Dynamic encryption safe login method and device

A secure login and dynamic encryption technology, applied in the field of data communication and transmission, can solve the problems of public key and key being easily stolen, security issues cannot be guaranteed, etc., and achieve the effect of improving overall security and protecting security

Active Publication Date: 2020-10-16
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This application provides a dynamic encryption security login method and device, to at least solve the security problem in...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic encryption safe login method and device
  • Dynamic encryption safe login method and device
  • Dynamic encryption safe login method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] In the prior art, data encryption transmission methods can be divided into two types: one method is to install security controls on the browser side; the other method is to encrypt keys and data by using encryption algorithms through software program codes. Traditional application encryption generally uses security controls or the code of the program itself to encrypt, and then encrypts the data through a certain encryption algorithm and transmits it to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a dynamic encryption safe login method and device. The method comprises the steps of: sending a random ID request to a user side accessing an application, and then receiving a verification code dynamically generated by the back end of the application; verifying the verification code, and if the verification is passed, generating a key according to the ID request; and obtaining encrypted user data by using the key and sending the encrypted user data to the back end of the application, so that the back end of the application verifies and logs in the encrypted user data. According to the invention, the segmented dynamic encryption transmission data starts from a security perspective; the possibility that the whole data is cracked after being stolen is avoided, the situation that the data is easy to crack due to the fact that encryption strings transmitted each time are the same under the condition that the same user logs in for many times is avoided, and the situation that the input of the user is intercepted and monitored after a malicious program is implanted is avoided. Therefore, the safety of data transmission of the user and the application is further improved, and the sensitive information of the user and the application can be safely transmitted and timely processed.

Description

technical field [0001] The present application belongs to the technical field of data communication transmission, and in particular, relates to a dynamic encryption security login method and device. Background technique [0002] In the era of big data, systems and programs often need to go through the link of data transmission, and data transmission provides great convenience and efficiency for data applications. At the same time, there are also security risks in the process of data transmission. At present, the common data encryption transmission methods in the industry can be divided into two types: one method is to install security controls on the browser side; the other method is to use encryption algorithms to encrypt keys and data through software program codes. Traditional application encryption generally uses security controls or the code of the program itself to encrypt, and then encrypts the data through a certain encryption algorithm and transmits it to the backen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/08H04L63/0838H04L9/0822H04L9/0891
Inventor 吴成龙潘玲姜坤谢鹏
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products