Password storage method and device, and password verification method and device

A technology for password storage and password verification, applied in the fields of password storage methods and devices, password verification methods and devices, capable of solving problems such as user information leakage, user password security loopholes, and unproposed solutions, so as to improve security and solve problems Handle less reliable effects

Active Publication Date: 2020-03-24
ALIBABA GRP HLDG LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, user passwords are the most important data in the database, and their storage is very important. However, there are large loopholes in the security of user password processing in related technologies, resulting in the risk of user information leakage.
[0003] Aiming at the problem of low reliability and high risk in the processing of passwords in the above-mentioned related technologies, no effective solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password storage method and device, and password verification method and device
  • Password storage method and device, and password verification method and device
  • Password storage method and device, and password verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] According to an embodiment of the present invention, a method embodiment of a password storage method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer executable instructions, and Although the logical sequence is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than here.

[0044] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal or a similar computing device. figure 1 Shows a hardware structure block diagram of a computer terminal (or mobile device) used to implement a password storage method, such as figure 1 As shown, the computer terminal 10 (or the mobile device 10) may include one or more (shown as 102a, 102b, ..., 102n in the figure) processor 102 (the processor 102 may include but is not limited to a microprocessor...

Embodiment 2

[0177] According to an embodiment of the present invention, there is also provided a password storage device for implementing the above password storage method, Figure 8 Is a schematic diagram of a password storage device according to the second embodiment of the present invention, such as Figure 8 As shown, the password storage device includes: a first acquisition module 81, a first processing module 83, a first encryption module 85, a second encryption module 87, and a first storage module 89. among them,

[0178] The first obtaining module 81 is used to obtain the password and the salt to be added to the password.

[0179] The first processing module 83 is configured to perform data processing on the password to obtain processed data.

[0180] The first encryption module 85 is used to encrypt the salt by using the processed data to obtain an encrypted salt.

[0181] The second encryption module 87 is used to encrypt the processed data using salt to obtain the password stub of the...

Embodiment 3

[0208] The embodiments of the present invention may provide a computer terminal, and the computer terminal may be any computer terminal device in a computer terminal group. Optionally, in this embodiment, the above-mentioned computer terminal may also be replaced with a terminal device such as a mobile terminal.

[0209] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices in the computer network.

[0210] In this embodiment, the above-mentioned computer terminal can execute the program code of the following steps in the password storage method of the application program: obtain the password and the salt to be added to the password; perform data processing on the password to obtain the processed data; use the processed data to encrypt the salt , Get the encrypted salt; use salt to encrypt the processed data to get the password stub of the password; store the encrypted salt and the password stub....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password storage method and a device, and a password verification method and device. The password storage method comprises the following steps: acquiring a password and saltto be added into the password; performing data processing on the password to obtain processed data; encrypting the salt by adopting the processing data to obtain encrypted salt; encrypting the processed data by adopting salt to obtain a password stub of the password; and storing the encryption salt and the password stub. According to the method and the device, the technical problems of relativelylow password processing reliability and relatively high risk in related technologies are solved.

Description

Technical field [0001] The present invention relates to the technical field of computer information security, in particular to a password storage method and device, and a password verification method and device. Background technique [0002] A computer is a modern electronic computing machine used for high-speed calculations. It can perform numerical calculations as well as logical calculations, and has storage and memory functions. It is a modern intelligent electronic device that can run in accordance with programs and process massive amounts of data automatically and at a high speed. It has spread to general schools, enterprises and institutions, and into thousands of households, and has become an indispensable tool in the information society. However, while using computers as an indispensable tool for life, study or work, computer information security has also become a security issue that users must consider, and information security issues have become increasingly prominent....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06F21/60
CPCH04L9/0861H04L9/0894G06F21/602
Inventor 李朝中
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products