Password storage method and device, and password verification method and device
A technology for password storage and password verification, applied in the fields of password storage methods and devices, password verification methods and devices, capable of solving problems such as user information leakage, user password security loopholes, and unproposed solutions, so as to improve security and solve problems Handle less reliable effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] According to an embodiment of the present invention, a method embodiment of a password storage method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer executable instructions, and Although the logical sequence is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than here.
[0044] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal or a similar computing device. figure 1 Shows a hardware structure block diagram of a computer terminal (or mobile device) used to implement a password storage method, such as figure 1 As shown, the computer terminal 10 (or the mobile device 10) may include one or more (shown as 102a, 102b, ..., 102n in the figure) processor 102 (the processor 102 may include but is not limited to a microprocessor...
Embodiment 2
[0177] According to an embodiment of the present invention, there is also provided a password storage device for implementing the above password storage method, Figure 8 Is a schematic diagram of a password storage device according to the second embodiment of the present invention, such as Figure 8 As shown, the password storage device includes: a first acquisition module 81, a first processing module 83, a first encryption module 85, a second encryption module 87, and a first storage module 89. among them,
[0178] The first obtaining module 81 is used to obtain the password and the salt to be added to the password.
[0179] The first processing module 83 is configured to perform data processing on the password to obtain processed data.
[0180] The first encryption module 85 is used to encrypt the salt by using the processed data to obtain an encrypted salt.
[0181] The second encryption module 87 is used to encrypt the processed data using salt to obtain the password stub of the...
Embodiment 3
[0208] The embodiments of the present invention may provide a computer terminal, and the computer terminal may be any computer terminal device in a computer terminal group. Optionally, in this embodiment, the above-mentioned computer terminal may also be replaced with a terminal device such as a mobile terminal.
[0209] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices in the computer network.
[0210] In this embodiment, the above-mentioned computer terminal can execute the program code of the following steps in the password storage method of the application program: obtain the password and the salt to be added to the password; perform data processing on the password to obtain the processed data; use the processed data to encrypt the salt , Get the encrypted salt; use salt to encrypt the processed data to get the password stub of the password; store the encrypted salt and the password stub....
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com