Personal code forming and management method based on improved AES

A management method and password technology, which is applied in the field of personal password generation and management based on improved AES, can solve problems such as poor security, and achieve the effect of improving security

Active Publication Date: 2017-10-10
NORTHWESTERN POLYTECHNICAL UNIV
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the deficiencies of poor security of existing password generation methods, t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal code forming and management method based on improved AES
  • Personal code forming and management method based on improved AES
  • Personal code forming and management method based on improved AES

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0041] Reference Figure 1-3 . The specific steps of the personal password generation and management method based on the improved AES of the present invention are as follows:

[0042] The method of the present invention includes two modules: an initial password verification module and a user account password management module.

[0043] Among them, the initial password verification module includes: the reading and verification of the initial password, the reading of the unique identification of the device, the composition of the encryption key, and the analysis of the encrypted file.

[0044] The user account password management module includes: import and export of user account passwords, query and delete generated passwords, and generate new random passwords according to user application scenarios and requirements.

[0045] The password generation and storage process is as follows:

[0046] Step 1. Receive the user's initial password.

[0047] This process is the user's personal input...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a personal code forming and management method based on improved AES, and aims to solve the technical problems that an existing code forming method is poor in safety; the forming method comprises the following steps: forming a customized code, and re-invoking AES encryption; opposite to the encryption process, using the former formed code as the true form in storage, using a user initial code as an encryption secret key, re-encrypting the code and storing same in local, and adding a verify flag bit. When extracting the local code, the first step is to receive the user initial code for pre-decryption, if the verify flag bit is same with pre-encryption, then the code is successfully extracted; when user encrypts the code in a common use area, the self hard disc number and MAC address are inputted as encryption factors; the hard disc number and MAC address serve as the sole user voucher, and serve as the encryption factors in the code forming process; in addition, the improved AES line transfer and column confusion process can further improve the encryption process safety.

Description

technical field [0001] The invention belongs to the technical field of computer account password security, in particular to a personal password generation and management method based on improved AES. Background technique [0002] With the rapid development of Internet technology, there are more and more websites and software that require users to log in. For convenience, many users apply the same password to different scenarios, and even apply the password to payment applications that are related to property security. This undoubtedly provides convenience for network hackers to crack the "crash library", and is also very detrimental to the safety of users' personal information and property. [0003] However, some users apply different passwords in different scenarios, and there are also problems. When the number of user accounts and passwords continues to increase, it is difficult to accurately remember all account and password information. At the same time, for some unpop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/0631
Inventor 朱怡安杨淏天欧阳湘臻
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products