String encryption, verification method, apparatus, computer readable storage medium

A technology of encryption method and verification method, applied in the field of data encryption, can solve the problems of increasing the complexity of passwords, cracking plaintext, inconvenient memory, etc., and achieve the effect of improving the difficulty of cracking

Active Publication Date: 2018-11-09
贝硕科技(云南)有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of increasing the complexity and length of the password is effective, but it is not easy for users to remember; and if the length of the password is increased by "adding salt", once the "salt" is leaked, the plaintext may also be cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • String encryption, verification method, apparatus, computer readable storage medium
  • String encryption, verification method, apparatus, computer readable storage medium
  • String encryption, verification method, apparatus, computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] The main solution of the embodiment of the present invention is: when an encryption request is received, obtain the target character string to be encrypted; replace each character in the target character string with a corresponding random character string according to the first mapping relationship; The replaced random strings are concatenated to generate encrypted strings.

[0047] Since the string is encrypted by increasing the complexity and length of the password, it is not easy for the user to remember; the method of "adding salt" encryption may also be cracked. Therefore, the present invention provides a solution, aiming to provide an encryption method that does not increase the user's memory burden, and at the same time increases the difficulty of cracking.

[0048] like figure 1 as shown, figure 1 It...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a character string encryption method. The method comprises the following steps: when an encryption request is received, obtaining a to-be-encrypted target character string; replacing the characters in the target character string with corresponding random character strings according to a pre-established first mapping relation; and splicing the replaced random character strings to generate an encrypted character string. The invention further discloses a character string encryption method and apparatus, and a computer readable storage medium. The method is simple and convenient, and the encrypted character string used for protecting the original character string is generated without increasing the memory difficulty of the user, thereby improving the breaking difficultyof the character string.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a character string encryption, a verification method, a device and a computer-readable storage medium. Background technique [0002] In the current website program, the user's password is encrypted by an irreversible encryption algorithm and stored in the website's database. An encryption algorithm that is too simple is easily cracked, and an encryption algorithm that is too complex will bring performance to the server of the website. burden. Therefore, in most of the current website programs, the MD5 (Message Digest Algorithm 5, fifth edition of the message digest algorithm) encryption algorithm is usually used to encrypt the key data of the website. The algorithm always has a unique corresponding ciphertext for different plaintexts, and the ciphertexts are not repeated. At the same time, the complexity of the algorithm is moderate, and it will not bring a performance burden to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/06H04L9/08
Inventor 许宸杰
Owner 贝硕科技(云南)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products