Data encryption method and system, client and computer readable storage medium

A data encryption and encrypted technology, applied in the field of data security

Pending Publication Date: 2019-06-21
SHENZHEN ONETHING TECH CO LTD
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of this application is to provide a data encryption method, system, client, and computer-readable storage medium, aiming to solve the existing problem that there is still the possibility of being cracked when the user login information is directly cyclically encrypted several times, and to improve user The encryption strength of login information reduces the possibility of being cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and system, client and computer readable storage medium
  • Data encryption method and system, client and computer readable storage medium
  • Data encryption method and system, client and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] See figure 1 , figure 1 It is a flow chart of a data encryption method provided by the embodiment of this application. It should be noted that the solution provided by this embodiment is mainly applied in the Client / Server mode. The user uses the client to enter his login information to try to log in to the target server or In the scenario of the personal account provided by the target server, in order not to transmit the plaintext login information in the network and save it in the server, the server verifies whether the login is legal based on the received ciphertext, so the user input The process of encrypting plaintext login information into ciphertext is completed by the client (Client), so the execution subject of this embodiment is the client, which includes the following steps:

[0055] S101: Receive login information input by the user, and calculate characteristic parameters according to the login information;

[0056] This step is aimed at the client receivi...

Embodiment 2

[0075] See figure 2 , figure 2 A flow chart of a method for forming a data combination and an encryption method for a data combination in the data encryption method provided by the embodiment of this application. On the basis of the first embodiment, this embodiment provides a method for how to form a data combination in S103. The specific implementation method includes the following steps:

[0076] S201: inserting characteristic parameters into the preset number of digits of the current ciphertext to obtain a data combination;

[0077] In this step, the data combination is obtained by inserting the feature parameter (equivalent to Y in the above example) into the preset number of digits of the current ciphertext.

[0078] S202: Perform operations on the data combination using the SHA512 algorithm to obtain a first operation result;

[0079] S203: Perform an operation on the first operation result using the MD5 algorithm to obtain an encrypted result.

[0080] S202 On th...

Embodiment 3

[0085] See image 3 , image 3 A structural block diagram of a data encryption system provided in the embodiment of this application, the data encryption system may include:

[0086] The information acquisition and feature calculation unit 100 is configured to receive login information input by the user, and calculate feature parameters according to the login information;

[0087] The login information encryption unit 200 is used to encrypt the login information, and use the obtained encrypted login information as the initial ciphertext;

[0088] The data combination encryption unit 300 is used to encrypt the data combination formed by the current ciphertext and characteristic parameters to obtain an encryption result, and increase the number of encryptions by 1 at the same time; wherein, the initial value of the number of encryptions is 1;

[0089] The number of encryption times judging unit 400 is used to judge whether the current number of encryption times is greater than...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption method. The method is different from a conventional cyclic encryption mode. The basic data encrypted each time are inconsistent in a mode of adding the characteristic parameters on the basis of the encryption result obtained after each time of encryption. Even if the algorithm which is encrypted circularly is guessed, a cracker cannot finally obtain real and available user login information from the ciphertext obtained from the dragging library through reverse cracking, so that the user login information can be stored more safely under the protection of higher encryption intensity. The invention also discloses a data encryption system, a client and a computer readable storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the field of data security, in particular to a data encryption method, system, client and computer-readable storage medium. Background technique [0002] In order to prevent the dragger from directly using the user login information saved in plain text in the database when the server database is dragged, the user login information is usually encrypted at the client and sent to the server in ciphertext for storage . [0003] In order to prevent the plaintext user login information from being restored from the ciphertext by means of reverse cracking or brute force cracking, the existing technology usually uses a cyclic encryption method to increase the difficulty of cracking, that is, the same encryption algorithm is used to re-encrypt the previous encryption result, but In the case of sufficient time, the real user login information may still be restored. [0004] Therefore, how to prevent crackers from restoring the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/45G06F21/60G06F21/62
Inventor 陶胜吴云峰
Owner SHENZHEN ONETHING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products