Password storing and verifying method and password storing and verifying device

A password storage and password technology, which is applied in the field of information security, can solve problems such as collision, password cracking, and weak defense capabilities, and achieve the effects of increasing complexity, reducing hash collisions, and reducing the probability of cracking

Inactive Publication Date: 2015-01-14
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, directly hashing user passwords is not very defensive for simple passwords
[0008] Secondly, currently commonly used hash algorithms, such as MD5, SHA-1, etc., all have collision problems, that is, different passwords have the same hash value
In this way, even if the user uses a more complex password, if its hash value collides with the hash value of a record in the password-hash value relationship table owned by the attacker, its password will also be cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password storing and verifying method and password storing and verifying device
  • Password storing and verifying method and password storing and verifying device
  • Password storing and verifying method and password storing and verifying device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0062] One of the core concepts of the embodiments of the present invention is that when a user registers or modifies the identity authentication information, the user's identity authentication information or the hash value of the identity authentication information is not directly stored, but preset parameters are added to the user's identity authentication information , and then perform a hash operation to obtain the feature value, and extract the data at the specified position in the feature value as encrypted data and store it in the database.

[0063] refer to figure 1 , which shows a flow chart of the steps of an embodiment of a password storage method of the present invention, which may specifically include the following st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a password storing and verifying method and a password storing and verifying device. The method comprises the following steps of acquiring identity authentication information of a user; adding preset parameters in the identity authentication information to obtain a character string; performing Hash operation by using the character string to obtain a characteristic value; and extracting data at an appointed position as enciphered data from the characteristic value. By the password storing and verifying method and the password storing and verifying device, the complexity of passwords of a user can be improved, the defense capability of the passwords of the user can also be improved, Hash collision is avoided or reduced, so that the crack probability of the passwords is reduced, and the passwords of the user are prevented from leaking.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a password storage method, a password verification method, a password storage device and a password verification device. Background technique [0002] With the development of informatization construction, information security has gradually become an important issue. The information security system in the network environment is the key to ensure information security. [0003] In computer services, the most common and basic user login access control method is the "username / password" method, that is, when a user needs to use a certain service, he must first register a user name and set a password corresponding to it. For the corresponding password, the service provider stores the user's username / password in the "user information database". When the user logs in, the user submits the user name and password to the server for authentication, and the server compares the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/31G06F21/62
Inventor 尹非凡
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products