CN104821873A - Method for realizing password security - Google Patents

Method for realizing password security Download PDF

Info

Publication number
CN104821873A
CN104821873A CN201510192255.7A CN201510192255A CN104821873A CN 104821873 A CN104821873 A CN 104821873A CN 201510192255 A CN201510192255 A CN 201510192255A CN 104821873 A CN104821873 A CN 104821873A
Authority
CN
China
Prior art keywords
password
keying sequence
batch
sequence
cryptosecurity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510192255.7A
Other languages
Chinese (zh)
Other versions
CN104821873B (en
Inventor
陈华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chun Kui Information Technology Co., Ltd.
Original Assignee
陈华
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 陈华 filed Critical 陈华
Priority to CN201510192255.7A priority Critical patent/CN104821873B/en
Publication of CN104821873A publication Critical patent/CN104821873A/en
Application granted granted Critical
Publication of CN104821873B publication Critical patent/CN104821873B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A method for realizing password security includes the following steps: a password comprises more than one password sequence which includes a first password sequence, a second password sequence,...a (N-1)th password sequence, an Nth password sequence, wherein N is a natural number larger than or equal to 2; each password sequence input by a user is acquired; a corresponding amplification factor of each password sequence input by the user is acquired; a result of multiplying each password sequence by the corresponding amplification factor is used as an amplification result; the amplification results of the password sequences are accumulated, and an accumulated value is used as a storage password; and the storage password is stored. The method for realizing password security provided by the invention effectively guarantees security of a password, increases the safety factor of the password in an omnibearing mode, achieves the effects of no possibility of decoding reversely and no readable meaning, and brings a great guarantee for password security and data security.

Description

A kind of implementation method of cryptosecurity
Technical field
The invention belongs to the technical field of cryptosecurity, be specifically related to a kind of implementation method of cryptosecurity.
Background technology
Along with the development of Novel Internet, mobile Internet, Internet of Things, management software technology, the significant coefficient of cryptosecurity improves constantly, application scenarios gets more and more, along with the informationalized of all trades and professions develops rapidly, corresponding data scale increases by geometric progression.Data volume is day by day huge, and the operation between user and data becomes increasingly conspicuous, and brings great difficulty to Security Data Transmission, storage, operation.Technology On Data Encryption, as the effective way addressed this problem, especially for large data, more and more comes into one's own in current the Internet.Because cryptosecurity is to individual and the very important effect of enterprise, people wish that the data of oneself can not check, operate, access, transmit not having the situation of password in most cases, also make Ciphor safety technology and other technologies have dividing of priority, character is different.
In prior art, the quantity of application system, the quantity of website, it is day by day huge that computer cell phone logs in quantity.Password is as wherein indispensable part; Password Length is shorter, and the part of code content is fewer, and password conversion cryptographic algorithm is simpler, is more easily cracked; Add most of password be all allow by force user be provided with user be not easy remember content, also more easily forget like this.
Because password is safer, then the data protection for information system is better, and corresponding application system security is also higher.Lengthen Password Length, the character repertoire of code content part strengthens, and allows user arrange the content the most easily remembered, is conducive to safe, easy to remember, improves the overall safety grade of system, the data of protection user.Cryptosecurity requires to become increasingly conspicuous, but how to the data protection of user and the protection of enterprise data center, but becomes the technical difficulty always existed.
Summary of the invention
In order to solve the problems of the technologies described above; the invention provides a kind of implementation method of cryptosecurity; password safety method can be realized fast by the present invention; solve login protection limited in prior art and the demand of data protection, bring great convenience to the transmission security of data, storage security, handling safety.
The technical solution adopted in the present invention is:
An implementation method for cryptosecurity, comprises the steps:
Password is made up of the keying sequence of more than 1 batch, is respectively the 1st batch of keying sequence, the 2nd batch of keying sequence ... N-1 criticizes keying sequence, and N criticizes keying sequence; Wherein N is the natural number of >=2;
What obtain user's input often criticizes keying sequence;
What obtain user's input often criticizes enlargement ratio corresponding to keying sequence;
Every batch of keying sequence is multiplied by the result of corresponding enlargement ratio, as amplification result;
The amplification result of every batch of keying sequence adds up, and the value after cumulative is as storage password;
Described storage password is stored.
Preferably, the method that the N that acquisition user inputs criticizes keying sequence is specially:
The N obtaining user's input criticizes keying sequence;
When not getting present lot keying sequence and terminate mark and not getting the complete mark of Password Input, then continue the keying sequence of acquisition present lot;
When getting the complete mark of Password Input, then terminate the acquisition of password batch;
When getting present lot keying sequence and terminating mark, then obtain the keying sequence of present lot keying sequence+1 batch, the like, until when getting the complete mark of Password Input, the acquisition of end password batch.
Preferably, the content of every batch of keying sequence comprises one or more in capitalization, lowercase, numeral, spcial character, spoken and written languages (multiple national language word), audio frequency, video, fingerprint, picture and formatted file.
Preferably, every batch of keying sequence is the keying sequence obtained by soft keyboard or keyboard.
Preferably, the length of every batch of keying sequence is for presetting length.
Preferably, also described storage password is encrypted when described storage password being stored.
Be more preferably, the method be encrypted described storage password comprises User Defined rule cryptographic algorithm, md5 encryption, hash algorithm, RSA Algorithm encryption, cubic password encryption, Substitution encryption method, the enciphered method that replaces, gyroscope wheel enciphered method, many code encryptions method, the enciphered method that replaces, carries method secretly, Kasiski method, three points of passwords, affine cipher, ripple thunder fermi code, RC5 encryption, ADFGVX password, hill cipher, vigenere cipher and Ettas cling in assorted code one or more.These algorithms libraries select combination by user oneself above, and circulation performs the such algorithm combination of how many times, is defined by user oneself.Remarks: (only having user oneself to define algorithm, user oneself to select which algorithm, user oneself Choice encryption how many times this is just safer).
Beneficial effect of the present invention is:
The implementation method of a kind of cryptosecurity provided by the invention, has effectively ensured the safety of password, the omnibearing coefficient of safety adding password, reaches reversely to decode, without readable meaning, bring great guarantee to cryptosecurity, data security.
Accompanying drawing explanation
Fig. 1 is schematic flow sheet of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with accompanying drawing, the present invention is further elaborated.Should be appreciated that embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
In order to solve the problems referred to above that prior art exists, the present inventor, through long-term practice, has also found following problem, and Password Length of the prior art all generally all remains within 50, and the few are not easy to input with very long password, very long password; Password complexity is made up of capitalization, lowercase, spcial character, numeral, remembers by force to be not easy to remember the password being easy to forget to user; Character repertoire used in password, very little, permutation and combination is got up also little; The encryption method major part of password is too simple, common all in case with mail dynamically, SMS phone is dynamic, premised on hardware combinations, restriction input error number of times etc.; The crack method of a lot of decryption, according to the processor processing speed of present computer, normally necessarily can crack at 1 day; Be exactly roughly that a lot of system often occurs safety problem, and password is stolen, is cracked because this some reason above.
As shown in Figure 1, the implementation method of a kind of cryptosecurity described in the invention, comprises the steps:
Password is made up of the keying sequence of more than 1 batch, is respectively the 1st batch of keying sequence, the 2nd batch of keying sequence ... N-1 criticizes keying sequence, and N criticizes keying sequence; Wherein N is the natural number of >=2; The content of every batch of keying sequence comprise in capitalization, lowercase, numeral, spcial character, spoken and written languages (multiple national language word is available), audio frequency, video, fingerprint, picture and formatted file one or more;
What obtain user's input often criticizes keying sequence;
What obtain user's input often criticizes enlargement ratio corresponding to keying sequence;
Every batch of keying sequence is multiplied by the result of corresponding enlargement ratio, as amplification result;
The amplification result of every batch of keying sequence adds up, and the value after cumulative is as storage password;
Storage password is stored.
Wherein, the method that the N that acquisition user inputs criticizes keying sequence is specially:
The N obtaining user's input criticizes keying sequence;
When not getting present lot keying sequence and terminate mark and not getting the complete mark of Password Input, then continue the keying sequence of acquisition present lot;
When getting the complete mark of Password Input, then terminate the acquisition of password batch;
When getting present lot keying sequence and terminating mark, then obtain the keying sequence of present lot keying sequence+1 batch, the like, until when getting the complete mark of Password Input, the acquisition of end password batch.
Every batch of keying sequence is the keying sequence that soft keyboard or hardware keyboards obtain.The length of every batch of keying sequence is for presetting length.Also storage password is encrypted when storage password is stored.To store that the method that is encrypted of password comprises User Defined rule cryptographic algorithm, md5 encryption, hash algorithm, RSA Algorithm encryption, cubic password encryption, Substitution encryption method, the enciphered method that replaces, gyroscope wheel enciphered method, many code encryptions method, the enciphered method that replaces, carries method secretly, Kasiski method, three points of passwords, affine cipher, ripple thunder fermi code, RC5 encryption, ADFGVX password, hill cipher, vigenere cipher and Ettas cling in assorted code one or more.These algorithms libraries select combination by user oneself above, and circulation performs the such algorithm combination of how many times, is defined by user oneself.Remarks: (only having user oneself to define algorithm, user oneself to select which algorithm, user oneself Choice encryption how many times this is just safer).
In user's use procedure, first by login account input, then input password, input code content mode according to batch come, password can by multiple batches of code content superpose form, the code content of single batch also can be only had to form.
The code content of each batch can be made up of (capitalization, lowercase, numeral, spcial character, multilingual storehouse, audio frequency, video, fingerprint, picture, library) permutation and combination, there is the function selected fast in multilingual storehouse, also can manually input; Audio frequency, video, fingerprint, picture, library set rule by user oneself;
The Password Length of each batch can only be selected by soft keyboard, manually do not input, the password figure place of each batch can more than 50, by user oneself rule settings, the Password Length of each batch is all that the numeral selected by soft keyboard determines, numeral is how many, and the code content of how many times is formed by stacking exactly;
After code content has inputted, transfer to backstage algorithms library through multiple transform coding cryptographic storage, the content finally stored, has reached and cannot reversely decode, and without readable meaning, brings great help to cryptosecurity, data security.
As fully visible, the present invention has effectively ensured the safety of password, the omnibearing coefficient of safety adding password, reaches reversely to decode, without readable meaning, bring great guarantee to cryptosecurity, data security.
The hardware that all or part of step in the method that above-described embodiment relates to can carry out instruction relevant by program has come, described program can be stored in the storage medium that computer equipment can read, for performing all or part of step described in the various embodiments described above method.Described computer equipment, such as: personal computer, server, the network equipment, intelligent mobile terminal, intelligent home device, wearable intelligent equipment, vehicle intelligent equipment etc.; Described storage medium, such as: the storage of RAM, ROM, magnetic disc, tape, CD, flash memory, USB flash disk, portable hard drive, storage card, memory stick, the webserver, network cloud storage etc.
The present invention is not limited to above-mentioned preferred forms; anyone can draw other various forms of products under enlightenment of the present invention; no matter but any change is done in its shape or structure; every have identical with the application or akin technical scheme, all drops within protection scope of the present invention.

Claims (7)

1. an implementation method for cryptosecurity, is characterized in that, comprises the steps:
Password is made up of the keying sequence of more than 1 batch, is respectively the 1st batch of keying sequence, the 2nd batch of keying sequence ... N-1 criticizes keying sequence, and N criticizes keying sequence; Wherein N is the natural number of >=2;
What obtain user's input often criticizes keying sequence;
What obtain user's input often criticizes enlargement ratio corresponding to keying sequence;
Every batch of keying sequence is multiplied by the result of corresponding enlargement ratio, as amplification result;
The amplification result of every batch of keying sequence adds up, and the value after cumulative is as storage password;
Described storage password is stored.
2. the implementation method of cryptosecurity according to claim 1, is characterized in that, the method that the N that acquisition user inputs criticizes keying sequence is specially:
The N obtaining user's input criticizes keying sequence;
When not getting present lot keying sequence and terminate mark and not getting the complete mark of Password Input, then continue the keying sequence of acquisition present lot;
When getting the complete mark of Password Input, then terminate the acquisition of password batch;
When getting present lot keying sequence and terminating mark, then obtain the keying sequence of present lot keying sequence+1 batch, the like, until when getting the complete mark of Password Input, the acquisition of end password batch.
3. the implementation method of cryptosecurity according to claim 1, is characterized in that: the content of every batch of keying sequence comprise in capitalization, lowercase, numeral, spcial character, spoken and written languages, audio frequency, video, fingerprint, picture and formatted file one or more.
4. the implementation method of cryptosecurity according to claim 1, is characterized in that: every batch of keying sequence is the keying sequence obtained by soft keyboard or keyboard.
5. the implementation method of cryptosecurity according to claim 1, is characterized in that: the length of every batch of keying sequence is for presetting length.
6. the implementation method of cryptosecurity according to claim 1, is characterized in that: be also encrypted described storage password when being stored by described storage password.
7. the implementation method of cryptosecurity according to claim 6, is characterized in that: the method be encrypted described storage password comprises User Defined rule cryptographic algorithm, md5 encryption, hash algorithm, RSA Algorithm encryption, cubic password encryption, Substitution encryption method, the enciphered method that replaces, gyroscope wheel enciphered method, many code encryptions method, the enciphered method that replaces, carries method secretly, Kasiski method, three points of passwords, affine cipher, ripple thunder fermi code, RC5 encryption, ADFGVX password, hill cipher, vigenere cipher and Ettas cling in assorted code one or more.
CN201510192255.7A 2015-04-20 2015-04-20 A kind of implementation method of cryptosecurity Active CN104821873B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510192255.7A CN104821873B (en) 2015-04-20 2015-04-20 A kind of implementation method of cryptosecurity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510192255.7A CN104821873B (en) 2015-04-20 2015-04-20 A kind of implementation method of cryptosecurity

Publications (2)

Publication Number Publication Date
CN104821873A true CN104821873A (en) 2015-08-05
CN104821873B CN104821873B (en) 2018-07-03

Family

ID=53732051

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510192255.7A Active CN104821873B (en) 2015-04-20 2015-04-20 A kind of implementation method of cryptosecurity

Country Status (1)

Country Link
CN (1) CN104821873B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108694350A (en) * 2017-04-08 2018-10-23 李川涛 A kind of fingerprint character password method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179375A (en) * 2006-11-12 2008-05-14 黑龙江大学 Chaos algorithm based network data encryption card
EP2215768A2 (en) * 2007-11-02 2010-08-11 Inside Contactless Method and devices for protecting a microcircuit from attacks for obtaining secret data
CN101848079A (en) * 2010-05-28 2010-09-29 中国科学院软件研究所 Perturbation method and encryption method for character-oriented sequence with memory
CN104113543A (en) * 2014-07-18 2014-10-22 中国科学院软件研究所 Block cipher based message authentication method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179375A (en) * 2006-11-12 2008-05-14 黑龙江大学 Chaos algorithm based network data encryption card
EP2215768A2 (en) * 2007-11-02 2010-08-11 Inside Contactless Method and devices for protecting a microcircuit from attacks for obtaining secret data
CN101848079A (en) * 2010-05-28 2010-09-29 中国科学院软件研究所 Perturbation method and encryption method for character-oriented sequence with memory
CN104113543A (en) * 2014-07-18 2014-10-22 中国科学院软件研究所 Block cipher based message authentication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈华;冯登国;范丽敏: "一种关于分组密码的新的统计检测方法", 《计算机学报 第32卷第4期》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108694350A (en) * 2017-04-08 2018-10-23 李川涛 A kind of fingerprint character password method

Also Published As

Publication number Publication date
CN104821873B (en) 2018-07-03

Similar Documents

Publication Publication Date Title
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
CN110489466B (en) Method and device for generating invitation code, terminal equipment and storage medium
US10461934B2 (en) Authentication-based message display method and communication terminal thereof
US10521144B2 (en) Data block storage by splitting file content and file headers for independent storage
CN104348609A (en) Non-stored password management algorithm
CN111191255B (en) Information encryption processing method, server, terminal, device and storage medium
CN110543778A (en) linear random encryption and decryption algorithm for character data
CN104239753B (en) Tamper detection method for text documents in cloud storage environment
CN115051798A (en) Random number generation method and device, electronic equipment and storage medium
CA3061776A1 (en) Key information processing method and apparatus, electronic device and computer readable medium
Rafat et al. Secure digital steganography for ASCII text documents
CN110245520A (en) A kind of file enciphering method, file encryption device and terminal device
CN112436943B (en) Request deduplication method, device, equipment and storage medium based on big data
KR102443255B1 (en) Method for Generating Encryption Key and Digital Signature Based on Lattices
CN116055067B (en) Weak password detection method, device, electronic equipment and medium
CN104821873A (en) Method for realizing password security
CN102185897B (en) Safe distributed virtual storage pool system
CN111222177A (en) Digital fingerprint processing and signature processing method
CN110990848A (en) Sensitive word encryption method and device based on hive data warehouse and storage medium
CN116127925A (en) Text data enhancement method and device based on destruction processing of text
CN109344941B (en) Big data secure sharing method and device
Kumaresan et al. An additive cellular automata based random key generation for one-time pad encryption using luhn method
CN108075889B (en) Data transmission method and system for reducing complexity of encryption and decryption operation time
CN113283215B (en) Data confusion method and device based on UTF-32 coding
CN115333868B (en) Symmetric encryption method, symmetric decryption method, symmetric encryption device, symmetric decryption device and symmetric encryption device based on odd-even round robin

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20180129

Address after: 201413 Shanghai city Fengxian District Zhenping Road No. 898 four group building 2 room 1134

Applicant after: Shanghai Chun Kui Information Technology Co., Ltd.

Address before: 200120 Rongcheng Road, Pudong Avenue, Pudong New Area, Pudong New Area, Shanghai, No. 4, No. 304, 304

Applicant before: Chen Hua

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant