User request permission method and device based on password confusion

A user request and password technology, applied in the field of Internet finance, can solve problems such as reducing the security of user accounts, and achieve the effects of increasing data throughput, reducing waiting time, and improving speed

Pending Publication Date: 2021-11-09
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, there will be more or less various loopholes, such as hashing passwords without adding salt, using hash functions that have been found ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User request permission method and device based on password confusion
  • User request permission method and device based on password confusion
  • User request permission method and device based on password confusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0063] It should be noted that the user request permission method and device based on password obfuscation disclosed in the present invention can be used in the financial field, and can also be used in any field other than the financial field. The application field of the licensing method and device is not limited.

[0064] In the prior art, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user request permission method and device based on password confusion. The method can be used in the technical field of finance. In a reasonable salting processing mode, confusion is carried out in combination with a hash function, so that the method has the characteristics of counterfeiting resistance, eavesdropping resistance, replay attack resistance, dictionary attack resistance after database leakage, incapability of acquiring a password plaintext in the whole process, infeasibility of violent exhaustion and reverse cracking of the password plaintext in cost calculation and the like, and the safety of a user logging in an account through a webpage is ensured to the greatest extent.

Description

technical field [0001] The invention relates to the technical field of Internet finance, in particular to a password obfuscation-based user request permission method and device. Background technique [0002] The webpage-based user login authentication system uses cryptography and network security related technologies to obfuscate and hash sensitive information such as user passwords transmitted through the network and in background processing when users register and log in to their accounts. Persistent storage is carried out in the database to ensure that user passwords pass system authentication without being leaked, cracked, or tampered with. However, in practical applications, there will be more or less various loopholes, such as hashing passwords without adding salt, using hash functions that have been found to have collisions, and transmitting plaintext passwords to background processing, etc., which will cause varying degrees of vulnerability. risk, reducing the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/08H04L29/06H04L29/08G06Q40/04
CPCH04L9/0643H04L9/0869H04L63/083H04L67/02G06Q40/04
Inventor 廖俊宇孔永锋林芝峰姚泽雄
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products