniable that such a security strategy is helpful for users to set a strong password, but it is more helpful to unauthorized users and hackers, because they rely on exactly this security strategy to crack passwords, and they This is better than the average user or even an industry expert. Another point is that the use of English vocabulary will greatly limit the scope of users.
[0009]现有技术的种种问题集中体现在用户端在密码管理上的弱势与无助。 在用户名 +密码的认证模式问世的半个多世纪中, 科技飞速发展, 各类服务提供商以及黑客 都在与时俱进, 加密、 解密的技术也不断进步, 唯独用户端由于资金和技术等的原 因, 在密码管理上的弱势状况始终得不到扭转。 [0009] Various problems in the prior art are concentrated on the weakness and helplessness of the user terminal in password management. In the more than half a century of the username and password authentication model, technology has developed rapidly, various service providers and hackers are advancing with the times, and encryption and decryption technologies have also continued to improve. For technical reasons, the weak situation in password management has never been reversed.
[0010]为了解决这些问题, 人们开发了许多第三方的和在线的密码管理软件, 以帮助 用户生成、 存储、 记忆和使用复杂的密码进行身份认证。 这类软件在帮助用户设置、 存储大量的复杂密码, 尤其是记忆这些密码方面, 扮演者非常重要的角色, 较为流 行的管理软件有 Dashlane、 IPassword、 LastPass等。 这类软件的共同特点是, 在 软件中生成的密码就是实际输出并实施认证的密码, 更重要的是, 所有账户的密码 等机密信息都是直接加密存储在这些密码管理软件中, 安全状况始终令人担心。 所 以, 这类软件都必须设置一个足够安全的登录密码, 一般称为主密码, 用户必须牢 牢记住它。 这样一来, 主密码就成了这类软件安全性的唯一防线, 一旦被破解, 其 中存储的机密信息将面临泄露的危险。 鉴于这些缺陷, 有些金融类机构和网站出于 账户安全的考虑, 明令禁止客户使用这类密码管理软件。 发明概述 [0010] In order to solve these problems, people have developed many third-party and online password management software to help users generate, store, remember, and use complex passwords for identity authentication. This type of software plays a very important role in helping users set and store a large number of complex passwords, especially remembering these passwords. The more popular management software includes Dashlane, IPassword, LastPass and so on. The common feature of this type of software is that the password generated in the software is the password that is actually output and authenticated. More importantly, the confidential information such as the password of all accounts is directly encrypted and stored in these password management software, and the security status is always Worrying. Therefore, such software must set a login password that is sufficiently secure, generally called the master password, and the user must remember it firmly. In this way, the master password becomes the only line of defense for the security of such software. Once it is cracked, the confidential information stored in it will face the risk of leakage. In view of these deficiencies, some financial institutions and websites explicitly prohibit customers from using such password management software for account security reasons. Summary of the invention
[0011]对密码安全性的苛刻要求与严峻的现状, 给生成、 存储、 记忆和使用密码带来 了巨大的挑战, 为了克服这些难题, 并最终为用户端提供一个能同时满足易用性和 安全性的密码管理方法, 本发明给出如下的技术方案: 在一个基于本发明的技术方 案而开发的密码管理软件 (以下简称为本软件) 中, 用户任意选定一个单个字符, 从键盘上输入这个字符时, 本软件立刻将其转换成一个随机的字符串, 定义为代换 字符串, 其长度或者字符位数大于等于 1。 例如, 将字符“n”转换为字符串 “&0m(o” (图 1) 。 转换完成之后, 这个代换字符串就被存储在本软件中。 现在, 本软件就把用户从键盘输入的一个字符“n”, 与存储在其中的一个字符串“&0m (o” 对应了起来。 当用户再从键盘输入字符“n”时, 本软件就从其存储器中调出相应 的字符串“&0m (o [0011] The stringent requirements and severe status quo for password security have brought huge challenges to the generation, storage, memory, and use of passwords. In order to overcome these difficulties, and ultimately provide a user end that can meet the ease of use and For a secure password management method, the present invention provides the following technical solutions: In a password management software (hereinafter referred to as the software) developed based on the technical solutions of the present invention, the user arbitrarily selects a single character from the keyboard When entering this character, the software immediately converts it into a random character string, defined as a substitution character string, whose length or number of characters is greater than or equal to 1. For example, the character "n" is converted into the character string "& 0m (o" (Figure 1). After the conversion is completed, the replacement character string is stored in the software. Now, This software corresponds to a character “n” entered by the user from the keyboard, and corresponds to a character string “& 0m (o” stored in it. When the user enters the character “n” from the keyboard, the software reads from its memory The corresponding string "& 0m (o
[0012]任意一个字符都可以在本软件中进行这样的随机转换, 例如可以将大写字母 “K”转换为代换字符串 “#X9v” , 将数字“7”转换为“c~6EL” , 将符号
Figure imgf000006_0001
换为“P9g” , 将数字“0”转换为“l?sG”, 等等 (图 2 ) 。 现在, 用户用所选定 的这 5个单个字符组合成一个密码“nK7@0” , 定义为表观密码, 其中的字符定义 为表观字符。
[0012] Any character can be subjected to such random conversion in this software, for example, the capital letter "K" can be converted into the substitution string "# X9v", and the number "7" can be converted into "c ~ 6EL", Will symbol
Figure imgf000006_0001
Change to "P9g", convert the number "0" to "l? SG", and so on (Figure 2). Now, the user uses these five single characters to form a password "nK7 @ 0", which is defined as an apparent password, and the characters are defined as apparent characters.
[0013]这些代换字符串并不是最终实施认证的真实密码, 而只是一些中间过程的产物, 本身没有任何实际意义, 并且是分立地加密保存在本软件的存储器中。 当完成上述 字符转换过程后, 就可以生成实施认证所需要的密码。 以上述那一组经过转换的表 观字符为例, 当用户通过键盘依次输入那 5个表观字符, 也就是输入表观密码的时 候, 本软件会立刻把与各表观字符对应的代换字符串从存储器中依次调出来, 再按 照用户预先设定的被称为混插方式的特殊顺序, 将这些代换字符串依次组合起来, 构成一个更长的字符串, 这就是实施认证的真实密码。 然后利用本软件的一键功能, 将其输出到实施外部认证的密码表单中, 或将其拷贝再粘贴到这个密码表单中。 为 了叙述方便, 把表观密码和真实密码定义为密码对。 [0013] These substitution strings are not the actual passwords that ultimately implement the authentication, but are only the products of some intermediate processes, have no practical meaning in themselves, and are separately encrypted and stored in the memory of the software. After the above character conversion process is completed, the password required for authentication can be generated. Taking the converted set of apparent characters as an example, when the user enters the five apparent characters in sequence through the keyboard, that is, when entering the apparent password, the software will immediately replace the corresponding corresponding characters The character strings are sequentially called out from the memory, and then these substitution character strings are sequentially combined according to a special order called premixing method preset by the user to form a longer character string. This is the real implementation of authentication password. Then use the one-key function of this software to export it to the password form for external authentication, or copy and paste it into this password form. For convenience of description, the apparent password and the real password are defined as a password pair.
[0014]本发明强调随机性对密码安全不可替代的重要作用。 密码长度无疑是安全性的 必要条件, 但如果一个长密码缺乏随机性, 例如一个“passphrase”, 或者是基于 某种密码安全策略而生成的“password”, 密码长度所起的重要作用就会大打折扣。 毕竟, 人为的策略是为了消除一些不确定性, 因而缺乏了随机性, 它帮助了用户, 更给黑客留下可乘之机。 所以, 只有增加密码的随机性, 增加它的不确定性, 使它 无规律可寻, 无策略可依, 才能是独一无二的, 因而也不能为黑客所用。 所以, 随 机性是密码安全的充分条件。 对附图的简要说明 [0014] The present invention emphasizes the important role of randomness in irreplaceable password security. Password length is undoubtedly a necessary condition for security, but if a long password lacks randomness, such as a "passphrase" or "password" generated based on a certain password security policy, the important role of password length will be great discount. After all, the man-made strategy is to eliminate some uncertainties, and thus lacks randomness. It helps users and gives hackers an opportunity. Therefore, only by increasing the randomness of the password and increasing its uncertainty, so that it can be found irregularly and without policy, can it be unique, and therefore it cannot be used by hackers. Therefore, randomness is a sufficient condition for password security. Brief description of the drawings
[0015]为了更加清楚、 准确地说明本发明实施例的技术方案, 下面将对实施例中需要 使用的附图作简要介绍。 显然, 下面所描述的附图仅仅是本申请的一些实施例, 对 于本领域的技术人员来讲, 在无需付出创造性劳动的前提下, 还可以根据这些附图 衍生出其他的相关附图。 [0015] In order to more clearly and accurately explain the technical solutions of the embodiments of the present invention, the following will briefly introduce the drawings that need to be used in the embodiments. Obviously, the drawings described below are only some embodiments of the present application. For those skilled in the art, on the premise that no creative work is required, other related drawings can be derived from these drawings.
[0016] [图 1]为本发明实施例提供的将单个字符转换成一个字符串的方法原理图。 [0016] FIG. 1 is a schematic diagram of a method for converting a single character into a character string provided by an embodiment of the present invention.
[0017] [图 2]为本发明实施例提供的将一组表观字符转换成一组代换字符串的原理图。 [0017] FIG. 2 is a schematic diagram of converting a set of apparent characters into a set of substitution character strings provided by an embodiment of the present invention.
[0018] [图 3]为本发明实施例提供的根据预设的混插方式组合生成真实密码的流程图。 [0018] FIG. 3 is a flowchart of generating a real password according to a preset mixed interpolation method provided by an embodiment of the present invention.
[0019] [图 4]为本发明实施例提供的修改、 输出真实密码的原理图。 实施例的说明 [0019] FIG. 4 is a schematic diagram of modifying and outputting a real password provided by an embodiment of the present invention. Description of Examples
[0020]为了使本发明的技术方案、 所能解决的问题等更加清晰, 下面将结合附图和实 施例, 对本发明的技术方案做详尽、 完整的描述。 显然, 所描述的实施例仅是本发 明的一部分实施例, 而非全部的实施例, 尤其在混插方式的充分、 完整的界定上。 基于本发明的实施例, 本领域的普通技术人员在没有做出创造性劳动的前提下所获 得的所有其他实施例, 都应当属于本发明保护的范围。 [0020] In order to make the technical solution of the present invention, the problems that can be solved more clear, the following will make a detailed and complete description of the technical solution of the present invention in conjunction with the accompanying drawings and embodiments. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all the embodiments, especially on the sufficient and complete definition of the hybrid interpolation method. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0021]本发明实施例提供了一种既安全, 又非常容易使用的身份认证密码的生成方法, 以解决现有技术中密码安全性与易用性之间的矛盾。 本发明的核心在于, 引入一个 被称为代换字符串的中间变量, 把从键盘输入本软件的密码与从本软件输出进行身 份认证的密码分成两个不同的概念, 给予不同的定义, 和不同的生成方法。 这种字 符代换的目的, 首先是要确保从键盘输入的密码的安全性和便利性。 因为通过键盘 输入的并不是实施身份认证的真实密码, 因此可以按照从简的原则, 非常个性化地 设置这个密码。 其次是要确保从本软件输出进行身份认证的密码的安全性和便利性。 因为所有账户的真实密码并不直接保存在本软件中, 而是在需要输出进行认证的时 候, 才将所存储的相关代换字符串从存储器中调出、 按照特殊的混插方式立刻组合 起来、 生成进行认证的真实密码、 再输出到外部的密码表单中。 据此, 本发明将安 全性与易用性分别强化在这两个密码上, 解决了现有技术始终无法实现的同时满足 认证密码的易用性和安全性的难题。 下面将分几个步骤展开实施例的详细描述。 [0021] Embodiments of the present invention provide a method for generating an identity authentication password that is both safe and very easy to use, to solve the contradiction between password security and ease of use in the prior art. The core of the present invention is to introduce an intermediate variable called substitution string, which divides the password input from the keyboard and the password output from the software for identity authentication into two different concepts, giving different definitions, and Different generation methods. The purpose of this character substitution is first to ensure the security and convenience of the password entered from the keyboard. Because the real password for identity authentication is not entered through the keyboard, the password can be set very personally according to the principle of simplicity. The second is to ensure the security and convenience of the password for identity authentication output from this software. Because the real passwords of all accounts are not directly stored in the software, but when the output is required for authentication, the stored related substitution strings are recalled from the memory and immediately combined according to a special mixing method , Generate a real password for authentication, and then output to an external password form. Accordingly, the present invention reinforces the security and ease of use on these two passwords, respectively, and solves the problem that the prior art has never been able to achieve the ease of use and security of the authentication password at the same time. The detailed description of the embodiment will be developed in several steps below.
[0022] 图 1为本发明实施例提供的将单个字符转换成一个代换字符串的方法原理图。 [0022] FIG. 1 is a schematic diagram of a method for converting a single character into a substitution character string according to an embodiment of the present invention.
在“表观密码”栏下方的“字符表单” 中输入一个单个字符; 在“字符位数”栏下 方的下拉菜单中选择代换字符串的位数后, 代换字符串得以生成; 点击“代换字符 串”栏下方的代换字符串, 可改变其中的字符组合。 当用户从键盘输入的字符是小 写拉丁字母“n” , 字符位数选为“5” , 本软件转换生成的随机字符串是 Enter a single character in the "Character Form" under the "Appearance Password"column; after selecting the number of digits in the substitution string in the drop-down menu below the "Character Digits" column, the substitution string is generated; click "" Substitution character The replacement character string under the "string" column can change the character combination. When the character entered by the user from the keyboard is the lowercase Latin letter "n" and the number of characters is selected as "5", the random character string generated by the software conversion is
“&0m(o” 。 这样的一个单个字符的转换称为一个“单字符代换项” 。  "& 0m (o". Such a single character conversion is called a "single character substitution item".
[0023]计算机所使用的任何通用字符都可以进行这样的字符转换, 例如, 将大写的拉 丁字母“K”转换为一个代换字符串 “#X9v” , 将数字“7”转换为“c~6EL” , 将
Figure imgf000008_0001
转换为“P9g” , 将数字“0”转换为“l?sG” , 等等。
[0023] Any universal character used by a computer can perform such character conversion, for example, converting the capital Latin letter "K" into a substitution string "# X9v", and converting the number "7" into "c ~" 6EL ", will
Figure imgf000008_0001
Convert to "P9g", convert the number "0" to "l? SG", etc.
[0024] 图 2为本发明实施例提供的将一组表观字符转换成一组代换字符串的原理图。 [0024] FIG. 2 is a schematic diagram of converting a set of apparent characters into a set of substitution character strings according to an embodiment of the present invention.
在功能上, 它是将图 1所示的几个单个字符转换功能集合在一起。 具体方法是: Functionally, it is a combination of several single character conversion functions shown in Figure 1. The specific method is:
1) 在图 2中 “表观字符”栏右侧的“数字表单” 中输入一个数字, 例如“5” , 下 方即出现 5个单字符代换项, 其中每个“字符表单” 中可输入一个表观字符。 直接 点击“表观字符”栏, 可一键更改这 5个字符; 1) Enter a number in the "Number Form" on the right side of the "Appearance Characters" column in Figure 2, such as "5", and five single-character substitution items appear below, where each "Character Form" can be entered An apparent character. Directly click on the "Appearance Characters" column to change these 5 characters with one click;
2) 在图 2中 “字符位数”栏右侧的“位数表单” 中输入一个数字, 例如“21” , 可限定 5个代换字符串的字符总位数, 在“字符位数”栏下方的下拉菜单中可分别 选择代换字符串的位数。 直接点击“字符位数”栏, 可一键更改这 5个位数值; 2) Enter a number, such as "21", in the "digit number form" on the right side of the "Character digits" column in Figure 2 to limit the total number of characters of the 5 replacement strings. In the "Character digits" The number of substitution strings can be selected in the drop-down menu below the column. Click the "Character Digits" column directly to change these 5 digit values with one click;
3) 字符位数确定后, 立即生成 5个代换字符串。 分别点击它们可改变其中的字符 组合, 也可直接点击“代换字符串”栏, 一键更改它们的字符组合。 设置完成后, 所有代换字符串都被分立地加密保存在本软件中。 3) After the number of characters is determined, 5 substitution strings are generated immediately. Click on them respectively to change the character combination, or you can directly click on the "Substitution String" field and change their character combination with one click. After the setting is completed, all substitution strings are separately encrypted and stored in the software.
[0025] 图 3显示了按照用户设定的特殊顺序组合并输出真实密码的过程: 这是在图 2 的基础上, 增加了组合各个代换字符串的方法和顺序, 也就是混插方式。 可以在 “混插方式”栏下方的下拉菜单中分别选择各个代换字符串的混插方式, 例如 “6wP”等, 这类标示的具体含义将在下面详细解释。 也可以直接点击“混插方式” 栏, 一键更改它们。 [0025] FIG. 3 shows the process of combining and outputting real passwords according to the special order set by the user: This is based on FIG. 2 and adds a method and sequence for combining various substitution character strings, that is, a mixed insertion method. In the drop-down menu under the "Mixed Insertion Mode" column, you can select the mixed insertion mode of each substitution character string, such as "6wP", etc. The specific meaning of such labels will be explained in detail below. You can also directly click on the "Mixed Insertion" column and change them with one click.
[0026]上述设置完成后, 表观密码“nK7@0”显示在图 3的左下方, 点击这个键, 右 侧的密码框中就生成一个 21位数的字符串 “&0m(O#X9VC~6ELP9gl?sG” , 这就是输 出到外部实施身份认证的真实密码。 这是使用最简单的首尾相接的混插方式, 将 5 个代换字符串组合起来生成的真实密码, 其中包括 5个阿拉伯数字、 6个小写字母、 5个大写字母、 5个标点符号。 [0027]需要特别指出的是, 图 3最下部的表观密码框和真实密码框是为了说明本发明 的技术方案而附加的模拟密码框, 它不是本软件的真实功能, 因为本软件中并不保 存各个账户的真实密码。 [0026] After the above settings are completed, the apparent password “nK7 @ 0” is displayed at the bottom left of FIG. 3, click this button, and a 21-digit string “& 0m ( O # X9 VC ~ 6ELP9gl? SG ”, this is the real password that is output to the outside for identity authentication. This is the simplest end-to-end mixed interpolation method, which combines 5 substitution strings to generate a real password, including 5 Arabic numerals, 6 lowercase letters, 5 uppercase letters, 5 punctuation marks. [0027] It should be particularly pointed out that the apparent password box and the real password box at the bottom of FIG. 3 are simulated password boxes added to illustrate the technical solution of the present invention, and it is not the real function of the software, because the software does not The real password of each account is not saved.
[0028]在图 3的转换模式中有一个特例, 如果将每一个代换字符串的位数都设定为 “1” , 本软件将无需作字符转换, 各个代换字符串都变成了单个字符, 也都等于 相应的表观字符, 结果是表观密码与真实密码完全相同。 [0028] There is a special case in the conversion mode of FIG. 3, if the number of digits of each substitution string is set to "1", the software will not need to perform character conversion, and each substitution string becomes A single character is also equal to the corresponding apparent character. The result is that the apparent password is exactly the same as the real password.
[0029]至此, 一个账户的表观密码和真实密码, 也就是该账户的密码对, 设置完成了。 [0029] At this point, the apparent password and the real password of an account, that is, the password pair of the account, are set.
由于表观密码并不是进行实际身份认证的密码, 因此可以设置的更加简单和个性化, 只要用户容易记忆和使用即可, 但一定要将其转换成强的真实密码, 切记! 本软件 生成的真实密码虽然非常复杂, 也足够安全, 但用户并不需要记忆它, 也不需要手 动输入它进行身份认证。 可见, 密码的安全性和易用性同时体现在这一个密码对中。 此外, 本软件只保存全部的代换字符串, 而不保存任何账户的真实密码, 这将账户 密码的安全性推向了极致, 弥补了现有技术的密码管理软件的最大隐患。  Since the apparent password is not the password for actual identity authentication, it can be set more simple and personalized, as long as the user is easy to remember and use, but it must be converted into a strong real password, remember! Although the real password generated by this software is very complex and safe enough, users do not need to remember it or enter it manually for identity authentication. It can be seen that the security and ease of use of the password are also reflected in this password pair. In addition, the software only saves all substitution strings, but does not save the real password of any account, which pushes the security of the account password to the extreme and makes up for the biggest hidden danger of the existing password management software.
[0030]把这个密码输入 BetterBuys网站进行检测时, 给出的结论是“Infinity” , 意为“无限” , 说明这个密码永远也破解不了, 它是独一无二的, 满足安全密码的 所有要求。 [0030] When entering this password into the BetterBuys website for testing, the conclusion given is "Infinity", meaning "infinite", indicating that this password can never be cracked, it is unique and meets all the requirements of a secure password.
[0031]为了进一步强化真实密码的安全性, 用户可以选择更为复杂的生成真实密码的 方法, 这主要取决于混插方式的选择。 以图 3的模式为例叙述如下: 实施例 1 [0031] In order to further strengthen the security of the real password, the user may select a more complicated method for generating the real password, which mainly depends on the selection of the mixed interpolation method. Taking the mode of FIG. 3 as an example, the description is as follows: Embodiment 1
[0032]在字符表单中分别输入字符“n”和“K” 时, 本软件生成了两个相应的代换字 符串 “&0m (o”和“#X9v” 。 把后者组合到前者上去的混插方式有: [0032] When entering the characters "n" and "K" in the character form, the software generates two corresponding substitution strings "& 0m (o" and "# X9v". The latter is combined with the former The mixing methods are:
[0033]第一类混插方式是把字符串 “#X9v”看作一个整体, 插入到前一个字符串 [0033] The first type of mixed interpolation method is to treat the character string "# X9v" as a whole and insert it into the previous character string
“&0m (o” 的任意位置上, 用小写字母“w”标示这一类混插方式。 字符串 “&0m (o” 中共有 6个插入点, 从字符“&” 的左侧开始从“1”到“6”排序。 选位置“2”或 字符“&”和“0”之间为插入点, 将“K” 的字符串按从左向右的正序整体插入其 中, 得到一个 9位数的临时字符串 “&#X9v0m (o” , 这种混插方式标示为“2wP” , 数字“2”表示插入点的位置, 大写字母“P”表示正序。 如果在同一个插入点按从 右向左的反序插入时, 得到的临时字符串为“&v9X#0m (o” , 标 为“2wR” , 大写 字母“R”表示反序, 也就是把字符串 “#X9v”反转成“v9X#”后再插入。 不难算 出, “K” 的字符串共有 12种可能的混插方式, 可组合出 12个不同的 9位数的临 时字符串。 At any position of "& 0m (o", lowercase letter "w" is used to indicate this type of interpolating method. There are 6 insertion points in the string "& 0m (o", starting from the left of the character "&" and starting from "1 "To" 6 "sorting. Select the position" 2 "or the characters"&"and" 0 "as the insertion point, insert the string of" K "into the whole in a positive sequence from left to right, and get a 9-bit Temporary string of numbers "&# X9v0m (o", this mixed interpolation method is marked as "2wP", the number "2" indicates the position of the insertion point, and the capital letter "P" indicates the positive sequence. If you press at the same insertion point When inserted in reverse order from right to left, the temporary string obtained is "& v9X # 0m (o", marked as "2wR", capitalized The letter "R" means reverse order, that is, the character string "# X9v" is reversed to "v9X #" and then inserted. It is not difficult to figure out that there are 12 possible intermixing methods for the "K" character string, and 12 different 9-digit temporary character strings can be combined.
[0034]本软件提供了许多种组合代换字符串的混插方式, 分别用字母 +数字的方式来 标示它们, 每一种标示代表一种混合插入代换字符串的顺序和方法。 按照上述的混 插方式, 前述图 3中的标示“6wP” 的含义是, 在前一个代换字符串 “&0m (o” 的尾 端, 即第 6个插入点处, 将字符串 “#X9v”整体、 正序插入, 得到 9位数临时字符 串 “&#X9v0m (o” 。 标示为“10wP” 的混插方式是将代换字符串 “c~6EL”整体、 正 序插入这个临时字符串的最右边, 即第 10个插入点, 得到一个 14位的临时字符串。 以此类推, 可知标示“15wP”和“18wP” 的含义, 直到生成最终的真实密码。 不难 算出, 按照这一类混插方式组合上述 5个代换字符串时, 一共可以生成 98种不同 的真实密码。 实施例 2 [0034] The software provides many kinds of mixed substitution string combinations, respectively using letters + numbers to label them, each label represents a mixed insertion substitution string sequence and method. According to the above-mentioned mixed interpolation method, the label “6wP” in FIG. 3 means that at the end of the previous substitution character string “& 0m (o), that is, at the sixth insertion point, the character string“ # X9v "Whole, positive sequence insertion, get 9-digit temporary character string" &# X9v0m (o ". The mixed way marked" 10wP "is to insert the temporary character of the replacement character string" c ~ 6EL "whole, positive sequence The far right of the string, the 10th insertion point, gets a 14-bit temporary string. By analogy, we can see the meaning of "15wP" and "18wP" until the final real password is generated. It is not difficult to work out, follow this When one type of mixed interpolation method combines the above five substitution character strings, a total of 98 different real passwords can be generated.
[0035]第二类混插方式是模仿扑克牌游戏的洗牌方法, 设置本软件把“K” 的代换字 符串混合插入到“n” 的字符串中, 用字母“s”标示这一类混插方式。 选代换字符 串 “&0m (o” 的位置“3”为插入点, 将字符串 “#X9v”按正序, 以“1”为间隔插 入, 于是得到一个 9位数的临时字符串 “&0#mX (9ov” , 此种混插方式标示为 “3sPGl” , 字母“G”表示等间隔, 其右侧的“1”为间隔值。 如果在相同的插入 点按反序插入时, 得到的临时字符串为“v9&X0#m (O” , 标示为“3sRGl” 。 易 lj除掉 与第一类混插方式重复的 2个结果, “K” 的字符串共有 10种可能的混插结果。 不 难算出, 按照这一类混插方式将上述 5个代换字符串全部混插完成后, 一共可以生 成 90种不同的真实密码。 [0035] The second type of mixed insertion method is to imitate the card shuffling method of the poker game, set the software to insert the substitution string of "K" into the string of "n", and mark this with the letter "s" Type of mixed interpolation. Select the position "3" of the replacement character string "& 0m (o" as the insertion point, insert the character string "# X9v" in a positive order, and insert it at intervals of "1", thus obtaining a 9-digit temporary character string "& 0 #mX (9ov ", this mixed interpolation method is marked as" 3sPGl ", the letter" G "indicates equal interval, and the" 1 "on the right side is the interval value. If you insert in reverse order at the same insertion point, you will get The temporary character string is "v9 & X0 # m ( O ", marked as "3sRGl". Easy lj removes the two results that are repeated with the first type of interpolating method. The "K" character string has 10 possible interpolating results. It is not difficult to figure out that after all the above five substitution character strings are interpolated according to this type of interpolated method, a total of 90 different real passwords can be generated.
[0036]选择不同的间隔值, 例如“2” 、 “3”或“4” 时, 又会生成许多种标示的混 插方式, 以及更多的真实密码。 如果选择不等间隔的混插方式, 例如序列“1、 3、[0036] When a different interval value is selected, for example, "2", "3" or "4", many kinds of marked interpolated ways are generated, and more real passwords are generated. If you select a mixed interpolation method with unequal intervals, for example the sequence "1, 3
5、 7” , 或“2、 4、 6、 8” , 或斐波那契数列, 或更大跨度甚至是无序的间隔值时, 将生成更多种临时字符串以及真实密码。 所有这些混插方式都将设置在本软件中, 供用户选择使用。 实际使用时, 用户大概了解一下各种标示的含义即可, 无需记忆 它们, 尽可能利用 “混插方式”栏的一键功能, 充分发挥密码设置的便利性。 [0037]混插方式之所以重要是因为, 所有的代换字符串虽然都是随机生成的, 而且是 加密保存的, 其本身也无任何实际意义, 但存储之后, 它们的字符结构就都固定下 来了, 也就是字符间的顺序固定了, 这相当于有了某种规律性。 因此, 出于对绝对 安全性的考虑, 在生成真实密码时要充分、 彻底地打乱原有代换字符串的顺序和结 构, 在保证密码长度的前提下, 充分满足对随机性的要求, 设置出真正安全的认证 密码, 实现“唯一安全的就是那个不依赖人为策略的密码” 的安全理念。 5, 7 ", or" 2, 4, 6, 8 ", or Fibonacci numbers, or larger spans or even unordered interval values, more temporary strings and real passwords will be generated. All of these The mixed insertion method will be set in this software for users to choose and use. In actual use, the user may understand the meaning of various signs, without having to remember them, as far as possible, use the one-click function of the "mixed insertion method" column, Give full play to the convenience of password setting. [0037] The reason why the mixed interpolation method is important is that, although all the substitution strings are randomly generated and encrypted, they have no practical meaning, but after storage, their character structure is fixed Down, that is, the order between characters is fixed, which is equivalent to a certain regularity. Therefore, for the sake of absolute security, the order and structure of the original substitution strings must be completely and thoroughly disrupted when generating real passwords. On the premise of ensuring the length of the password, the requirements for randomness are fully met. Set up a truly secure authentication password to realize the security concept of "the only security is the password that does not rely on artificial policies".
[0038]采用本发明的技术方案之后, 使用 “passphrase”还是“password”设计密码, 区别不大了。 选几个英文字典中的词汇 (尽管我们不建议这样做) , 无论用户是否 懂得它们, 利用本发明独特的混插方式, 彻底打乱它们的既有顺序和含义, 同样可 以生成无序、 随机、 无任何线索与规律的安全密码。 [0038] After adopting the technical solution of the present invention, whether the password is designed using "passphrase" or "password" is not much different. Choose a few words from the English dictionary (although we do not recommend it), regardless of whether the user understands them, using the unique mixing method of the present invention to completely disrupt their existing order and meaning, it can also generate disorder and randomness , Secure password without any clues and rules.
实施例 3 Example 3
[0039] 图 4为一个账户的修改、 输出真实密码的原理图。 分开两部分进行详细阐述:[0039] FIG. 4 is a schematic diagram of an account modification and output of a real password. Separate two parts to elaborate:
1) 图中 “密码”栏下的密码框中出现一组星号时, 说明该账户的密码对已经设置 完成。 点击这个密码框将弹出一个密码表单, 输入该账户的表观密码后就进入图 3 所示的密码对设置模式, 可以对旧的密码对进行修改。 1) When a group of asterisks appears in the password box under the "Password" column in the figure, it means that the account password pair has been set. Clicking on this password box will pop up a password form. After entering the apparent password of the account, you will enter the password pair setting mode shown in Figure 3. You can modify the old password pair.
2) 输出真实密码时, 点击图中的箭头图标将弹出一个密码表单, 输入相应的表观 密码认证通过后, 本软件将相关的代换字符串立刻组合起来生成真实密码, 并一键 输出到外部的密码表单中进行身份认证。 也可以点击图中的拷贝图标, 在弹出的密 码表单中输入本账户的表观密码认证通过后, 本软件将生成的真实密码拷贝后粘贴 到外部表单中进行认证。  2) When outputting the real password, click the arrow icon in the figure to pop up a password form. After entering the corresponding apparent password authentication, the software will immediately combine the related substitution strings to generate the real password and output it to Identity verification is performed in an external password form. You can also click the copy icon in the figure and enter the apparent password authentication of the account in the pop-up password form. The software will copy and paste the generated real password into the external form for authentication.
[0040] 图 4“密码”栏下三个弹出密码表单的认证功能都是可选的, 用户可以把它们 都设置成这个账户的表观密码, 也可以不设置它们, 点击密码框就直接进入密码对 的设置和修改模式, 点击箭头图标就一键输出真实密码, 点击拷贝图标, 就把真实 密码粘贴输出。 对密码安全性要求较高的用户来说, 设置这三个表观密码就是给自 己的账户构筑第二道防线。 由于点击“密码”栏下面的密码框可以进入到密码对的 设置模式, 本账户的表观密码、 代换字符串和混插方式等将一览无遗, 所以给这个 修改功能设置一个认证密码是非常必要的。 一般来说, 没有必要频繁地修改密码, 使用这个功能的机会并不多, 设置一个表观密码把账户信息封存起来是很有必要的。 至于其他两个输出键的表观密码的设置, 可因人而异。 [0041]需要设置密码对的场合有两种: [0040] The authentication functions of the three pop-up password forms under the “Password” column of FIG. 4 are all optional, and the user can set them all to the apparent password of this account, or can directly enter without clicking them by clicking the password box For the setting and modification mode of the password pair, click the arrow icon to output the real password with one key, and click the copy icon to paste and output the real password. For users with high password security requirements, setting these three apparent passwords is to build a second line of defense for their accounts. Since you can enter the password pair setting mode by clicking the password box under the "Password" column, the apparent passwords, substitution strings, and mixed insertion methods of this account will be at a glance, so it is very important to set an authentication password for this modification function. necessary. In general, there is no need to change the password frequently, and there are not many opportunities to use this function. It is necessary to set up an apparent password to seal the account information. As for the setting of the apparent password of the other two output keys, it can vary from person to person. [0041] There are two situations where a password pair needs to be set:
1) 设置一个登录本软件的密码对。 其中的表观密码, 也就是主密码, 是用户唯一 必须记住的密码。 而其中的真实密码则保存在本软件中, 它是本发明中唯一需要保 存在本地的真实密码。 需要强调的是, 一定不要把主密码设置的与图 4中 “密码” 栏下的三个表观密码相同;  1) Set a password pair to log in to the software. The apparent password, which is the master password, is the only password the user must remember. The real password is stored in this software, which is the only real password in the present invention that needs to be stored locally. It should be emphasized that the master password must not be the same as the three apparent passwords under the "Password" column in Figure 4;
2) 设置一个账户的密码对。 其中的表观密码担负着图 4“密码”栏下的三个功能 的密码认证作用。 该密码对中的真实密码则是在需要输出时才立刻生成、 并实施外 部认证的密码, 且它并不保存在本软件中。 工业实用性  2) Set a password pair for an account. The apparent password is responsible for the password authentication of the three functions under the "Password" column in Figure 4. The real password in the password pair is a password that is generated immediately and needs to be externally authenticated when it needs to be output, and it is not saved in the software. Industrial applicability
[0042]本软件是实现本发明技术方案的工具, 参照上述的实施例, 就可以开发出这个 密码管理软件。 引入代换字符串的概念之后, 同时满足了认证密码的易用性和安全 性, 突破了现有技术的瓶颈, 体现了本发明在实际应用中的价值。 相比现有技术, 本发明的有益效果在于: [0042] This software is a tool for realizing the technical solution of the present invention. With reference to the above embodiments, this password management software can be developed. After introducing the concept of substitution character string, it simultaneously satisfies the ease of use and security of the authentication password, breaks through the bottleneck of the existing technology, and embodies the value of the present invention in practical applications. Compared with the prior art, the beneficial effects of the present invention are:
[0043] 1.代换字符串概念的引入, 使得键盘输入的密码与密码管理软件输出进行身份 认证的密码变成两个不同的概念, 给密码设置领域带来了崭新的思路。 在本发明中, 表观密码和真实密码之间的对应关系是独一无二的, 更重要的是, 只有在安装了本 软件的用户自己的终端机上才能为这两个密码建立起正确的联系, 在其他任何设备 上都不可能建立这种联系。 这使得表观密码成为一个不怕偷看, 不怕嗅探, 可以从 简设置而又方便使用的密码, 用户可以把一个简单而又个性化的表观密码转换成任 意复杂的真实密码。 更有应用价值的是, 当把本发明的技术方案应用到在线密码管 理的场合时, 有益效果更加突出, 因为只有在用户自己的终端机上打开的网页中登 录在线账户时, 才能建立两个密码间的正确联系, 而通过任何其他终端机上即便是 相同的网页登录相同的账户时, 即使已经破解了用户的表观密码, 都绝不可能实现 这样的正确联系, 因为那里没有中间变量的代换字符串。 除非表观密码的破解者同 时拥有了安装有本软件的用户终端机。 [0043] 1. The introduction of the substitution string concept makes the password entered by the keyboard and the password output by the password management software for identity authentication into two different concepts, bringing a brand-new idea to the field of password setting. In the present invention, the correspondence between the apparent password and the real password is unique. More importantly, the correct connection between these two passwords can only be established on the terminal of the user who installed the software. It is impossible to establish this connection on any other device. This makes the apparent password a password that is not afraid of peeping or sniffing, can be set easily and is easy to use, and users can convert a simple and personalized apparent password into an arbitrary and complex real password. What is more useful is that when the technical solution of the present invention is applied to the occasion of online password management, the beneficial effects are more prominent, because only when logging in to the online account in the web page opened on the user's own terminal can two passwords be established Correct connection between them, and when logging into the same account through the same web page on any other terminal, even if the user ’s apparent password has been cracked, it is impossible to achieve such a correct connection, because there is no substitution of intermediate variables String. Unless the cracker of the apparent password also has a user terminal with this software installed.
[0044] 2.用户必须记住的密码只有一个, 也就是主密码。 表面上看这似乎与现有技术 相同, 实际上却有着本质的区别。 现有技术的密码管理软件严重依赖主密码, 它是 软件中账户信息的唯一防线, 一旦泄露将可能波及整个账户的信息安全。 而本发明 的关键区别在于, 本软件中并不直接保存任何账户的机密信息, 即使在极端情况下, 主密码和用户的终端机同时泄露给同一个恶意用户, 还有第二道防线能保护账户信 息的安全。 这就是代换字符串不携带任何有用信息的优势及应用价值所在。 [0044] 2. There is only one password that the user must remember, that is, the master password. On the surface, this seems to be the same as the existing technology, but in fact it is essentially different. The prior art password management software relies heavily on the master password. It is the only line of defense for account information in the software. Once leaked, it may affect the information security of the entire account. The key difference of the present invention is that the confidential information of any account is not directly saved in this software, even in extreme cases, The master password and the user ’s terminal are leaked to the same malicious user at the same time, and a second line of defense can protect the security of the account information. This is where the substitution string does not carry any useful information and has the advantage and application value.
[0045] 3.在用户名 +密码的认证模式中, 用户端的弱势与无助的局面终于在本发明这 里得到了扭转, 而用户端的改善反过来又使服务端受益, 这一个优势及应用价值将 使本发明惠及更大范围的用户。  [0045] 3. In the user name + password authentication mode, the weakness and helplessness of the user end is finally reversed in the present invention, and the improvement of the user end in turn benefits the server, this advantage and application value The invention will benefit a wider range of users.
[0046] 4.本发明涉及的字符主要是 ASCI I字符, 但并不限于此。 任何语言的操作系统 能够处理和打印的字符都可以用到本发明的密码设置上, 例如 UNICODE, 甚至是中 文的偏旁部首、 日语的假名等, 进一步增加了破解密码的难度。 附图标记清单  [0046] 4. The characters involved in the present invention are mainly ASCI I characters, but are not limited thereto. Characters that can be processed and printed by operating systems in any language can be used in the password setting of the present invention, such as UNICODE, even radicals in Chinese, Japanese pseudonyms, etc., further increasing the difficulty of cracking passwords. List of reference signs
[0047] 100: 单个字符的转换原理 [0047] 100: conversion principle of a single character
[0048] 150: 一组字符的转换原理 [0048] 150: Principle of conversion of a group of characters
[0049] 152: 混插方式组合生成真实密码的流程 [0049] 152: Process of generating real password by combining combinations
[0050] 200: 密码对的设置、 修改与真实密码的输出原理 [0050] 200: Password pair setting, modification and output principle of real password
[0051] 120: “表观字符”栏 [0051] 120: column of “apparent characters”
[0052] 122: 字符表单, 将表观字符录入其中 [0052] 122: Character form, enter apparent characters into it
[0053] 124: 数字表单, 限定字符代换项、 或表观字符的个数、 或表观密码的位数 [0054] 140: “字符位数”栏 [0053] 124: digital form, limited character substitution item, or the number of apparent characters, or the number of digits of the apparent password [0054] 140: "character digits" column
[0055] 142: 字符位数下拉菜单 [0055] 142: drop-down menu of character digits
[0056] 144: 位数表单, 限定账户内所有代换字符串的总位数, 或真实密码的位数 [0056] 144: digit table, limiting the total digits of all substitution strings in the account, or the digits of the real password
[0057] 160: “代换字符串”栏 [0057] 160: "Substitution String" column
[0058] 162: 代换字符串显示栏 [0058] 162: Substitution string display column
[0059] 180: “混插方式”栏 [0059] 180: "Mixed Insertion Mode" column
[0060] 182: 混插方式的标示 [0060] 182: Indication of mixed insertion mode
[0061] 202: 账户密码框, 点击后进入密码对设置或修改模式 [0061] 202: Account password box, click to enter the password pair setting or modification mode
[0062] 204: 箭头图标, 点击后直接输出真实密码 [0063] 206: 拷贝图标, 点击后拷贝、 粘贴输出真实密码 引用文件清单 [0062] 204: arrow icon, click to output real password directly [0063] 206: Copy icon, click to copy, paste and output real password reference file list
专利文献 Patent Literature
[0064]专利文献 1 : Systems and methods for evaluating a password policy. [0064] Patent Literature 1: Systems and methods for evaluating a password policy.
United States Patent: 8769607 (Filed: January 26, 2011 ) , July 1, 2014. Jerdonet et al.  United States Patent: 8769607 (Filed: January 26, 2011), July 1, 2014. Jerdonet et al.
[0065]专利文献 2: Cloud-based active password manager. United States Patent: 9824208 (Filed: July 6, 2015) , November 21, 2017. Cavanagh et al. [0065] Patent Literature 2: Cloud-based active password manager. United States Patent: 9824208 (Filed: July 6, 2015), November 21, 2017. Cavanagh et al.
[0066]专利文献 3: Systems and methods for providing a covert password [0066] Patent Literature 3: Systems and methods for providing a covert password
manager. United States Patent: 9716706 (Filed: December 29, 2016) . July 25, 2017. Fitzgerald.  manager. United States Patent: 9716706 (Filed: December 29, 2016). July 25, 2017. Fitzgerald.
[0067]专利文献 4: Method and system for efficient password input. United States Patent: 10075430 (Filed: ) . September 2018. Guo. 非专利文献 [0067] Patent Literature 4: Method and system for efficient password input. United States Patent: 10075430 (Filed:). September 2018. Guo. Non-Patent Literature
[0068]非专利文献 1 : Shay, et al. “Correct horse battery staple : exploring the usability of system-assigned passphrases.,’ Symposium on Usable Privacy and Security (SOUPS) 2012, Jul. 11-13, 2012, pp. 1-20. [0068] Non-Patent Document 1: Shay, et al. "Correct horse battery staple: exploring the usability of system-assigned passphrases.," Symposium on Usable Privacy and Security (SOUPS) 2012, Jul. 11-13, 2012, pp . 1-20.
[0069]非专利文献 2: Li. Zhiwei, et al. “The Emperor’ s New Password [0069] Non-Patent Literature 2: Li. Zhiwei, et al. “The Emperor ’s New Password
Manager : Security Analysis of Web-based Password Managers.,’ USENIX Security Symposium. 2014. pp. 465-479.  Manager: Security Analysis of Web-based Password Managers. ’’ USENIX Security Symposium. 2014. pp. 465-479.
[0070]非专利文献 3: Dashlane, áURL: https : //www. dashlane. com/ ñ [0070] Non-Patent Literature 3: Dashlane, áURL: https://www.dashlane.com/
[0071]非专利文献 4: IPassword, áURL: https : //lpassword. com/> [0071] Non-Patent Literature 4: IPassword, áURL: https://lpassword.com/>
[0072]非专利文献 5: LastPass, áURL: https : //www. lastpass. com/> [0072] Non-Patent Literature 5: LastPass, URL: https: // www. Lastpass. Com />
[0073]非专利文献 6: Yubikey, áURL: https : //www. yubico. com/> [0074]非专利文献 7: Troy Hunt, “A brief Sony password analysis.,’ Jun. 6, 2011. áURL: https : //www. troyhunt. com/brief-sony-password-analysis/> [0073] Non-Patent Document 6: Yubikey, URL: https: // www. Yubico. Com /> [0074] Non-Patent Document 7: Troy Hunt, “A brief Sony password analysis.” Jun. 6, 2011. áURL: https://www.troyhunt.com/brief-sony-password-analysis/>
[0075]非专利文献 8: BetterBuy, “Estimating your password cracking times.,’ áURL: https : //www. betterbuys. com/ estimating-passwords-cracking-times/> [0075] Non-Patent Literature 8: BetterBuy, “Estimating your password cracking times.,’ URL: https: // www. Betterbuys.com/estimating-passwords-cracking-times/>
[0076]非专利文献 9: John Hall, “SplashData, s Top 100 Worst Passwords of 2018 ·” Dec. 13, 2018. áURL: https : //www. teamid. com/splashdatas_top-100- worst-passwords-of-2018> [0076] Non-Patent Document 9: John Hall, "SplashData, s Top 100 Worst Passwords of 2018 ·" Dec. 13, 2018. áURL: https:.. // www teamid com / splashdatas_top-100- worst-passwords-of -2018>
[0077]非专利文献 10: Grassi, et al. “Digital Identity Guideline, NIST [0077] Non-Patent Literature 10: Grassi, et al. “Digital Identity Guideline, NIST
Special Publication 800-63 ·” Jun. 22, 2017. áURL: Special Publication 800-63 · ”Jun. 22, 2017. áURL:
https : //doi. org/10. 6028/NIST. SP. 800-63-3 ñ  https: // doi. org / 10. 6028 / NIST. SP. 800-63-3 ñ
[0078]非专利文献 11 : Microsoft, “Password Must Meet Complexity [0078] Non-Patent Document 11: Microsoft, "Password Must Meet Complexity
Requirements.” Sep. 8, 2017. áURL: https : //docs. microsoft. com/en- us/windows/ security/ threat-protection/ security-policy-settings/password- must-meet-complexity-requirements>  Requirements. ”Sep. 8, 2017. áURL: https: // docs. Microsoft. Com / en- us / windows / security / threat-protection / security-policy-settings / password- must-meet-complexity-requirements>
[0079]非专利文献 12: Tayler McDowell, “The 10 Password Commandments.,’ Now. [0079] Non-Patent Document 12: Tayler McDowell, "The 10 Password Commandments." Now.
14, 2016. áURL: http : //blog. nfrontsecurity. com/2016/11/ the-10-password- commandments/>  14, 2016. áURL: http: // blog. Nfrontsecurity. Com / 2016/11 / the-10-password-commandments />
[0080]非专利文献 13: Issac Sabes, Pandora Security, “10 Commandments of Password Security.,’ áURL: https : //www. pandoralabs. net/10-commandments- of-password-security/> [0080] Non-Patent Document 13: Issac Sabes, Pandora Security, “10 Commandments of Password Security.,’ URL: https: // www. Pandoralabs. Net / 10-commandments-of-password-security />
[0081]非专利文献 14: Dennis 0, Reilly, “Keep your data safe by following the password commandments.” CNET News, Feb. 27, 2008. áURL: [0081] Non-Patent Literature 14: Dennis 0, Reilly, "Keep your data safe by following the password commandments." CNET News, Feb. 27, 2008. áURL:
https : //www. cnet. com/ news/keep-your-data-saf e-by-fol lowing-the-password- commandments/>  https: // www. cnet. com / news / keep-your-data-saf e-by-fol lowing-the-password- commandments />
[0082]非专利文献 15: Randall Stross, “A strong password isn’ t the [0082] Non-Patent Document 15: Randall Stross, “A strong password is n’t the
strongest security.,’ The New York Times, Sep. 4, 2040. áURL:  strongest security., ’The New York Times, Sep. 4, 2040. áURL:
http : //www. ny times. com/2010/09/05/business/05digi/html?scp=l&sq=passwprd &_s t_cse ñ [0083]非专利文献 16: Ives B., Walsh K. R. and Schneider H. (2004) “The Domino Effect of Password Reuse.,’ Communications of the ACM, 47 : 4, 75- 78. http: // www. ny times. com / 2010/09/05 / business / 05digi / html? scp = l & sq = passwprd & _ st _ cse ñ [0083] Non-Patent Document 16: Ives B., Walsh KR and Schneider H. (2004) "The Domino Effect of Password Reuse.," Communications of the ACM, 47: 4, 75-78.
[0084]非专利文献 17: AMP Bank Ltd. , Account access and operating terms and conditions, pp. 16-17. áURL: [0084] Non-Patent Literature 17: AMP Bank Ltd., Account access and operating terms and conditions, pp. 16-17. ÁURL:
https : //www. amp. com. au/personal/banking/ security/bank-terms-and- conditions> |  https: // www. amp. com. au / personal / banking / security / bank-terms-and- conditions> |

Claims

权利要求书 Claims
[权利要求 i][一种认证密码的生成方法, 其特征在于, 所述方法包括: 用户登录一个 基于本发明的技术方案而开发的密码管理软件, 简称为本软件; 设置所述本 软件将一个单个字符, 定义为表观字符, 转换成一个字符串, 定义为代换字 符串; 用户使用若干个所述表观字符组合成一个密码, 定义为表观密码, 并 将其中全部所述表观字符转换成一组所述代换字符串; 用户从所述本软件中 选择一种混插方式, 以此将一个所述代换字符串混合插入到前一个所述代换 字符串或前一个临时字符串上预先选定的插入点中。 依次重复这种操作, 直 到最后一个所述代换字符串混插完成, 得到一个较长字符串, 定义为真实密 码; 利用所述本软件的一键功能, 将所述代换字符串立刻组合起来、 生成真 实密码、 同时一键输出到或者拷贝粘贴到外部的密码表单中, 执行实际的身 份认证; 所述本软件提供了许多种所述混插方式, 分别用数字和字母的组合 来标示, 供用户选择使用; 将所述表观密码和所述真实密码定义为密码对。 [Claim i] [A method for generating an authentication password, characterized in that the method includes: a user logs in to a password management software developed based on the technical solution of the present invention, which is referred to as the software for short; setting the software will A single character, defined as an apparent character, is converted into a string, defined as a substitution string; the user uses several of the apparent characters to form a password, which is defined as an apparent password, and all of the Convert the concept characters into a set of the replacement character strings; the user selects a mixed interpolation method from the software to insert a replacement character string into the previous replacement character string or the previous one In the pre-selected insertion point on the temporary string. Repeat this operation in turn until the last substitution of the substitution strings is completed, and a longer string is obtained, defined as the real password; using the one-key function of the software, the substitution strings are immediately combined Get up, generate a real password, and simultaneously output or copy and paste it into an external password form with one key to perform actual identity authentication; the software provides many kinds of mixed insertion methods, which are respectively marked with a combination of numbers and letters For users to choose to use; define the apparent password and the real password as a password pair.
[权利要求 2] 根据权利要求 1所述的密码生成方法, 其特征在于, 所述本软件将一个 所述表观字符转换成所述代换字符串 (100) , 这个单字符代换项的具体操 作方法包括: [Claim 2] The password generating method according to claim 1, characterized in that the software converts one of the apparent characters into the substitution character string (100), which is a single character substitution item Specific operation methods include:
1) 在字符表单 (122) 中输入一个所述表观字符, 在下拉菜单 (142) 中选 择一个所述位数值, 所述表观字符便被转换成一个相应位数的所述代换字符 串 (162) ;  1) Enter one of the apparent characters in the character form (122) and select one of the digit values in the drop-down menu (142), and the apparent character will be converted into a substitution character with a corresponding number of digits String (162);
2) 点击所述代换字符串 (162) , 对其中的字符组合作进一步更改, 新生成 的所述代换字符串的字符位数必须等于所述下拉菜单 (142) 中的数值。  2) Click on the substitution character string (162) to further change the character group cooperation. The number of characters of the newly generated substitution character string must be equal to the value in the drop-down menu (142).
[权利要求 3] 根据权利要求 1所述的密码生成方法, 其特征在于, 设置一个所述表观 密码, 所述本软件将其中的每一个所述表观字符分别转换成一个所述代换字 符串 (150) , 而且: [Claim 3] The password generating method according to claim 1, characterized in that one of the apparent passwords is set, and the software converts each of the apparent characters into one of the substitutions String (150), and:
1) 在数字表单 (124) 中输入一个数字, 下方出现相应数目的所述单字符代 换项, 这也是所述表观密码的所述位数;  1) Enter a number in the number form (124), and the corresponding number of the single-character substitution items appears below, which is also the number of digits of the apparent password;
2) 在各个所述字符表单 (122) 中, 输入各个所述表观字符, 或点击“表观 字符”栏 (120) , 一键生成或更改全部所述表观字符;  2) In each of the character forms (122), enter each of the apparent characters, or click the "Appearance of Characters" column (120), and generate or change all of the apparent characters with one click;
3) 在位数表单 (144) 中输入一个数字, 对全部所述代换字符串的总位数进 行限定; 3) Enter a number in the digit table (144) and enter the total number of digits in all the substitution strings Line limit
4) 在每一个下拉菜单 (142) 中逐项选择所述代换字符串的所述位数, 或点 击“字符位数”栏 (140) , 一键生成或更改各个所述代换字符串的位数; 4) In each drop-down menu (142), select the number of digits of the substitution string one by one, or click the "Number of Characters" column (140) to generate or change each substitution string with one click Number of digits
5) 点击各个所述代换字符串 (162) , 对其中的所述字符组合进行修改, 或 点击“代换字符串”栏 (160) , 一键修改全部所述字符组合。 5) Click on each of the substitution character strings (162) to modify the character combinations in it, or click on the "Substitution String" column (160) and modify all the character combinations with one click.
[权利要求 4] 根据权利要求 1所述的密码生成方法, 其特征在于, 所述本软件提供了 许多种所述混插方式, 分别用 “数字 +字母” 的组合来标示, 供用户选择使 用, 每一种所述标示代表将一个所述代换字符串混合插入到前一个所述代换 字符串或临时字符串的所述插入点上去的方法和顺序。 [Claim 4] The password generating method according to claim 1, characterized in that the software provides many kinds of the mixed interpolating methods, which are respectively marked with a combination of "numbers and letters" for users to choose to use Each of the labels represents a method and sequence of mixing and inserting one substitution character string into the insertion point of the previous substitution character string or temporary character string.
[权利要求 5] 根据权利要求 4所述的密码生成方法, 其特征在于, 所述本软件提供的 第一类所述混插方式 (182) 是, 把每个所述代换字符串看作一个整体, 插 入到前一个所述代换字符串或所述临时字符串中的所述插入点上。 操作是按 照各个所述代换字符串 (162) 从上向下的顺序依次执行的, 具体方法为:[Claim 5] The method for generating a password according to claim 4, characterized in that the first type of mixed interpolation method (182) provided by the software is to treat each of the substitution character strings as As a whole, it is inserted at the insertion point in the previous substitution character string or the temporary character string. The operation is performed in order from the top to the bottom according to the replacement character string (162), and the specific method is:
1) 所述标示 (182) 中第一项的操作规则是, 在“代换字符串”栏下的第一 个所述代换字符串 (162) 上设定一个所述插入点, 将第二个所述代换字符 串作为一个整体, 按照从左向右的正序, 或者从右向左的逆序插入到所述插 入点中, 生成第一个所述临时字符串; 1) The operation rule of the first item in the label (182) is to set the insertion point on the first substitution string (162) under the “Substitution String” column, and set the insertion point The two replacement character strings as a whole are inserted into the insertion point in a positive order from left to right or in reverse order from right to left to generate the first temporary character string;
2) 所述标示 (182) 中第二项的操作规则是, 在第一个所述临时字符串上设 定第二个所述插入点, 将第三个所述代换字符串 (162) 正序或逆序地整体 插入其中, 生成第二个所述临时字符串;  2) The second rule of operation in the sign (182) is to set a second insertion point on the first temporary character string and replace the third substitution character string (162) Insert the whole in positive or reverse order to generate the second temporary character string;
3) 以此类推, 直到最后一个所述代换字符串正序或逆序地插入到前一个所 述临时字符串中, 完成了所述真实密码的设置。  3) By analogy, until the last substitution string is inserted into the previous temporary string in positive or reverse order, the setting of the real password is completed.
[权利要求 6] 根据权利要求 4所述的密码生成方法, 其特征在于, 所述本软件提供的 第二类所述混插方式是, 模仿扑克牌游戏中洗牌的方法, 把每一个所述代换 字符串交叉混合插入到前一个所述代换字符串或所述临时字符串中的所述插 入点上。 操作是按照各个所述代换字符串 (162) 的从上向下的顺序依次执 行的, 具体的所述混插方式包括但不限于如下步骤: [Claim 6] The method for generating a password according to claim 4, characterized in that the second type of the mixed insertion method provided by the software is to imitate the method of shuffling cards in a poker game, which The substitution character strings are intermixed and inserted into the insertion point in the previous substitution character string or the temporary character string. The operations are performed in order from the top to the bottom of each substitution character string (162), and the specific mixed insertion method includes but is not limited to the following steps:
1) 在第一个所述代换字符串中设定所述插入点, 将第二个所述代换字符串 按照洗牌的方式, 等间隔地正序或者逆序地插入其中, 生成第一个所述临时 字符串; 1) Set the insertion point in the first substitution character string, insert the second substitution character string at regular intervals in a positive or reverse order, and generate the first Temporary String
2) 在第一个所述临时字符串中设定第二个所述插入点, 将第三个所述代换 字符串按洗牌的方式等间隔地正序或逆序地插入其中, 生成第三个所述临时 字符串;  2) Set the second insertion point in the first temporary character string, and insert the third substitution character string in regular or reverse order at regular intervals according to the shuffle method to generate the first Three said temporary character strings;
3) 以此类推, 直到最后一个所述代换字符串插入到前一个所述临时字符串 中预设的插入点上为止, 完成了所述真实密码的设置。  3) By analogy, until the last substitution string is inserted at the preset insertion point in the previous temporary string, the setting of the real password is completed.
[权利要求 7] 根据权利要求 4所述的密码生成方法, 其特征在于, 当所述真实密码的 设置完成后, 各个所述字符位数 (142) 的组合、 各个所述代换字符串 (162) 的组合, 以及各个所述混插方式 (182) 的组合, 就都固定下来了, 并加密 保存在本软件中。 [Claim 7] The password generating method according to claim 4, characterized in that, after the setting of the real password is completed, each combination of the number of character digits (142) and each of the substitution character strings ( The combination of 162), as well as the combination of each of the mixed insertion methods (182), are fixed and encrypted and stored in the software.
[权利要求 8] 根据权利要求 4所述的密码生成方法, 其特征在于, 在所述本软件中, 将可能的所述混插方式分类, 并用 “数字 +字母” 的组合来标示, 所述混插 方式的分类包括但不限于: [Claim 8] The method for generating a password according to claim 4, characterized in that, in the software, possible mixing methods are classified and marked with a combination of "numbers and letters", The classification of mixed interpolation methods includes but is not limited to:
1) 小写拉丁字母“w”代表将一个所述代换字符串看作是一个整体, 插入到 前一个所述代换字符串或所述临时字符串中;  1) The lowercase Latin letter "w" represents that the substitution string is regarded as a whole and is inserted into the previous substitution string or the temporary string;
2) 小写字母“s”代表将一个所述代换字符串按照洗牌的方式混合插入到前 一个所述代换字符串或所述临时字符串中; 2) The lower-case letter " s " represents that one of the substitution character strings is mixed and inserted into the previous substitution character string or the temporary character string in the manner of shuffling;
3) 大写字母“P”代表所述混插方式是从左向右的正序; 大写字母“R”代 表所述混插方式是从右向左的逆序;  3) The capital letter "P" indicates that the mixed insertion method is a positive sequence from left to right; the capital letter "R" indicates that the mixed insertion method is a reverse sequence from right to left;
4) 大写字母“G”代表所述混插方式是等间隔的, 并列其后的数字代表间隔 值; 大写字母“N”代表非等间隔的, 并列其后的数字或数列对所述混插方 式作进一步的分类;  4) The capital letter "G" indicates that the mixed interpolation method is equally spaced, and the number following it represents the interval value; the capital letter "N" represents non-equally spaced, and the subsequent number or sequence of numbers is parallel to the mixed interpolation Way for further classification;
5) 各个所述混插方式的所述标示都可以在相应的下拉菜单 (182) 中逐项选 择, 也可以点击“混插方式”栏 (180) , 一键选定或更改全部所述混插方 式的所述标示。  5) The label of each of the mixed insertion modes can be selected item by item in the corresponding drop-down menu (182), or you can click the "Mixed insertion mode" column (180) to select or change all the mixed The indication of the insertion mode.
[权利要求 9] 根据权利要求 1所述的密码生产方法, 其特征在于, 有两种方法可以生 成并同时输出所述真实密码, 执行实际的外部密码认证 (200) : [Claim 9] The password production method according to claim 1, characterized in that there are two methods for generating and outputting the real password at the same time to perform actual external password authentication (200) :
1) 点击箭头图标 (204) , 弹出一个密码表单, 输入该账户的所述表观密码 通过认证后, 所述本软件立刻将相应的一组所述代换字符串 (162) 从所述 本软件的存储器中调出、 按照预设的所述混插方式组合起来生成所述真实密 码、 直接输出到外部实施密码认证。 用户可以选择不设置这个所述表观密码, 这个密码表单就不会弹出, 而是直接输出所述真实密码到外部的密码表单所 述认证; 1) Click the arrow icon (204), a password form pops up, after entering the apparent password of the account and passing the authentication, the software immediately transfers the corresponding set of substitution strings (162) from the It is called from the memory of the software, combined according to the preset mixed insertion method to generate the real password, and directly output to the outside for password authentication. The user can choose not to set the apparent password, the password form will not pop up, but directly output the real password to the external password form for authentication;
2) 点击拷贝图标 (206) , 弹出一个密码表单, 输入该账户的所述表观密码 通过认证后, 所述本软件立刻将相应的一组所述代换字符串 (162) 从所述 本软件的存储器中调出、 按照预设的所述混插方式组合起来生成所述真实密 码、 粘贴输出到外部实施密码认证。 用户可以选择不设置这个所述表观密码, 这个密码表单就不会弹出, 而是粘贴所述真实密码到外部的密码表单实施认 证。  2) Click the copy icon (206), a password form pops up, and after entering the apparent password of the account through authentication, the software immediately transfers the corresponding set of substitution strings (162) from the text It is called from the memory of the software, combined according to the preset mixed insertion mode to generate the real password, and pasted and output to the outside to implement password authentication. The user can choose not to set the apparent password, the password form will not pop up, but paste the real password into the external password form for authentication.
[权利要求 10] 根据权利要求 1所述的密码生产方法, 其特征在于, 在所述本软 件中, 设置、 修改任意一个所述密码对的具体方法有 (200) : [Claim 10] The cipher production method according to claim 1, characterized in that, in the software, the specific method of setting and modifying any one of the cipher pairs is (200):
1) 为新开账户设置所述密码对时, 点击该账户的空白密码框, 进入所述密 码对的设置模式 (152) 中, 所述密码对的设置结束并退出后, 所述空白密 码框已被一组星号填充 (202) ;  1) When setting the password pair for a newly opened account, click the blank password box of the account to enter the password pair setting mode (152). After setting the password pair and exiting, the blank password box Has been filled with a set of asterisks (202);
2) 修改一个账户的所述密码对时, 点击所述密码框 (202) , 在弹出的所述 密码表单中输入该账户的所述表观密码, 认证通过后进入所述设置模式 2) When modifying the password pair of an account, click the password box (202), enter the apparent password of the account in the pop-up password form, and enter the setting mode after authentication
(152) 中执行必要的修改; (152) implement the necessary modifications;
3) 设置登录所述本软件的所述主密码时, 将直接进入所述设置模式 (152) , 这个所述主密码是用户必须记住的。 修改所述主密码时, 在弹出的密码表单 中输入旧的所述主密码, 认证通过后进入所述设置模式 (152) 中进行修改。  3) When setting the master password for logging in to the software, it will directly enter the setting mode (152), and the master password must be remembered by the user. When modifying the master password, enter the old master password in the pop-up password form, and enter the setting mode (152) for modification after authentication.
[权利要求 11] 根据权利要求 1所述的密码生产方法, 其特征在于, 所述本软件 的存储器中将: [Claim 11] The password production method according to claim 1, characterized in that the memory of the software will:
1) 分立地存储所有的所述代换字符串;  1) Store all the substitution strings separately;
2) 存储生成所述真实密码 (152) 的各个所述字符位数 (142) 的组合, 以 及各个预设的所述混插方式 (182) 的组合;  2) Store the combination of the number of character digits (142) that generated the real password (152), and the combination of preset preset mixed insertion modes (182);
3) 存储与所述主密码对应的所述真实密码, 这是唯一存储在所述本软件中 的所述真实密码。 1  3) Store the real password corresponding to the master password, which is the only real password stored in the software. 1
PCT/IB2019/052719 2019-04-03 2019-04-03 Password generation method which simultaneously satisfies security and usability WO2020095120A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/IB2019/052719 WO2020095120A1 (en) 2019-04-03 2019-04-03 Password generation method which simultaneously satisfies security and usability
CN201980094701.7A CN113841146A (en) 2019-04-03 2019-04-03 Password generation method capable of simultaneously meeting safety and usability

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2019/052719 WO2020095120A1 (en) 2019-04-03 2019-04-03 Password generation method which simultaneously satisfies security and usability

Publications (1)

Publication Number Publication Date
WO2020095120A1 true WO2020095120A1 (en) 2020-05-14

Family

ID=70611352

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2019/052719 WO2020095120A1 (en) 2019-04-03 2019-04-03 Password generation method which simultaneously satisfies security and usability

Country Status (2)

Country Link
CN (1) CN113841146A (en)
WO (1) WO2020095120A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640446A (en) * 2022-03-25 2022-06-17 中国农业银行股份有限公司 Password peep-proof method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090249447A1 (en) * 2006-09-08 2009-10-01 Passlogy Co., Ltd. Information processing system and computer-readable recording medium
CN103678964A (en) * 2012-09-13 2014-03-26 上海斐讯数据通信技术有限公司 Mobile terminal and password input method and system
CN104091134A (en) * 2014-07-16 2014-10-08 谭皓文 Password inputting method with combination of safety and convenience
CN105844145A (en) * 2016-04-19 2016-08-10 广州三星通信技术研究有限公司 Method and equipment for managing passwords
CN106888086A (en) * 2017-02-13 2017-06-23 上海瀚之友信息技术服务有限公司 A kind of system and method for managing account number cipher

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090249447A1 (en) * 2006-09-08 2009-10-01 Passlogy Co., Ltd. Information processing system and computer-readable recording medium
CN103678964A (en) * 2012-09-13 2014-03-26 上海斐讯数据通信技术有限公司 Mobile terminal and password input method and system
CN104091134A (en) * 2014-07-16 2014-10-08 谭皓文 Password inputting method with combination of safety and convenience
CN105844145A (en) * 2016-04-19 2016-08-10 广州三星通信技术研究有限公司 Method and equipment for managing passwords
CN106888086A (en) * 2017-02-13 2017-06-23 上海瀚之友信息技术服务有限公司 A kind of system and method for managing account number cipher

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640446A (en) * 2022-03-25 2022-06-17 中国农业银行股份有限公司 Password peep-proof method and device

Also Published As

Publication number Publication date
CN113841146A (en) 2021-12-24

Similar Documents

Publication Publication Date Title
US10044689B2 (en) System and method for authenticating users
Tatlı Cracking more password hashes with patterns
US9009484B2 (en) Method and system for securing communication
US7644433B2 (en) Authentication system and method based upon random partial pattern recognition
Archana et al. Survey on usable and secure two-factor authentication
Jadhao et al. Survey on authentication password techniques
Gupta et al. Shamir's secret sharing for authentication without reconstructing password
WO2020095120A1 (en) Password generation method which simultaneously satisfies security and usability
Singh et al. Authentication and encryption in cloud computing
Gabor et al. Security issues related to e-learning education
Kato et al. Strong passwords: Practical issues
Nguyen et al. An analysis of persuasive text passwords
US11095435B2 (en) Keystroke dynamics anonimization
Yiannis Modern Password Cracking: A hands-on approach to creating an optimised and versatile attack
Brogada et al. Head and Tail Technique for Hashing Passwords
Li On Enhancing Security of Password-Based Authentication
Chhetri Novel approach towards authentication using multi level password system
Wang et al. SEIGuard: An Authentication-simplified and Deceptive Scheme to Protect Server-side Social Engineering Information Against Brute-force Attacks
Schafer et al. Password strength estimators trained on the leaked password lists
Benzekki et al. DePass: A secure hash-based authentication scheme
Vorster et al. Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design
Hamang Effective Password Cracking
Moea et al. Selecting the Honeywords from Existing User’s Passwords Using Improved Hashing and Salting Algorithm
CN103780399A (en) Timed user authentication method
Ragavan et al. A Double Layer Encryption for Communication using Cryptographic Algorithms

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19883225

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19883225

Country of ref document: EP

Kind code of ref document: A1