Login information encryption method and terminal device

A technology of login information and encryption method, which is applied in the field of login information encryption method and terminal equipment, and can solve problems such as poor security

Active Publication Date: 2018-03-20
PING AN TECH (SHENZHEN) CO LTD
View PDF12 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, an embodiment of the present invention provides a method for encrypting login information and a terminal device to solve the problem of poor security in the process of encrypting and saving login information in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login information encryption method and terminal device
  • Login information encryption method and terminal device
  • Login information encryption method and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0031] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.

[0032] figure 1 The implementation flow of the login information encryption method provided by the embodiment of the present invention is shown, and the method flow includes steps S101 to S105. The specific implementation principle of each step is as follows.

[0033...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention applies to the technical field of the Internet and provides a login information encryption method and a terminal device. Feature codes of a device are obtained; the feature codes are rearranged according to a preset rule and then are converted into a feature character string; position supplement is carried out on the feature character string to generate a position supplemented character string; a feature group digest of each feature group is calculated in sequence according to positions of feature groups in the position supplemented character string; the feature group digest of the last feature group is taken as a device fingerprint; the device fingerprint is converted into an encryption key for encryption; and login information is encrypted through a preset encryption algorithm based on the encryption key obtained according to the device fingerprint, thereby generating a login ciphertext. Different devices are equipped with the encryption keys different from those of theother devices. Even if others obtain the encryption algorithm and the login ciphertext, the login ciphertext cannot be decrypted, and the login information of a user is well prevented from being stolen by the others.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and in particular relates to a login information encryption method and terminal equipment. Background technique [0002] At present, people often need to enter login information when using the Internet. These login information generally include login names and passwords. When the login information entered by the user matches the data pre-stored in the server, the user can remotely use the authority corresponding to the login information. and data. In the prior art, for the convenience of login, users often choose the method of "automatic login next time". At this time, the user name and password will be encrypted as login information and stored in the local device. When the user needs to log in next time, only You can automatically log in by calling the login information stored locally. [0003] However, the current encryption key used to encrypt login information is hard-coded. You can se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L9/0618H04L9/0861H04L63/0428H04L63/0815H04L63/0876
Inventor 刘继超
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products