Password management method, electronic device and computer storage medium

A password management and password technology, which is applied in the field of data security, can solve security problems, database server user names and password information are easily leaked, and achieve the effects of avoiding leaks, ensuring transmission security, and ensuring password security

Active Publication Date: 2018-01-12
ZHANGYUE TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method makes the user name and password information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password management method, electronic device and computer storage medium
  • Password management method, electronic device and computer storage medium
  • Password management method, electronic device and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 Shows a flowchart of a password management method according to the first embodiment of the present invention, such as figure 1 As shown, the password management method specifically includes the following steps:

[0031] Step S101: Receive a request initiated by the client, and determine whether the request is a trusted Https request.

[0032] The request initiated by the client can use Http request based on Http Hypertext Transfer Protocol, or Https request based on Https Secure Socket Layer Hypertext Transfer Protocol. However, because the Http protocol sends content in plain text and does not provide any means of data encryption, it is extremely easy for attackers to intercept the transmission message and crack the information in it. Https requests are transmitted in encrypted mode when transmitting messages. Even if the attacker intercepts the transmission message, the information in it cannot be cracked, which ensures the security of message transmission. There...

Embodiment 2

[0043] figure 2 Shows a flowchart of a password management method according to the second embodiment of the present invention, such as figure 2 As shown, the password management method includes the following steps:

[0044] Step S201: Receive a request initiated by the client, and determine whether the request is a trusted Https request.

[0045] Step S202: Extract the encrypted password request information from the request.

[0046] Step S203: Decrypt the encrypted password request information, and send the decrypted password request information to the password manager.

[0047] The above steps refer to the description of steps S101-S103 in the first embodiment, and will not be repeated here.

[0048] Step S204, the token carried in the password request information is authenticated, and it is determined whether the token is a token issued by the password manager.

[0049] The password manager may use an authentication mechanism to authenticate the sender of the password request inform...

Embodiment 3

[0058] The third embodiment of the present application provides a non-volatile computer storage medium, the computer storage medium stores at least one executable instruction, and the computer executable instruction can execute the password management method in any of the foregoing method embodiments.

[0059] The executable instructions may be specifically used to cause the processor to perform the following operations:

[0060] Receive the request initiated by the client and determine whether the request is a trusted Https request;

[0061] If yes, extract the encrypted password request information from the request;

[0062] Decrypt the encrypted password request information, and send the decrypted password request information to the password manager for the password manager to return the corresponding password information according to the password request information;

[0063] Receive the password information returned by the password manager, encrypt the password information and retu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password management method, electronic equipment, and a computer storage medium. The method includes: receiving a request initiated by a client, and judging whether the request is a trusted HTTPS request; if so, extracting encrypted password request information from the request; Decrypt the encrypted password request information, and send the decrypted password request information to the password manager, so that the password manager returns the corresponding password information according to the password request information; receive the password information returned by the password manager, and verify the password The information is encrypted and returned to the client for use by the client after decrypting the encrypted password information. By judging the request initiated by the client and encrypting the password request information and password information, the transmission security during the entire password request process is guaranteed. At the same time, even if the password information is recorded in the log, the password information is encrypted. The password information also avoids the possibility of leakage.

Description

Technical field [0001] The invention relates to the field of data security, in particular to a password management method, electronic equipment, and computer storage media. Background technique [0002] When a client or terminal performs a certain service or operation, it sometimes needs to connect to a database server. When the client or terminal connects to the database server, it needs to know the user name and password of the database server. The prior art generally uses the configuration file to record the IP address, port, user name, password and other information of the database server that needs to be connected. The client code can directly read the corresponding information from the configuration file to realize the operation of connecting to the database server. . But this method makes the user name and password information of the database server easily leaked, leading to security problems. [0003] Therefore, a password management method is needed to ensure the securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 邹德顺邵厚琨
Owner ZHANGYUE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products