Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In account password management in an enterprise application scene, requirements for login accounts and password complexity of different platforms are different, meanwhile, account password modification is required at regular intervals based on safety compliance consideration, and related personnel need to be informed.
Embodiments of the invention are described in detail below with reference to the accompanying drawings:
fig. 1 is a flowchart of an account password management method of the present invention, and please refer to fig. 1, the account password management method of the present invention includes the following steps:
s1: recording an account and password information of an application scene, and performing first authorized login of the application scene according to the recorded account and password information.
In specific implementation, an application scenario, such as an account and a password of a website, is recorded, and after recording, the website is authorized to log in according to the recorded account and password, that is, the first authorized login is completed.
In the specific implementation, the method is suitable for any system or website which needs account password login authentication, and is particularly suitable for application scenarios in which the number of users is large, standardized management is needed, the requirement on safety is high, password modification needs to be performed regularly or irregularly, and related personnel need to be notified in an internal work scenario. In the specific implementation, various public cloud providers used by enterprises are increasing day by day, the requirements for the complexity of login accounts and passwords of the public cloud providers are different, and the method is particularly suitable for the environment of the enterprise public cloud.
S2: after the first authorized login is completed, when non-first login is performed in the application scene, jump login is directly performed according to the recorded account and password information.
In the specific implementation, after the account number and password information of the website is recorded and the first login authorization is completed on the trusted device by the method, the login of the corresponding website can be completed only by performing skip login verification once when the login website is accessed later.
S3: and modifying the password according to a preset rule, and recording the modified password.
Optionally, the application scene interface is called to modify the password according to the preset rule, and the modified password is recorded.
Optionally, according to the preset rule, the password is modified through simulating automatic login, and the modified password is recorded.
In specific implementation, after a rule for regularly modifying the account password is configured, according to a preset password rule and a preset password life cycle, a target website interface is periodically called or automatic login and other methods are simulated to modify and update the password, and after the password is successfully modified, the password is automatically updated to a password management system and login authorization information is updated. Optionally, the password rule may be a character type composition and a length of the password, and in a specific implementation, a compliance password rule meeting a user requirement may be defined at will. Optionally, the password life cycle may be set to be a random cycle at regular intervals or within a certain range, and in a specific implementation, the compliance password life cycle meeting the requirements of the user may be defined arbitrarily.
S4: and notifying the modified password.
Optionally, the modified password is notified through an information channel in a form of a ciphertext, and a decryption method of the ciphertext is notified through another information channel.
In specific implementation, the account password updating condition and the encrypted account password information are sent to a designated person through a mail, the decryption mode and the information of the account password are sent to another mailbox or sent to the designated person through a short message, and the updated account password plaintext information can be obtained through the decryption information. In the specific implementation, any information channel capable of meeting the information sending requirement can be selected, such as the notification of WeChat or enterprise WeChat.
In a specific implementation, when the password and the decryption information are encrypted and sent, the selected encryption mode may be any user-defined encryption mode, or may be encrypted by using any existing encryption algorithm, and optionally, if the encryption algorithm is used for encryption, the selected encryption algorithm is a lightweight encryption algorithm suitable for the method.
According to the account password management method provided by the embodiment of the application, the situation that after the password of the managed account reaches a certain order of magnitude, a large amount of time is spent on manually modifying the account password and notifying operation is avoided, meanwhile, the situation that the password of the used website account is not accessed any more and is not maintained by people can be well avoided, and the security and the compliance of the account password can be enhanced through automatic and periodic password updating.
It should be noted that the steps illustrated in the above-described flow diagrams or in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and that, although a logical order is illustrated in the flow diagrams, in some cases, the steps illustrated or described may be performed in an order different than here.
The embodiment of the application provides an account password management system, which is suitable for the account password management method. As used below, the terms "unit," "module," and the like may implement a combination of software and/or hardware of predetermined functions. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware or a combination of software and hardware is also possible and contemplated.
Fig. 2 is a block diagram of an account password management system according to the present invention, please refer to fig. 2, which includes:
the authorization verification unit 1: recording an account and password information of an application scene, and performing first authorized login of the application scene according to the recorded account and password information.
In specific implementation, an application scenario, such as an account and a password of a website, is recorded, and after recording, the website is authorized to log in according to the recorded account and password, that is, the first authorized login is completed.
In the specific implementation, the method is suitable for any system or website which needs account password login authentication, and is particularly suitable for application scenarios in which the number of users is large, standardized management is needed, the requirement on safety is high, password modification needs to be performed regularly or irregularly, and related personnel need to be notified in an internal work scenario. In the specific implementation, various public cloud providers used by enterprises are increasing day by day, the requirements for the complexity of login accounts and passwords of the public cloud providers are different, and the method is particularly suitable for the environment of the enterprise public cloud.
Jump login unit 2: after the first authorized login is completed, when non-first login is performed in the application scene, jump login is directly performed according to the recorded account and password information.
In specific implementation, after account and password information of a website is recorded and first login authorization is completed on a trusted device through an account and password management system, login of the corresponding website can be completed only by performing skip login verification once when the login website is accessed later.
Password modification unit 3: and modifying the password according to a preset rule, and recording the modified password.
Optionally, the application scene interface is called to modify the password according to the preset rule, and the modified password is recorded.
Optionally, according to the preset rule, the password is modified through simulating automatic login, and the modified password is recorded.
In specific implementation, after a rule for regularly modifying the account password is configured, according to a preset password rule and a preset password life cycle, a target website interface is periodically called or automatic login and other methods are simulated to modify and update the password, and after the password is successfully modified, the password is automatically updated to a password management system and login authorization information is updated. Optionally, the password rule may be a character type composition and a length of the password, and in a specific implementation, a compliance password rule meeting a user requirement may be defined at will. Optionally, the password life cycle may be set to be a random cycle at regular intervals or within a certain range, and in a specific implementation, the compliance password life cycle meeting the requirements of the user may be defined arbitrarily.
The update notification unit 4: and notifying the modified password.
Optionally, the modified password is notified through an information channel in a form of a ciphertext, and a decryption method of the ciphertext is notified through another information channel.
In specific implementation, the account password updating condition and the encrypted account password information are sent to a designated person through a mail, the decryption mode and the information of the account password are sent to another mailbox or sent to the designated person through a short message, and the updated account password plaintext information can be obtained through the decryption information. In the specific implementation, any information channel capable of meeting the information sending requirement can be selected, such as the notification of WeChat or enterprise WeChat.
In a specific implementation, when the password and the decryption information are encrypted and sent, the selected encryption mode may be any user-defined encryption mode, or may be encrypted by using any existing encryption algorithm, and optionally, if the encryption algorithm is used for encryption, the selected encryption algorithm is a lightweight encryption algorithm suitable for the system.
In addition, an account password management method described in conjunction with fig. 1 may be implemented by an electronic device. Fig. 3 is a block diagram of an electronic device of the present invention.
The electronic device may comprise a processor 61 and a memory 62 in which computer program instructions are stored.
Specifically, the processor 61 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 62 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 62 may include a Hard Disk Drive (Hard Disk Drive, abbreviated HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 62 may include removable or non-removable (or fixed) media, where appropriate. The memory 62 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 62 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, Memory 62 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), Electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory 62 may be used to store or cache various data files that need to be processed and/or used for communication, as well as possible computer program instructions executed by the processor 61.
The processor 61 reads and executes computer program instructions stored in the memory 62 to implement any one of the account password management methods in the above embodiments.
In some of these embodiments, the electronic device may also include a communication interface 63 and a bus 60. As shown in fig. 3, the processor 61, the memory 62, and the communication interface 63 are connected via a bus 60 to complete communication therebetween.
The communication port 63 may be implemented with other components such as: the data communication is carried out among external equipment, image/data acquisition equipment, a database, external storage, an image/data processing workstation and the like.
The bus 60 includes hardware, software, or both to couple the components of the electronic device to one another. Bus 60 includes, but is not limited to, at least one of the following: data Bus (Data Bus), Address Bus (Address Bus), Control Bus (Control Bus), Expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example, and not limitation, Bus 60 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (FSB), a Hyper Transport (HT) Interconnect, an ISA (ISA) Bus, an InfiniBand (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a PCI (Peripheral Component Interconnect) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a Video Electronics Bus (audio Electronics Association), abbreviated VLB) bus or other suitable bus or a combination of two or more of these. Bus 60 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The electronic device may execute an account password management method in the embodiment of the present application. In the specific implementation, the electronic device is a trusted device that is authenticated or selected by a user due to sensitivity, security and compliance of account password management, and the network environment applied to the electronic device is also a trusted network.
In addition, in combination with the account password management method in the foregoing embodiments, embodiments of the present application may provide a computer-readable storage medium to implement the account password management method. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any one of the account password management methods in the above embodiments.
And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.