Security encryption method and system

A technology of secure encryption and encryption algorithm, which is applied in the field of secure encryption methods and systems, and can solve problems such as leakage of user passwords, risks of encryption methods, and low encryption security

Inactive Publication Date: 2018-01-09
LOTUS TECH BEIJING CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Most Internet-based application backgrounds and website backgrounds have the need to save user accounts and passwords. The background server generally encrypts the passwords and then saves them. Traditional encryption technologies directly encrypt passwords with digest algorithms such as md5 or sha1. The method has great risks. Hackers can restore the plaintext by pre-generating the plaintext / ciphertext correspondence table, which will lead to the leakage of user passwords and make the encryption less secure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security encryption method and system
  • Security encryption method and system
  • Security encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] figure 1 It is a flow chart of the secure encryption method provided by Embodiment 1 of the present invention.

[0044] refer to figure 1 , secure encryption methods, including:

[0045] Step S101, obtaining password plaintext;

[0046] Step S102, perform digest processing and encryption processing on the password plaintext according to preset rules to obtain the password ciphertext.

[0047] The preset rule is a pre-customized encryption process. Generally, when the background encrypts the password, the digest algorithm is directly encrypted. The hacker can still try to restore the ciphertext by pre-establishing the corresponding table of all passwords and their digests; the risk of this encryption method is still bigger. The embodiment of the present invention executes multiple digest processing and multiple encryption processing according to preset rules, which can resist the attack by pre-generating the corresponding table. Attack, the attack cost is very high....

Embodiment 2

[0072] Figure 4 It is a schematic diagram of the security encryption system provided by Embodiment 2 of the present invention.

[0073] refer to Figure 4 , a secure encryption system, including:

[0074] Obtaining module 10, for obtaining password plaintext;

[0075] The digest encryption module 20 is configured to perform digest processing and encryption processing on the password plaintext according to preset rules to obtain password ciphertext.

[0076] Further, as Figure 5 As shown, the digest encryption module 20 includes:

[0077] The custom unit 21 is used to pre-customize the encryption process, and the encryption process includes multiple digest processing and multiple encryption processing;

[0078] The digest encryption unit 22 is configured to perform digest processing or encryption processing according to the encryption process.

[0079] Further, the digest encryption unit 22 includes:

[0080] The first digest encryption unit (not shown) executes the fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security encryption method and system, and relates to the technical field of encryption. The method includes the steps that a password plaintext is acquired; abstract processing and encryption processing are conducted on the password plaintext according to a preset rule, and a password ciphertext is obtained. The encryption safety is improved through a self-defined multi-abstract algorithm and an encryption algorithm.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a safe encryption method and system. Background technique [0002] Most Internet-based application backgrounds and website backgrounds have the need to save user accounts and passwords. The background server generally encrypts the passwords and then saves them. Traditional encryption technologies directly encrypt passwords with digest algorithms such as md5 or sha1. This method has great risks. Hackers can restore the plaintext by pre-generating the plaintext / ciphertext correspondence table, which will lead to the leakage of user passwords and make the encryption less secure. Contents of the invention [0003] In view of this, the object of the present invention is to provide a secure encryption method and system, which can improve encryption security by customizing multiple digest processing and encryption processing procedures. [0004] In the first aspect, the embodiment...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/46
Inventor 王林
Owner LOTUS TECH BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products