Password encryption method and system, and cryptographic check method and system

An encryption method and encryption system technology, applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve the same user information leakage, user information leakage, user password plaintext storage password file access control measures are not strict enough, etc. problem, to achieve the effect of ensuring uniqueness

Active Publication Date: 2014-05-07
ADVANCED NEW TECH CO LTD
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] At the end of 2011 and the beginning of 2012, the user passwords of many websites were leaked. The root cause is that the user passwords are stored in plain text and the password file access control measures are not strict enough.
None of the above three methods can deal with this attack well.
The reason is that some users have set the same username / password on different websites, and the user information on one of the websites is leaked, resulting in the disclosure of all the same user information on other websites
[0022] All in all, in the prior art, there is no technical solution to ensure that no user password information will be leaked even if the database file storing the user password is stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password encryption method and system, and cryptographic check method and system
  • Password encryption method and system, and cryptographic check method and system
  • Password encryption method and system, and cryptographic check method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Combine below figure 1 The password encryption scheme according to the embodiment of the present invention will be described.

[0052] The password encryption method according to the present invention is used to encrypt passwords of users, wherein each user has a unique identification code. This unique identifier can be a username or a user ID (a unique numeric code assigned to each user by the website). The user password that needs to be encrypted corresponds to each user, that is, corresponds to the user's unique identification code.

[0053] In step S102, a fixed character string is obtained. The fixed character string may be a fixed fixed-length character string, which is called a website secret factor or Salt. The character string is preferably stored separately from the user password database, and only authorized users / programs can be read strictly. Optionally, unlike the above-mentioned situation where only the same salt value is used, a salt value correspond...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password encryption method used for performing encryption on passwords of users, wherein each user has a unique identification code. The method includes the following steps: acquiring a fixed character string; cascading the unique identification code, the fixed character string and a password into a cascaded character string; and executing a digest operation on the cascaded character string through a hash algorithm and acquiring a password digest value of a user. Through application of the password encryption method and system, and a cryptographic check method and system, the methods and systems are applicable to card-password data protection and user security-problem answer protection and the like. Because in a user password digest operation process, a user unique factor, that is, the user unique identification code is added so that uniqueness of a user password digest value is ensured and thus password database files are endowed with capabilities of resisting chosen-plaintext attacks and beforehand chosen-plaintext attacks.

Description

technical field [0001] The present invention relates to the field of data communication, more specifically, to a password encryption method and system, and a password verification method and system. Background technique [0002] Password (password), or password, refers to words used for authentication, which can be used to verify identity or check the permission of an operation, so as to protect privacy and prevent unauthorized operations. It is common in website login, access to network database, verification of automatic teller machine, etc. [0003] Cryptography is the study of how to transmit information secretly. In modern times, it especially refers to the mathematical research on information and its transmission, which is often considered to be a branch of mathematics and computer science, and is also closely related to information theory. The famous cryptography scholar Ron Rivest explained: "Cryptography is about how to communicate in an environment where the enem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28H04L9/32
Inventor 禹新辉方海峰肖淑婷
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products