Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and system based on white box

An encryption method and encryption algorithm technology, applied in the field of information security, can solve the problems of user economic loss, easy to steal transaction passwords, and insufficient security of simulated keyboards, and achieve the effect of protecting economic security and privacy security.

Active Publication Date: 2017-03-15
SHANGHAI PEOPLENET SECURITY TECH
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of the existing software simulating the keyboard is not high enough, and there are still risks such as data monitoring and data interception. When trading, directly inputting the password for the transaction still has security risks, and it is extremely vulnerable to attacks such as credentialing and phishing. It is very easy to be stolen when entering the transaction password, which will bring great economic losses to the user. Therefore, there is an urgent need for a security solution based on the mobile terminal to ensure the security of the transaction password input.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and system based on white box
  • Encryption method and system based on white box
  • Encryption method and system based on white box

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, and those skilled in the art can also obtain other accompanying drawings based on these drawings and obtain other implementations.

[0055] In order to keep the drawings concise, each drawing only schematically shows the parts related to the present invention, and they do not represent the actual structure of the product. In addition, to make the drawings concise and easy to understand, in some drawings, only one of the components having the same structure or function is schematically shown, or only one of them is marked. Herein, "a" not only means "only one", but also means "more than one".

[0056] refe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method and system based on a white box. The method comprises the following steps: S100, an application terminal acquires characters input by a user, and implements encryption combination on the characters and white box seeds in accordance with a preset character encryption algorithm and a preset acquisition sequence to obtain a combined password; S200, the application terminal implements encryption operation on the combined password according to a preset password encryption algorithm to obtain an encrypted ciphertext; and S300, a server decrypts the encrypted ciphertext to obtain a user default password. According to the encryption method and system disclosed by the invention, the characters input by the user can be obtained by clicking or touching a software simulation keyboard through a mouse, a white box cryptography is applied to a password keyboard of the application terminal to enable that the characters input by the user are firstly separately encrypted and then integrally encrypted, so that the way of obtaining the password through brute force can be better prevented.

Description

technical field [0001] The invention relates to the field of information security, in particular to a white box-based encryption method and system. Background technique [0002] In recent years, with the development of mobile Internet, smart terminals, big data, cloud computing, etc., mobile Internet has evolved from a technology to an environment for people's lives. With the implementation of the free flow system of securities accounts, links such as securities account opening, trading, and services have been networked. The mobile trend of Internet finance is increasingly deepening in the securities industry, and more and more investors conduct transactions through mobile terminals such as mobile phones and tablet computers. According to data from the China Securities Association, the proportion of online business of securities firms continued to increase last year, and the proportion of online account opening increased from 50% in 2014 to 92% in 2015; the proportion of on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0822H04L9/088H04L9/0891H04L2209/16
Inventor 谈剑锋李俊姜立稳胡剑波谢勇钱金金
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products