CN119109569A - Password generation and management method, device, computer equipment and storage medium - Google Patents
Password generation and management method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN119109569A CN119109569A CN202310637864.3A CN202310637864A CN119109569A CN 119109569 A CN119109569 A CN 119109569A CN 202310637864 A CN202310637864 A CN 202310637864A CN 119109569 A CN119109569 A CN 119109569A
- Authority
- CN
- China
- Prior art keywords
- password
- information
- encrypted
- managing
- rule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 34
- 238000000034 method Methods 0.000 claims abstract description 27
- 238000004458 analytical method Methods 0.000 claims description 12
- 230000006870 function Effects 0.000 claims description 11
- 238000000605 extraction Methods 0.000 claims description 6
- 230000008859 change Effects 0.000 description 7
- 230000008901 benefit Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000003909 pattern recognition Methods 0.000 description 2
- 238000000611 regression analysis Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000001364 causal effect Effects 0.000 description 1
- 238000007621 cluster analysis Methods 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010191 image analysis Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000002994 raw material Substances 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to the field of network security, and relates to a password generation and management method, a device, computer equipment and a storage medium, wherein the method comprises the steps of obtaining information needing encryption; extracting characteristic information according to the information to be encrypted, setting a rule for generating a password and a rule for managing the password according to the characteristic information, generating an encryption password for the information to be encrypted according to the rule for generating the password, storing the encryption password, and managing the stored encryption password according to the rule for managing the password. The method combines the characteristics of the information to be encrypted to generate the password, so that the generated password has pertinence, the protection of the information to be encrypted is enhanced, even if the password is forgotten, the memory can be restored through the characteristics of the information to be encrypted, the traditional encryption mode is separated from the basic characteristics of the information to be encrypted, and compared with the traditional encryption mode, the encryption mode is more flexible and various, and can be widely applied to the electronic field.
Description
Technical Field
The present invention relates to the field of network security technologies, and in particular, to a method and apparatus for generating and managing a password, a computer device, and a storage medium.
Background
Network security is an important issue for national security and ownership, social stability, inheritance and development of national culture. In the information age, network security moves around with national security, and has a close relationship with all other aspects of security. The network safety is not provided, the national safety is not provided, the stable operation of economy and society is not provided, and the benefits of masses are difficult to guarantee. In addition, the information has confidentiality, and under the driving of competitive market economy, each enterprise has confidentiality requirements on raw material quota, production technology, operation decision and other information in specific places and service ranges, and once the confidentiality is revealed, serious economic losses are caused for enterprises and even countries. Therefore, the method improves the security consciousness and the skills of the national network, strengthens the network security work, and is an important content of the national network security work.
For information encryption, it is common practice to just set a password. The current password setting mode includes random generation, generation by a software generation tool and the like. The current password generation mode is simple, the password is easy to leak, and once the password leaks, irrecoverable loss is caused.
Disclosure of Invention
The embodiment of the invention aims to provide a password generation and management method, a device, computer equipment and a storage medium, which are simple in a password generation mode in the prior art, and can easily cause password leakage, and once the password is leaked, the irrecoverable loss problem is caused.
In order to solve the technical problems, the invention provides a password generation and management method, which adopts the following technical scheme that the method comprises the following steps:
Acquiring information to be encrypted;
Extracting characteristic information according to the information to be encrypted;
Setting a rule for generating a password and a rule for managing the password according to the characteristic information;
generating an encryption password for the information to be encrypted according to the password generation rule;
Storing the encryption password, and managing the stored encryption password according to the rule of managing the password.
Preferably, the step of obtaining the information to be encrypted specifically includes:
And acquiring the information needing to be encrypted through a network.
Preferably, the step of extracting feature information according to the information to be encrypted specifically includes:
analyzing the information needing to be encrypted;
And obtaining one of the source address, the target address, the MAC address, the high-frequency key word and the function descriptor through the analysis result of the information needing to be encrypted.
Preferably, before the step of setting the rule for generating the password and the rule for managing the password according to the feature information, the method further comprises:
Presetting various information block characteristics, and rules for generating passwords and rules for managing passwords corresponding to the various information block characteristics.
Preferably, the step of storing the encryption password and managing the stored encryption password according to the rule of managing the encryption password specifically includes:
storing the encrypted password in a ciphertext manner;
And updating and storing the stored encryption passwords regularly according to the rules for managing the passwords. Preferably, after the step of storing the password and managing the stored password according to the rule for managing the password, the method further comprises:
the password is stored into a blockchain.
In order to solve the technical problems, the invention also provides a password generation and management device, which adopts the following technical scheme that:
The acquisition module is used for acquiring information needing encryption;
the extraction module is used for extracting characteristic information according to the information needing to be encrypted;
the rule module is used for setting rules for generating passwords and rules for managing the passwords according to the characteristic information;
the generation module is used for generating an encryption password for the information to be encrypted according to the password generation rule;
And the management module is used for storing the encryption passwords and managing the stored encryption passwords according to the rules of the management passwords.
Preferably, the extraction module comprises:
the analysis module is used for analyzing the information needing to be encrypted;
And the feature extraction module is used for acquiring one of the source address, the target address, the MAC address, the high-frequency keyword and the function descriptor through the analysis result of the information to be encrypted.
In order to solve the technical problem, the invention also provides a computer device, which adopts the technical scheme that the computer device comprises a memory and a processor, wherein the memory stores computer readable instructions, and the processor realizes the steps of the password generation and management method when executing the computer readable instructions.
In order to solve the technical problem, the present invention further provides a computer readable storage medium, which adopts the technical scheme that the computer readable storage medium stores computer readable instructions, and the computer readable instructions implement the steps of the password generation and management method when being executed by a processor.
Compared with the prior art, the method has the advantages that the information to be encrypted is obtained, then the characteristic information is extracted according to the information to be encrypted, then the rule for generating the password and the rule for managing the password are set according to the characteristic information, the encryption password is generated for the information to be encrypted according to the rule for generating the password, finally the encryption password is stored, and the stored encryption password is managed according to the rule for managing the password, and the password is generated according to the characteristic of the information to be encrypted, so that the generated password has pertinence, the protection of the information to be encrypted is enhanced, even if the password is forgotten, the memory can be restored through the characteristic of the information to be encrypted, the traditional encryption mode is separated from the basic characteristic of the information to be encrypted, and compared with the traditional encryption mode, the encryption mode is more flexible and various, and can be widely applied to the electronic field.
Drawings
In order to more clearly illustrate the solution of the present invention, a brief description will be given below of the drawings required for the description of the embodiments of the present invention, it being apparent that the drawings in the following description are some embodiments of the present invention, and that other drawings may be obtained from these drawings without the exercise of inventive effort for a person of ordinary skill in the art.
FIG. 1 is a flow chart of one embodiment of a password generation and management method of the present invention;
FIG. 2 is a schematic diagram of an embodiment of a password generation and management apparatus of the present invention;
FIG. 3 is a schematic diagram of the architecture of one embodiment of a computer device of the present invention.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, the terms used in the description herein are used for the purpose of describing particular embodiments only and are not intended to limit the invention, and the terms "comprising" and "having" and any variations thereof in the description of the invention and the claims and the above description of the drawings are intended to cover non-exclusive inclusions. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the invention. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to make the person skilled in the art better understand the solution of the present invention, the technical solution of the embodiment of the present invention will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that, the password generation and management method provided by the embodiment of the present invention is generally executed by a server/terminal device, and accordingly, the password generation and management apparatus is generally disposed in the server/terminal device.
It should be understood that the number of terminal devices, networks and servers is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Example 1
With continued reference to FIG. 1, a flow chart of one embodiment of a password generation and management method of the present invention is shown. The password generation and management method comprises the following steps:
and S1, acquiring information needing encryption.
In this embodiment, the electronic device (e.g., the server/terminal device shown in fig. 1) on which the password generation and management method operates may receive the password generation and management request through a wired connection manner or a wireless connection manner. It should be noted that the wireless connection may include, but is not limited to, 3G/4G/5G connections, wiFi connections, bluetooth connections, wiMAXX connections, zigbee connections, UWB (ultrawideband) connections, and other now known or later developed wireless connection means.
The information to be encrypted can be various mailboxes, such as qq mailboxes, 163 mailboxes, fox-searching mailboxes, enterprise mailboxes and the like, and can also be a piece of information block, such as a piece of software code, a hardware circuit diagram, a software function module, a test case or a plurality of test cases and the like.
The step S1 specifically comprises the step of acquiring information needing encryption through a network.
Information to be encrypted is acquired through a network by a terminal device, a server, or the like that performs the password generation and management method. In some optional implementations of this embodiment, information related to the information that needs to be encrypted may be set through a configuration file. The related information may be url sources of information requiring encryption, or MAC address sources, or various mailbox information, etc.
And S2, extracting characteristic information according to the information which is encrypted as required.
In this embodiment, step S2 may further include the steps of:
S21, analyzing the information needing encryption.
And analyzing the acquired information needing to be encrypted. In some alternative implementations of the present embodiment, an attempt is made to open a configuration file associated with the information to be encrypted, and a url source, a MAC address source, or various mailbox information, etc. of the information to be encrypted is obtained from the configuration file. If the configuration file is failed to be opened, the information itself to be encrypted is analyzed, for example, python can be adopted to analyze the data. Firstly, the information to be encrypted can be divided into different parts and types, and the characteristics of the information can be mined through further analysis, such as text information, picture information, audio information, video information or a combination of various information. After classification, regression analysis, cluster analysis, similarity matching, statistical description and the like can be further performed.
Regression analysis, namely determining causal relation between variables by defining dependent variables and independent variables, establishing a regression model, solving each parameter of the model according to measured data, evaluating whether the regression model can fit the measured data well, and if so, carrying out further prediction according to the independent variables. The data clustering is used for static data analysis, including machine learning, data mining, pattern recognition, image analysis, biological information and the like, and can be combined with the prior art for clustering analysis, and the description is omitted. The similarity matching is to calculate the similarity degree of two data by a certain method, and the similarity degree is usually measured by a percentage. The similarity algorithm may be used in a variety of scenarios, such as recommendation statistics, automatic scoring systems, and the like. The statistical description refers to that according to the characteristics of data, a certain statistical index and index system are used for indicating the information fed back by the data, and the statistical description is the basic processing work for analyzing the data.
And after analyzing the information needing to be encrypted, generating an analysis result. The purpose of analyzing the information to be encrypted is to acquire information characteristics, and then the information is encrypted in a targeted manner according to the information characteristics to generate a password, so that the password is convenient to memorize. Even if the password is forgotten, the information needing to be encrypted can be referred to, so that the password can be reproduced, and the memory is facilitated.
S22, obtaining one of the source address, the target address, the MAC address, the high-frequency key word and the function descriptor through the analysis result of the information needing to be encrypted.
In some alternative implementations of the present embodiment, the parsing result includes information categories such as text, pictures, audio, video, or any combination of these categories. If the text is the text, extracting the specific content of the text, and if the picture is the picture, adopting a pattern recognition mode in the prior art to recognize the picture, acquiring the content related to the picture and storing the content. If the audio is the audio, the audio is stored in a text mode by combining the audio identification mode in the prior art. If the video is the video, analyzing the video by combining a video decoding mode in the prior art, acquiring video content and generating text information.
For the analysis result, key information, such as one of source address, destination address, MAC address, high-frequency key word and function descriptor, of the information to be encrypted is extracted. If the analysis result contains a plurality of types of information among these feature information, it is possible to acquire the combination information such as the source address, the destination address, the MAC address, the high-frequency key, and the function descriptor.
And step S3, setting rules for generating passwords and rules for managing the passwords according to the characteristic information.
In this embodiment, the rule for generating the password may be generated by a password generating tool according to the feature information, or may be set according to the feature information only. For example, if the characteristic information is url address. A password generation tool may be used, along with url information to generate the password. For example, if under Linux, this may be accomplished using a command that randomly generates a password. Commands for randomly generating the password include mkpasswd commands, apg commands, etc. mkpasswd the command can set the complexity of generating the password, which can not only randomly generate the password, but also directly modify the account password. The parameter "-l" of mkpasswd is the length of the defined generated password, defaults to 9, the parameter "-d" defines the minimum number of digits contained in the password, defaults to 2, the parameter "-C" defines the minimum number of lowercase letters contained in the password, defaults to 2, the parameter "-C" defines the minimum number of uppercase letters contained in the password, and the parameter "-s" defines the minimum number of special characters contained in the password, defaults to 1. After the command mkpasswd generates a password with a specified length, such as "D3a5b@Cde", the characters in url such as www.163.com, including 3 w, numbers 1, 6 and 3 and letters c, o and m, can be extracted and randomly scattered in the password with the specified length, for example, "w1D3c6a5bo@w3Cmde".
The parameter "-m" of the apg command is the minimum length defining the generated password, defaulting to 8, which may be exceeded by the actual generated random password. After generating the random password according to the apg command parameters, the characters in url such as www.163.com can be extracted, wherein 3 w, numbers 1, 6 and 3 and letters c, o and m are randomly scattered in the password with the specified length.
The url information may be scattered in the random generated password, and a rule for scattering insertion may be set, for example, the url information may be inserted in the head of the random generated password, the tail of the random generated password, or the middle of the random generated password, or the url information may be scattered in the random generated password.
If the non-url information is not url information, for other characteristic information, such as a target address, a MAC address, a high-frequency keyword, a function descriptor, etc., the target address, the MAC address, the high-frequency keyword, the function descriptor, etc., may be set in the head, the tail, the middle or randomly in the random password when the password is generated.
When setting the password, in order to avoid that the set password is too simple to be cracked, some prompts can be carried out, for example, the password cannot be completely consistent with the login name, the password cannot be completely identical with any one of a telephone, a fax number, a mobile phone number, a postal code and the like in the contact way, the password cannot use continuous increment numbers or decremental numbers, the password cannot use continuous and case-consistent sequence or reverse-order English characters, the password cannot use continuous identical characters or numbers and the like.
The rules for managing the passwords comprise the frequency of password updating, the password storage mode, the password deleting rule, the password changing rule and the like. The frequency of the password update may be set according to the importance of the password, and may be, for example, one week, one ten days, one month, one quarter, or the like. The password storage mode can be plaintext storage or ciphertext storage, and for safety, the plaintext password is stored in an encryption mode, so that the password leakage is prevented. The rule of deleting the password may be a trigger condition for deleting the password, for example, the password bound to the current account may be deleted when the user account is in a pin number, the user account is changed, or the like. The rule of the password change can be when the user account number changes or the user actively sets to change the password, etc.
And S4, generating an encryption password for the information to be encrypted according to the password generation rule.
And generating an encryption password for the information to be encrypted according to the password generation rule of the step S3.
In some optional implementations of the present embodiment, before step S4, the method may further include the steps of:
presetting various information block characteristics, and generating rules and managing rules of passwords corresponding to the various information block characteristics.
The basic characteristics of the data include capacity, the size of the data determining the value and potential information of the data under consideration, variety, diversity of data types, such as text, video, audio, pictures, etc., speed, variability, which means the speed of obtaining the data, which hinders the process of processing and effectively processing the data, authenticity, which means the quality of the data, such as documentaries, disciplines, novels, movies, etc., created from reality, complexity, large data volume, multiple sources, which sources have, etc., value, rationally use large data, create high value at low cost, etc. The structure of the data may include structured, semi-structured, and unstructured.
The preset various information block features can include data capacity, data type, documentaries, disciplines, novels, television shows, movies, etc. The rules of generating the password in advance, which are adapted to the data capacity, the data type, the documentaries, the disciplines, the novels, the television dramas, the movies and the like, can be that the random password or the custom password is generated by respectively using the data capacity information, the data type information, the documentaries names, the discipline literature names, the novel names, the television dramas names, the movies names and the like as keywords. The rules of preset management passwords suitable for data capacity, data type, documentaries, discipline, novels, television shows, movies and the like can be rules of setting password update frequency, password storage mode, password deletion, password change and the like according to the activity degree of the information quick characteristics. For information fast features with low activity such as data capacity, data type, documentaries, discipline literature and the like, the password refreshing frequency can be set to be lower, for example, a quarter, half year or a year and the like, and for information fast features with high activity such as television dramas, movies and the like, the password refreshing frequency can be set to be higher, for example, one week, one month and the like. The password storage mode can be plaintext storage or ciphertext storage, and for safety, the plaintext password is stored in an encryption mode, so that the password leakage is prevented. The rule of deleting the password may be a trigger condition for deleting the password, for example, the password bound to the current account may be deleted when the user account is in a pin number, the user account is changed, or the like. The rule of the password change can be when the user account number changes or the user actively sets to change the password, etc.
Step S5, the encryption password is stored, and the stored encryption password is managed according to the rule of managing the password.
In some alternative implementations of the present embodiment, step S5 may further perform the following steps:
s51, storing the encryption password in a ciphertext mode.
The ciphertext is a message for encrypting the plaintext password, is output after a certain camouflage or change is applied to the plaintext password, and can be understood as characters or bit sets which cannot be directly understood, but the disturbed information can be restored through an algorithm, and is opposite to the plaintext.
Ciphertext is a message generated by a password generation tool. If the message is converted, i.e. decrypted, without the instruction of the message receiver, then the message cannot be understood by others, and the purpose is to ensure the confidentiality of the password. The cipher may be encrypted using existing encryption software such as encryption locks, 360 encryption, an Simi messages, etc., to generate the cipher text and stored.
For information security, the location where the ciphertext is stored may be allocated by a person having a certain authority.
And S52, updating and storing the stored encryption passwords at regular time according to rules for managing the passwords.
And updating and storing the stored encrypted password at regular time according to the rule for managing the password, so as to ensure the life cycle of the password.
In order to manage the password more safely, the whole life cycle of the password can be followed, and a database for carrying out life cycle follow-up on the password is established, wherein the database comprises the steps of password creation, creation mode, encryption process of the password, password change, password deletion, password update, password decryption and the like. Thus, the full life cycle of the password can be conveniently known. If the password is leaked, the password leakage risk in what link can be conveniently analyzed, experience training can be absorbed, the password is prevented from being happened, and the information needing to be encrypted is more safely ensured.
It is emphasized that to further ensure the privacy and security of the cryptographic information, the cryptographic information may also be stored in a node of a blockchain.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The blockchain (Blockchain), essentially a de-centralized database, is a string of data blocks that are generated in association using cryptographic methods, each of which contains information from a batch of network transactions for verifying the validity (anti-counterfeit) of its information and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The method has the advantages that the information to be encrypted is obtained, then the characteristic information is extracted according to the information to be encrypted, then the rule for generating the password and the rule for managing the password are set according to the characteristic information, the encryption password is generated for the information to be encrypted according to the rule for generating the password, finally the encryption password is stored, the stored encryption password is managed according to the rule for managing the password, the characteristics of the information to be encrypted are combined, the generation password is generated, the generated password has pertinence, the protection of the information to be encrypted is enhanced, even if the password is forgotten, the memory can be restored through the characteristics of the information to be encrypted, the traditional encryption mode is separated from the basic characteristics of the information to be encrypted, and compared with the traditional encryption mode, the encryption mode is more flexible and various, and can be widely applied to the electronic field.
The invention is operational with numerous general purpose or special purpose computer system environments or configurations. Such as a personal computer, a server computer, a hand-held or portable device, a tablet device, a multiprocessor system, a microprocessor-based system, a set top box, a programmable consumer electronics, a network PC, a minicomputer, a mainframe computer, a distributed computing environment that includes any of the above systems or devices, and the like. The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by computer readable instructions stored in a computer readable storage medium that, when executed, may comprise the steps of the embodiments of the methods described above. The storage medium may be a nonvolatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a random access Memory (RandomAccessMemory, RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
Example two
With further reference to fig. 2, as an implementation of the method shown in fig. 1, the present invention provides an embodiment of a password generation and management apparatus, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 1, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 2, the password generating and managing apparatus 60 of the present embodiment includes an obtaining module 61, an extracting module 62, a rule module 63, a generating module 64, and a managing module 65. Wherein:
an acquisition module 61 for acquiring information to be encrypted;
an extracting module 62, configured to extract feature information according to information encrypted as needed;
A rule module 63 for setting a rule for generating a password and a rule for managing the password according to the feature information;
a generating module 64, configured to generate an encryption password for the information to be encrypted according to a rule of generating the password;
the management module 65 is configured to store the encrypted password, and manage the stored encrypted password according to a rule of managing the password.
In some optional implementations of the present embodiment, the extracting module 62 further includes a parsing module 621, a feature extracting module 622, where the parsing module 621 is configured to parse information to be encrypted, and the feature extracting module 622 is configured to obtain, from a result of parsing the information to be encrypted, information of one of a source address, a destination address, a MAC address, a high-frequency keyword, and a function descriptor.
The method has the advantages that the information to be encrypted is obtained, then the characteristic information is extracted according to the information to be encrypted, then the rule for generating the password and the rule for managing the password are set according to the characteristic information, the encryption password is generated for the information to be encrypted according to the rule for generating the password, finally the encryption password is stored, the stored encryption password is managed according to the rule for managing the password, and the password is generated by combining the characteristics of the information to be encrypted, so that the generated password has pertinence, the protection of the information to be encrypted is enhanced, even if the password is forgotten, the memory can be restored through the characteristics of the information to be encrypted, the traditional encryption mode is separated from the basic characteristics of the information to be encrypted, and compared with the traditional encryption mode, the encryption mode is more flexible and various, and can be widely applied to the electronic field.
Example III
In order to solve the technical problems, the embodiment of the invention also provides computer equipment. Referring specifically to fig. 3, fig. 3 is a basic structural block diagram of a computer device according to the present embodiment.
The computer device 7 includes a memory 71, a processor 72, and a network interface 73 communicatively coupled to each other via a system bus. It is noted that only the computer device 7 with the component memory 71, the processor 72 and the network interface 73 is shown in the figures, but it is understood that not all the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that a computer device herein is a device capable of automatically performing numerical calculations and/or information processing in accordance with predetermined or stored instructions, the hardware of which includes, but is not limited to, microprocessors, application specific integrated circuits (ApplicationSpecificIntegratedCircuit, ASIC), programmable gate arrays (Field-ProgrammableGateArray, FPGA), digital processors (DigitalSignalProcessor, DSP), embedded devices, and the like.
The computer device may be a desktop computer, a notebook computer, a palm computer, a cloud server, or the like. The computer equipment can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 71 includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 71 may be an internal storage unit of the computer device 7, such as a hard disk or a memory of the computer device 7. In other embodiments, the memory 71 may also be an external storage device of the computer device 7, such as a plug-in hard disk, a smart memory card (SMARTMEDIACARD, SMC), a secure digital (SecureDigital, SD) card, a flash memory card (FLASHCARD) or the like, which are provided on the computer device 7. Of course, the memory 71 may also include both the internal storage unit of the computer device 7 and its external storage device. In this embodiment, the memory 71 is generally used for storing an operating system and various application software installed on the computer device 7, such as computer readable instructions of a password generation and management method. In addition, the above-described memory 71 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 72 may be a central processing unit (CentralProcessingUnit, CPU), a controller, a microcontroller, a microprocessor, or other data processing chip in some embodiments. The processor 72 is typically used to control the overall operation of the computer device 7 described above. In this embodiment, the processor 72 is configured to execute computer readable instructions stored in the memory 71 or process data, such as computer readable instructions for executing the password generation and management method.
The network interface 73 may comprise a wireless network interface or a wired network interface, which network interface 73 is typically used for establishing a communication connection between the computer device 7 and other electronic devices.
The method has the advantages that the password is generated by combining the characteristics of the information to be encrypted, so that the generated password has pertinence, the protection of the information to be encrypted is enhanced, even if the password is forgotten, the memory can be restored through the characteristics of the information to be encrypted, the traditional encryption mode is separated from the basic characteristics of the information to be encrypted, and compared with the traditional encryption mode, the encryption mode is more flexible and diversified and can be widely applied to the electronic field.
Example IV
The present invention also provides another embodiment, namely, a computer-readable storage medium, where computer-readable instructions are stored, where the computer-readable instructions are executable by at least one processor to cause the at least one processor to perform the steps of the password generation and management method as described above.
The method has the advantages that the password is generated by combining the characteristics of the information to be encrypted, so that the generated password has pertinence, the protection of the information to be encrypted is enhanced, even if the password is forgotten, the memory can be restored through the characteristics of the information to be encrypted, the traditional encryption mode is separated from the basic characteristics of the information to be encrypted, and compared with the traditional encryption mode, the encryption mode is more flexible and diversified and can be widely applied to the electronic field.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods of the embodiments of the present invention.
It is apparent that the above-described embodiments are only some embodiments of the present invention, but not all embodiments, and the preferred embodiments of the present invention are shown in the drawings, which do not limit the scope of the patent claims. This invention may be embodied in many different forms, but rather, embodiments are provided in order to provide a thorough and complete understanding of the present disclosure. Although the invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing description, or equivalents may be substituted for elements thereof. All equivalent structures made by the content of the specification and the drawings of the invention are directly or indirectly applied to other related technical fields, and are also within the scope of the invention.
Claims (10)
1. The password generation and management method is characterized by comprising the following steps:
Acquiring information to be encrypted;
Extracting characteristic information according to the information to be encrypted;
Setting a rule for generating a password and a rule for managing the password according to the characteristic information;
generating an encryption password for the information to be encrypted according to the password generation rule;
Storing the encryption password, and managing the stored encryption password according to the rule of managing the password.
2. The method for generating and managing a password according to claim 1, wherein the step of obtaining the information to be encrypted specifically comprises:
And acquiring the information needing to be encrypted through a network.
3. The method for generating and managing a password according to claim 1, wherein the step of extracting the feature information according to the information to be encrypted specifically comprises:
analyzing the information needing to be encrypted;
And obtaining one of the source address, the target address, the MAC address, the high-frequency key word and the function descriptor through the analysis result of the information needing to be encrypted.
4. The password generation and management method according to claim 1, comprising, before the step of setting a rule for generating a password and a rule for managing a password according to the characteristic information:
Presetting various information block characteristics, and rules for generating passwords and rules for managing passwords corresponding to the various information block characteristics.
5. The method for generating and managing a password according to claim 1, wherein the step of storing the encrypted password and managing the stored encrypted password according to the rule for managing a password specifically comprises:
storing the encrypted password in a ciphertext manner;
And updating and storing the stored encryption passwords regularly according to the rules for managing the passwords.
6. The password generation and management method according to claim 5, further comprising, after the step of storing the password and managing the stored password in accordance with the rule for managing the password:
the password is stored into a blockchain.
7. A password generation and management apparatus, comprising:
The acquisition module is used for acquiring information needing encryption;
the extraction module is used for extracting characteristic information according to the information needing to be encrypted;
the rule module is used for setting rules for generating passwords and rules for managing the passwords according to the characteristic information;
the generation module is used for generating an encryption password for the information to be encrypted according to the password generation rule;
And the management module is used for storing the encryption passwords and managing the stored encryption passwords according to the rules of the management passwords.
8. The password generation and management apparatus according to claim 7, wherein the extraction module comprises:
the analysis module is used for analyzing the information needing to be encrypted;
And the feature extraction module is used for acquiring one of the source address, the target address, the MAC address, the high-frequency keyword and the function descriptor through the analysis result of the information to be encrypted.
9. A computer device comprising a memory having stored therein computer readable instructions which when executed by a processor implement the steps of the password generation and management method of any of claims 1 to 6.
10. A computer readable storage medium having stored thereon computer readable instructions which when executed by a processor implement the steps of the password generation and management method of any of claims 1 to 6.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310637864.3A CN119109569A (en) | 2023-05-31 | 2023-05-31 | Password generation and management method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310637864.3A CN119109569A (en) | 2023-05-31 | 2023-05-31 | Password generation and management method, device, computer equipment and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN119109569A true CN119109569A (en) | 2024-12-10 |
Family
ID=93708815
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202310637864.3A Pending CN119109569A (en) | 2023-05-31 | 2023-05-31 | Password generation and management method, device, computer equipment and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN119109569A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119766553A (en) * | 2024-12-27 | 2025-04-04 | 中电信量子科技有限公司 | Dynamic cloud password card data processing method, electronic equipment and storage medium |
-
2023
- 2023-05-31 CN CN202310637864.3A patent/CN119109569A/en active Pending
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119766553A (en) * | 2024-12-27 | 2025-04-04 | 中电信量子科技有限公司 | Dynamic cloud password card data processing method, electronic equipment and storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111414407B (en) | Database data query method and device, computer equipment and storage medium | |
| CN110602052B (en) | Micro-service processing method and server | |
| US11316669B2 (en) | Audit result data storage method and device, audit result data query method and device, and audit item storage method and device | |
| CN110610196B (en) | Desensitization method, system, computer device and computer readable storage medium | |
| CN110263585A (en) | Test supervision method, device, equipment and storage medium | |
| CN111680477B (en) | Method, device, computer equipment and storage medium for exporting electronic spreadsheet files | |
| CN113709181A (en) | Website login method, device, equipment and storage medium based on browser plug-in | |
| CN110532165B (en) | Application program installation package characteristic detection method, device, equipment and storage medium | |
| CN112286815A (en) | Interface test script generation method and related equipment thereof | |
| CN114218322A (en) | Data display method, device, equipment and medium based on ciphertext transmission | |
| CN112328486A (en) | Interface automation test method and device, computer equipment and storage medium | |
| CN115208579A (en) | Authentication method, device, service system access method, device and storage medium | |
| CN114626352A (en) | Report automatic generation method and device, computer equipment and storage medium | |
| CN119109569A (en) | Password generation and management method, device, computer equipment and storage medium | |
| CN110727576A (en) | Web page testing method, device, equipment and storage medium | |
| CN116450745B (en) | Multi-device-based note file operation method, system and readable storage medium | |
| CN115618391A (en) | Information processing method, information processing device, computer equipment and storage medium | |
| CN115001768A (en) | Data interaction method, device and equipment based on block chain and storage medium | |
| CN119848636B (en) | A method and system for identifying and tracing scientific and technological data throughout the entire life cycle | |
| CN117453225B (en) | News stream generation method, device, equipment and medium | |
| CN121502824A (en) | A method, apparatus, device, product, and medium for protecting privacy of prompt words. | |
| HK40075321A (en) | Authentication method and apparatus, business system joining method and apparatus, and storage medium | |
| CN117635146A (en) | Account management method, account management device, computer equipment and storage medium | |
| Sonawane et al. | Enriching Trustworthy trade in Decentralized system using Blockchain | |
| CN119719104A (en) | Method, device, equipment and storage medium for storing and reading multi-level data |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |