CN109918877A - A kind of data ciphering method, system, client and computer readable storage medium - Google Patents

A kind of data ciphering method, system, client and computer readable storage medium Download PDF

Info

Publication number
CN109918877A
CN109918877A CN201910217660.8A CN201910217660A CN109918877A CN 109918877 A CN109918877 A CN 109918877A CN 201910217660 A CN201910217660 A CN 201910217660A CN 109918877 A CN109918877 A CN 109918877A
Authority
CN
China
Prior art keywords
encryption
data
ciphertext
current
characteristic parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910217660.8A
Other languages
Chinese (zh)
Inventor
陶胜
吴云峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Onething Technology Co Ltd
Original Assignee
Shenzhen Onething Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Onething Technology Co Ltd filed Critical Shenzhen Onething Technology Co Ltd
Priority to CN201910217660.8A priority Critical patent/CN109918877A/en
Publication of CN109918877A publication Critical patent/CN109918877A/en
Pending legal-status Critical Current

Links

Abstract

This application discloses a kind of data ciphering methods; it is different from conventional circulation cipher mode; the application is by way of increasing characteristic parameter on the basis of the encrypted result obtained after encrypting every time come so that the basic data encrypted every time is inconsistent; even if being guessed by the algorithm of circulation encryption; the ciphertext that cracker finally can not also obtain from Tuo Ku obtains real, available user login information after inversely cracking, so that user login information is able to safer preservation under the protection of higher encryption intensity.The application further simultaneously discloses a kind of data encryption system, client and computer readable storage medium, has above-mentioned beneficial effect.

Description

A kind of data ciphering method, system, client and computer readable storage medium
Technical field
This application involves data security arts, in particular to a kind of data ciphering method, system, client and computer can Read storage medium.
Background technique
In order to make that library person is dragged directly to protect according in database with plaintext version when server database is dragged library The user login information deposited, the user login information would generally be encrypted at client, and clothes are sent in the form of ciphertext Business device is saved.
It is existing in order to prevent by inversely cracking or Brute Force means restore the user login information of plaintext from ciphertext There is technology usually using the mode of circulation encryption to increase the difficulty cracked, i.e., last encrypted result is calculated using identical encryption Method is re-encrypted, but in the case where having plenty of time, and real user login information still remains the possibility for being reduced out Property.
Therefore, how to prevent cracker from restoring real user login information from ciphertext, be those skilled in the art Urgent problem to be solved.
Summary of the invention
The main purpose of the application is to provide a kind of data ciphering method, system, client and computer-readable storage Medium, it is intended to solve the problems, such as it is existing directly to user login information circulation encryption for several times when still remain the possibility that is cracked, The encryption intensity of user login information is promoted, a possibility that being cracked is reduced.
To achieve the above object, this application provides a kind of data ciphering methods, this method comprises:
S101: the logon information of user's input is received, and characteristic parameter is calculated according to the log-on message;
S102: the logon information is encrypted, and using logon information after obtained encryption as initial ciphertext;
S103: encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, and obtains encrypted result, and simultaneously Encryption number is increased by 1;Wherein, the initial value of the encryption number is 1;
S104: judging whether current encryption number is greater than or equal to predetermined encryption number, if it is S106 is executed, otherwise Execute S105;
S105: using current encrypted result as new ciphertext, and S103 is returned to;
S106: using current encrypted result as final ciphertext, and by the final ciphertext be sent to destination server into Row verifying.
Optionally, encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, and obtains encrypted result, is wrapped It includes:
The data being made of current ciphertext and the characteristic parameter are combined and carry out operation using SHA512 algorithm, are obtained First operation result;
Operation is carried out using MD5 algorithm to first operation result, obtains the encrypted result.
Optionally, before encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, further includes:
The last Encryption Algorithm used of inquiry, obtains the first algorithm;
It is chosen by default selection rule and obtains second algorithm different from first algorithm;
Corresponding, encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, comprising:
It is combined using second algorithm for encryption by the data that current ciphertext and the characteristic parameter are constituted.
Optionally, the constituted mode of the data combination includes:
The characteristic parameter is inserted into the presetting digit capacity of current ciphertext, the data combination is obtained.
Optionally, the data ciphering method further include:
For the first time using the user login information log in the destination server when, by the characteristic parameter and it is described most Whole ciphertext is sent to the destination server together and is saved.
To achieve the above object, present invention also provides a kind of data encryption system, which includes:
Acquisition of information and feature calculation unit, for receiving the logon information of user's input, and according to the log-on message Characteristic parameter is calculated;
Logon information encryption unit, for encrypting the logon information, and using logon information after obtained encryption as just The ciphertext of beginning;
Data combine encryption unit, are combined, are obtained by the data that current ciphertext and the characteristic parameter are constituted for encrypting Encryption number is increased by 1 to encrypted result, and simultaneously;Wherein, the initial value of the encryption number is 1;
Frequency judging unit is encrypted, whether the encryption number for judging current is greater than or equal to predetermined encryption number;
New ciphertext generates and jump-transfer unit, will if being less than the predetermined encryption number not for current encryption number Current encrypted result jumps to the data combination encryption unit as new ciphertext;
Final ciphertext generates and transmission unit, if being greater than or equal to the predetermined encryption for current encryption number Number, then using current encrypted result as final ciphertext, and be sent to destination server for the final ciphertext and verify.
Optionally, the data combination encryption unit includes:
SHA512 operation subelement, for combining utilization to the data being made of current ciphertext and the characteristic parameter SHA512 algorithm carries out operation, obtains the first operation result;
MD5 operation subelement obtains the encryption for carrying out operation using MD5 algorithm to first operation result As a result.
Optionally, the data encryption system further include:
Last time uses Encryption Algorithm determination unit, for what is be made of in encryption current ciphertext and the characteristic parameter Before data combination, the last Encryption Algorithm used of inquiry obtains the first algorithm;
Encryption Algorithm selection unit is used next time, is obtained with first algorithm not for choosing by default selection rule The second same algorithm;
Corresponding, the data combination encryption unit includes:
Second algorithm for encryption subelement, for using second algorithm for encryption by current ciphertext and the characteristic parameter The data of composition combine.
Optionally, the data encryption system further include:
Logon information transmission unit for the first time, for logging in the destination server using the user login information for the first time When, the characteristic parameter and the final ciphertext are sent to the destination server together and saved.
To achieve the above object, present invention also provides a kind of client, the client include memory, processor and Bus is stored with the log-on message encipheror that can be run on the processor on the memory, and the log-on message adds Close program is transferred to the processor by the bus, and realizes when being executed by the processor as above content is retouched The data ciphering method stated.
To achieve the above object, the application still further provides a kind of computer readable storage medium, the computer Log-on message encipheror is stored on readable storage medium storing program for executing, the log-on message encipheror can be handled by one or more Device executes, to realize the data ciphering method as described in above content.
Obviously, data ciphering method provided by the present application, is different from conventional circulation cipher mode, and the application passes through every The mode for increasing characteristic parameter on the basis of the encrypted result obtained after secondary encryption come so that the basic data encrypted every time not Unanimously, even if being guessed by the algorithm of circulation encryption, the ciphertext that cracker finally can not also obtain from Tuo Ku is after inversely cracking Real, available user login information is obtained, so that user login information is more pacified under the protection of higher encryption intensity Full preservation.The application additionally provides a kind of data encryption system, client and computer readable storage medium simultaneously, has upper Beneficial effect is stated, details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of data ciphering method provided by the embodiments of the present application;
Constructive method and data combination of the Fig. 2 for data combination a kind of in data ciphering method provided by the embodiments of the present application Encryption method flow chart;
Fig. 3 is a kind of structural block diagram of data encryption system provided by the embodiments of the present application;
Fig. 4 is a kind of structural schematic diagram of client provided by the embodiments of the present application.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein Or the sequence other than the content of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that Cover it is non-exclusive include, for example, containing the process, method, system, product or equipment of a series of steps or units need not limit In step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, produce The other step or units of product or equipment inherently.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims Protection scope within.
Embodiment one
Referring to Figure 1, Fig. 1 is a kind of flow chart of data ciphering method provided by the embodiments of the present application, it should be noted that, Scheme provided in this embodiment is mainly used under Client/Server mode, and user inputs logging in for oneself using client Information attempts to log on in the scene for the personal account that destination server or destination server provide, for not logging in plaintext The considerations of information is transmitted in a network and saves in the server, server are to verify lander based on the ciphertext received to be It is no legal, therefore by the process that the plaintext logon information that user inputs is encrypted as ciphertext completed by client (Client), Therefore the executing subject of the present embodiment is client comprising following steps:
S101: the logon information of user's input is received, and characteristic parameter is calculated according to log-on message;
This step is intended to receive user by client defeated by information input equipment (keyboard, mouse, touch display screen etc.) The logon information entered, and one and the unique corresponding characteristic parameter of the logon information is calculated from logon information.Wherein, it steps on The land information overwhelming majority is made of user name and modification logging, certainly, be also not excluded for it is some there are the server of particular/special requirement or Some additional informations that login mechanism requires in addition, such as user device type, OS Type, and can limit Equipment unique identifier of beaching accommodation etc..This feature parameter as with the unique corresponding parameter of the logon information, will be used for It constitutes data with the encrypted result obtained after last encryption when in the next steps as each circulation encryption to combine, purpose exists In making on the basis of conventional recycle encryption technology, the former number being encrypted every time is made by way of increasing this feature parameter According to different, rather than simply a former data are repeatedly encrypted, so that can not be by simply repeatedly inversely cracking Obtain correct plaintext logon information.
Specifically, being calculated there are many modes of characteristic parameter according to logon information, Hash simply can be directly utilized Algorithm will cryptographic Hash corresponding with logon information as characteristic parameter, it is complicated, can also be with customized certain special character strings Extracting rule intercepts out some characters under some position in the logon information being collected into, and combines it according to certain rules For character string, and as characteristic parameter, etc..Characteristic parameter described in this step is stepped on based on each user is corresponding Land information is calculated, therefore can make each characteristic parameter and each user based on unified calculation of characteristic parameters method It is unique corresponding.And characteristic parameter can also select a random number by the way of simpler or more unified in fact at random Or current timestamp and it is universal apply during the data formed after each user combine, but compared to based on logging in letter The characteristic parameter being calculated is ceased, no unique corresponding relation, more unified characteristic parameter are beneficial to the broken of malice cracker Solution, it is assumed that there is a ciphertext to be cracked out discovery so that the different characteristic parameter of former data encrypted every time is random number " 2 ", malice cracker may will hold this characteristic parameter carry out it is more massive crack operation, and more visitors can be obtained Family information, and the characteristic parameter being calculated based on logon information from crack difficulty and application to be all significantly better than use above simpler The mode of single random number or timestamp.
S102: encryption logon information, and using logon information after obtained encryption as initial ciphertext;
On the basis of S101, this step is intended to first encrypt the logon information of plaintext for the first time, and will obtain Logon information is as initial ciphertext after encryption.
S103: encryption is combined by the data that current ciphertext and characteristic parameter are constituted, and obtains encrypted result, and will be added simultaneously Close number increases by 1;
On the basis of S102, this step is intended to constitute data by current ciphertext and characteristic parameter first and combine, and connects down It combines to obtain encrypted result to encrypt the data, and after the encryption for completing once to combine data, encryption number is increased by 1, Wherein, the initial value for encrypting number is 0.
S104: judging whether current encryption number is greater than or equal to predetermined encryption number, if it is S106 is executed, otherwise Execute S105;
On the basis of S103, this step is intended to sentence by the way that whether current encryption is greater than or equal to predetermined encryption number Whether the encryption number for breaking current is consistent with predetermined encryption number.For example, it is assumed that S103 is to encrypt for the first time, then current Encrypting number is 1, can be because of the 1 and 5 inconsistent judging results for obtaining "No" if predetermined encryption number is 5, corresponding subsequent step Rapid S105;If S103 has been the 5th encryption, then current encryption number is exactly 5, then consistent "Yes" can be obtained because of 5 and 5 Judging result, corresponding subsequent step S106.
S105: using current encrypted result as new ciphertext, and S103 is jumped to;
This step is established on the basis of the judging result of S104 is less than predetermined encryption number for current encryption number (i.e. It is inconsistent), illustrate that current crypto number is also not up to predetermined encryption number, therefore also need to repeat ciphering process, is obtained current The encrypted result arrived jumps to that S103 reuses updated ciphertext and characteristic parameter constitutes new number as new ciphertext According to combination, to carry out new primary encryption, after so recycling enough predetermined encryption numbers, it will judged again in S104 When, S106 is jumped to because obtaining the judging result of "Yes".
S106: using current encrypted result as final ciphertext, and final ciphertext is sent to destination server and is tested Card.
This step is established on the basis of the judging result of S104 is that current encryption number and predetermined encryption number are consistent, Illustrate that current crypto number has had reached predetermined encryption number, meets the condition for jumping out circulation encryption, therefore current is added Final ciphertext is sent to destination server and verified by close result as final ciphertext.Still assume predetermined encryption number It is 5, then be after encryption on the basis of logon information by the final ciphertext that destination server saves at this time, joins with feature for 5 times What number composition data combination obtained after being re-encrypted.
In order to make it easy to understand, for example, it is assumed that logon information is the combination of user name Admin and password 12345, encryption Logon information is X afterwards, and calculated characteristic parameter is Y, then the first encryption is to encrypt to be combined by the data that X and Y are constituted, is obtained X1;Second of encryption is to encrypt to be combined by the data that X1 and Y are constituted, and obtains X2;Third time is encrypted to be made of X2 and Y Data combination, obtains X3;4th encryption is to encrypt to be combined by the data that X3 and Y are constituted, and obtains X4;Last time encryption is to add The close data being made of X4 and Y combine, and obtain X5, and X5 is sent to destination server as final ciphertext and is verified.
It should be noted that logging in and being registered on the destination server for the first time in user and be, it is also necessary to by final ciphertext It is sent to server together with characteristic parameter to be saved, wherein final ciphertext is for testing subsequent log in of same user Card, server unlocks one layer therein when characteristic parameter then is used to need, and whether verifying wherein includes and this feature parameter one The character string of cause, to realize safer verifying.
Based on above-mentioned example, it is assumed that the database of the destination server is dragged library, then drag that library person takes will be Ciphertext, since these ciphertexts generate by the way of the encryption of above-mentioned circulation, even if library person is dragged to guess the Encryption Algorithm used And then by the way of inversely cracking, due to the presence of Y, eventually leads to it and obtain being also some messy codes after decryption 5 times, therefore The logon information of user is able to safer form and is saved.
Further, the mode for how constituting data combination also has very much, such as simplest can directly be arranged in Y Mode after or before X constitutes data combination, relatively easy in this way, and more responsible can also be inserted into the X generated every time for Y N to be located at N+1 intermediate, or even the digit for constituting be inserted into when data combine every time can also be changed in a certain order N is more difficult to that the person of being cracked is reverse or Brute Force so that the data combination constituted is more responsible for.
Further, can also every time to data combination encrypt when using different Encryption Algorithm, further plus Strong encryption intensity, specifically, add every time using the algorithm that sequencing table carrys out requirement according to preset Encryption Algorithm It is close.Even, can also constitute every time data combination be but some other variations is done to Y without using constant Y so that Encryption intensity is further strengthened.It herein and is not specifically limited, specifically how to select to be provided according to practical application scene The most suitable mode of requirement flexible choice.
Based on data ciphering method provided in this embodiment, be different from conventional circulation cipher mode, the application by The mode for increasing characteristic parameter on the basis of the encrypted result obtained after encryption every time is come so that the basic data encrypted every time is equal Inconsistent, even if being guessed by the algorithm of circulation encryption, the ciphertext that cracker finally can not also obtain from Tuo Ku is inversely cracked After obtain real, available user login information so that user login information is able to more under the protection of higher encryption intensity The preservation of safety.
Embodiment two
Fig. 2 is referred to, Fig. 2 is a kind of constructive method of data combination in data ciphering method provided by the embodiments of the present application And the flow chart of the encryption method of data combination, on the basis of example 1, the present embodiment is directed in S103 how to constitute number A kind of concrete implementation mode is provided according to combination, is included the following steps:
S201: characteristic parameter is inserted into the presetting digit capacity of current ciphertext, obtains data combination;
This step, which is used, is inserted into the presetting digit capacity into current ciphertext for characteristic parameter (being equal to the Y in the example above) In mode come obtain data combination.
S202: operation is carried out using SHA512 algorithm to data combination, obtains the first operation result;
S203: operation is carried out using MD5 algorithm to the first operation result, obtains encrypted result.
S202 carries out operation with data combination of the SHA512 algorithm to formation first, obtains first on the basis of S201 Operation result carries out operation to the first operation result in MD5 algorithm, obtains encrypted result.
SHA512 algorithm and MD5 algorithm be from MD4 algorithm development, be all fundamentally a kind of hash algorithm (or Claim hash function), the character string of certain length can be reduced to the character string of regular length, and substantially irreversible.
The present embodiment on the basis of example 1, provides a kind of mode of a certain position by characteristic parameter insertion ciphertext It is combined to constitute data, makess it more difficult to split out correct two parts from data combination, so that cracking difficulty It is higher, and after forming data, successively use SHA512 and MD5 algorithm to carry out operation twice as primary complete encrypted Journey more reduces a possibility that being cracked due to the particularity of SHA512 and MD5.
Because situation is complicated, it can not enumerate and be illustrated, those skilled in the art should be able to recognize according to the application The basic skills principle combination actual conditions of offer may exist many examples, in the case where not paying enough creative works, It should within the scope of protection of this application.
Embodiment three
Fig. 3 is referred to, Fig. 3 is a kind of structural block diagram of data encryption system provided by the embodiments of the present application, which adds Close system may include:
Acquisition of information and feature calculation unit 100, for receiving the logon information of user's input, and according to log-on message meter Calculation obtains characteristic parameter;
Logon information encryption unit 200, for encrypting logon information, and using logon information after obtained encryption as initial Ciphertext;
Data combine encryption unit 300, are combined, are obtained by the data that current ciphertext and characteristic parameter are constituted for encrypting Encrypted result, and encryption number is increased by 1 simultaneously;Wherein, the initial value for encrypting number is 1;
Frequency judging unit 400 is encrypted, whether the encryption number for judging current is greater than or equal to predetermined encryption number;
New ciphertext generates and jump-transfer unit 500, will be current if being less than predetermined encryption number for current encryption number Encrypted result as new ciphertext, and jump to data combination encryption unit;
Final ciphertext generates and transmission unit 600, if being greater than or equal to predetermined encryption number for current encryption number, Then using current encrypted result as final ciphertext, and final ciphertext is sent to destination server and is saved.
Wherein, data combination encryption unit 300 may include:
SHA512 operation subelement utilizes SHA512 for combining to the data being made of current ciphertext and characteristic parameter Algorithm carries out operation, obtains the first operation result;
MD5 operation subelement obtains encrypted result for carrying out operation using MD5 algorithm to the first operation result.
Further, which can also include:
Last time uses Encryption Algorithm determination unit, the data for being made of in encryption current ciphertext and characteristic parameter Before combination, the last Encryption Algorithm used of inquiry obtains the first algorithm;
Encryption Algorithm selection unit is used next time, it is different from the first algorithm for being obtained by default selection rule selection Second algorithm;
Corresponding, data combination encryption unit 300 may include:
Second algorithm for encryption subelement, the number for being made of using the second algorithm for encryption current ciphertext and characteristic parameter According to combination.
Further, which can also include:
Characteristic parameter sends extra cell for the first time, is used for when using user login information to log in opposite end server for the first time, Characteristic parameter is sent to opposite end server to save together with final ciphertext.
Data encryption system provided in this embodiment is corresponding with the data ciphering method that embodiment one provides, the present embodiment Exist as product embodiments corresponding with Solution Embodiments, there is beneficial effect identical with embodiment of the method, herein no longer It repeats one by one.
Example IV
By above-mentioned several embodiments to how it is upper it is primary encrypt obtain encrypted result on the basis of increase feature ginseng Several modes is described in detail to carry out circulation encryption, and the application also provides a kind of entity hardware corresponding with this method Device, this partial content principle is corresponding with scheme section, and details are not described herein again for the part of realization principle, below will be to the entity The hardware composition of hardware device is described, and refers to Fig. 4, and Fig. 4 is a kind of structure of client provided by the embodiments of the present application Schematic diagram:
The client 700 includes memory 710, processor 720 and bus 730, is stored with and can locate on memory 710 The data encryption program run on reason device 720, which is transmitted to processor 720 by bus 730, and is being located Reason device 720 can realize the step as described in above-described embodiment when executing.
Wherein, memory 710 includes at least a type of readable storage medium storing program for executing, and readable storage medium storing program for executing includes flash memory, hard Disk, multimedia card, card-type memory (for example, SD or DX memory etc.), magnetic storage, disk, CD etc..Memory 710 It can be the internal storage unit of client 700, such as the hard disk of client 700 in some embodiments.Memory 710 is another It is also possible to the plug-in type hard disk being equipped on the External memory equipment of client 700, such as client 700 in some embodiments, Intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, memory 710 can also be made of internal storage unit and External memory equipment simultaneously simultaneously.Into one Step, memory 710 can be not only used for various application software and the Various types of data that storage is installed in client 700, may be used also For temporarily storing the data that has exported or will export.
Processor 720 can be in some embodiments central processing unit (Central Processing Unit, CPU), Controller, microcontroller, microprocessor or other data processing chips, the program code for being stored in run memory 710 Or processing data, such as execute logon information encipheror etc..
Bus 730 can be Peripheral Component Interconnect standard (peripheral component interconnect, abbreviation PCI) bus or expanding the industrial standard structure (extended industry standard architecture, abbreviation EISA) Bus etc..The bus can be divided into address bus, data/address bus, control bus etc..For convenient for indicating, only with one pair in Fig. 4 It is indicated to hollow index line, it is not intended that an only bus or a type of bus.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.In several embodiments provided herein, it should be understood that disclosed system, device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
It, can if integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product To be stored in a computer readable storage medium.Based on this understanding, the technical solution of the application substantially or Say that all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products Out, which is stored in a storage medium, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes the method gone out given in each embodiment of the application All or part of the steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
It should be noted that the serial number of the above embodiments of the invention is only for description, do not represent the advantages or disadvantages of the embodiments.And The terms "include", "comprise" herein or any other variant thereof is intended to cover non-exclusive inclusion, so that packet Process, device, article or the method for including a series of elements not only include those elements, but also including being not explicitly listed Other element, or further include for this process, device, article or the intrinsic element of method.Do not limiting more In the case where, the element that is limited by sentence "including a ...", it is not excluded that including process, device, the article of the element Or there is also other identical elements in method.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of data ciphering method, which is characterized in that the data ciphering method includes:
S101: the logon information of user's input is received, and characteristic parameter is calculated according to the log-on message;
S102: the logon information is encrypted, and using logon information after obtained encryption as initial ciphertext;
S103: encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, and obtains encrypted result, and will be added simultaneously Close number increases by 1;Wherein, the initial value of the encryption number is 1;
S104: judging whether current encryption number is greater than or equal to predetermined encryption number, if it is S106 is executed, otherwise executes S105;
S105: using current encrypted result as new ciphertext, and S103 is returned to;
S106: using current encrypted result as final ciphertext, and the final ciphertext is sent to destination server and is tested Card.
2. data ciphering method according to claim 1, which is characterized in that encryption is joined by current ciphertext and the feature The data combination that number is constituted, obtains encrypted result, comprising:
The data being made of current ciphertext and the characteristic parameter are combined and carry out operation using SHA512 algorithm, obtain first Operation result;
Operation is carried out using MD5 algorithm to first operation result, obtains the encrypted result.
3. data ciphering method according to claim 1, which is characterized in that in encryption by current ciphertext and the feature Before the data combination that parameter is constituted, further includes:
The last Encryption Algorithm used of inquiry, obtains the first algorithm;
It is chosen by default selection rule and obtains second algorithm different from first algorithm;
Corresponding, encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, comprising:
It is combined using second algorithm for encryption by the data that current ciphertext and the characteristic parameter are constituted.
4. data ciphering method according to any one of claims 1 to 3, which is characterized in that the composition of the data combination Mode includes:
The characteristic parameter is inserted into the presetting digit capacity of current ciphertext, the data combination is obtained.
5. data ciphering method according to claim 4, which is characterized in that further include:
When logging in the destination server using the user login information for the first time, by the characteristic parameter and described final close Text is sent to the destination server together and is saved.
6. a kind of data encryption system, which is characterized in that the data encryption system includes:
Acquisition of information and feature calculation unit are calculated for receiving the logon information of user's input, and according to the log-on message Obtain characteristic parameter;
Logon information encryption unit, for encrypting the logon information, and using logon information after obtained encryption as initial Ciphertext;
Data combine encryption unit, are combined, are added by the data that current ciphertext and the characteristic parameter are constituted for encrypting It is close as a result, simultaneously simultaneously will encryption number increase by 1;Wherein, the initial value of the encryption number is 1;
Frequency judging unit is encrypted, whether the encryption number for judging current is greater than or equal to predetermined encryption number;
New ciphertext generates and jump-transfer unit, will be current if being less than the predetermined encryption number for current encryption number Encrypted result jumps to the data combination encryption unit as new ciphertext;
Final ciphertext generates and transmission unit, if being greater than or equal to the predetermined encryption number for current encryption number, Using current encrypted result as final ciphertext, and the final ciphertext is sent to destination server and is verified.
7. data encryption system according to claim 6, which is characterized in that the data combine encryption unit and include:
SHA512 operation subelement utilizes SHA512 for combining to the data being made of current ciphertext and the characteristic parameter Algorithm carries out operation, obtains the first operation result;
MD5 operation subelement obtains the encrypted result for carrying out operation using MD5 algorithm to first operation result.
8. a kind of client, which is characterized in that the client includes memory, processor and bus, is deposited on the memory The log-on message encipheror that can be run on the processor is contained, the log-on message encipheror passes through the bus quilt It is transmitted to the processor, and realizes following steps when being executed by the processor:
S101: the logon information of user's input is received, and characteristic parameter is calculated according to the log-on message;
S102: the logon information is encrypted, and using logon information after obtained encryption as initial ciphertext;
S103: encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, and obtains encrypted result, and will be added simultaneously Close number increases by 1;Wherein, the initial value of the encryption number is 1;
S104: judging whether current encryption number is greater than or equal to predetermined encryption number, if it is executes S106, otherwise holds Row S105;
S105: using current encrypted result as new ciphertext, and S103 is returned to;
S106: using current encrypted result as final ciphertext, and the final ciphertext is sent to destination server and is tested Card.
9. client according to claim 8, which is characterized in that the log-on message encipheror is held by the processor It is also realized when row:
When logging in the destination server using the user login information for the first time, by the characteristic parameter and described final close Text is sent to the destination server together and is saved.
10. a kind of computer readable storage medium, which is characterized in that be stored with login letter on the computer readable storage medium Encryption for information program, the log-on message encipheror can be executed by one or more processor, with realize as claim 1 to 5 described in any item data ciphering methods.
CN201910217660.8A 2019-03-21 2019-03-21 A kind of data ciphering method, system, client and computer readable storage medium Pending CN109918877A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910217660.8A CN109918877A (en) 2019-03-21 2019-03-21 A kind of data ciphering method, system, client and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910217660.8A CN109918877A (en) 2019-03-21 2019-03-21 A kind of data ciphering method, system, client and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109918877A true CN109918877A (en) 2019-06-21

Family

ID=66966169

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910217660.8A Pending CN109918877A (en) 2019-03-21 2019-03-21 A kind of data ciphering method, system, client and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109918877A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314321A (en) * 2020-01-21 2020-06-19 深圳前海环融联易信息科技服务有限公司 Parameter encryption management method and device, computer equipment and storage medium
CN113268748A (en) * 2021-04-28 2021-08-17 四川万信数字科技有限公司 Commercial password security management system based on mobile payment terminal
CN116776346A (en) * 2023-06-08 2023-09-19 南京师范大学常州创新发展研究院 Data security management system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488848A (en) * 2008-02-13 2009-07-22 刘海云 Ciphering method for generating cipher code recognition information
CN104134048A (en) * 2014-07-31 2014-11-05 宇龙计算机通信科技(深圳)有限公司 Method and device for encrypting memory card
CN104683111A (en) * 2015-03-18 2015-06-03 中国联合网络通信集团有限公司 Encryption method and system based on MD5
CN105721390A (en) * 2014-12-01 2016-06-29 阿里巴巴集团控股有限公司 Encrypted storage method and encrypted storage device
CN106656972A (en) * 2016-10-14 2017-05-10 郑州云海信息技术有限公司 Data encryption method and device
CN108055274A (en) * 2017-12-22 2018-05-18 广东工业大学 A kind of encryption based on alliance's chain storage data and shared method and system
CN108462574A (en) * 2018-02-12 2018-08-28 广东睿江云计算股份有限公司 A kind of lightweight cipher encrypting method and system
CN109450622A (en) * 2018-10-16 2019-03-08 平安普惠企业管理有限公司 Data ciphering method, data verification method, device, equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488848A (en) * 2008-02-13 2009-07-22 刘海云 Ciphering method for generating cipher code recognition information
CN104134048A (en) * 2014-07-31 2014-11-05 宇龙计算机通信科技(深圳)有限公司 Method and device for encrypting memory card
CN105721390A (en) * 2014-12-01 2016-06-29 阿里巴巴集团控股有限公司 Encrypted storage method and encrypted storage device
CN104683111A (en) * 2015-03-18 2015-06-03 中国联合网络通信集团有限公司 Encryption method and system based on MD5
CN106656972A (en) * 2016-10-14 2017-05-10 郑州云海信息技术有限公司 Data encryption method and device
CN108055274A (en) * 2017-12-22 2018-05-18 广东工业大学 A kind of encryption based on alliance's chain storage data and shared method and system
CN108462574A (en) * 2018-02-12 2018-08-28 广东睿江云计算股份有限公司 A kind of lightweight cipher encrypting method and system
CN109450622A (en) * 2018-10-16 2019-03-08 平安普惠企业管理有限公司 Data ciphering method, data verification method, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵力: "打造一个安全的用户名密码登陆系统", 《计算机与网络》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314321A (en) * 2020-01-21 2020-06-19 深圳前海环融联易信息科技服务有限公司 Parameter encryption management method and device, computer equipment and storage medium
CN113268748A (en) * 2021-04-28 2021-08-17 四川万信数字科技有限公司 Commercial password security management system based on mobile payment terminal
CN116776346A (en) * 2023-06-08 2023-09-19 南京师范大学常州创新发展研究院 Data security management system
CN116776346B (en) * 2023-06-08 2024-03-05 南京师范大学常州创新发展研究院 Data security management system

Similar Documents

Publication Publication Date Title
CN105512881B (en) A kind of method and terminal for completing payment based on two dimensional code
EP3255832B1 (en) Dynamic encryption method, terminal and server
CN109918877A (en) A kind of data ciphering method, system, client and computer readable storage medium
CN109766479B (en) Data processing method and device, electronic equipment and storage medium
CN105701423B (en) Date storage method and device applied to high in the clouds payment transaction
CN104426847A (en) Method, system and server for securely accessing and verifying an Internet service
CN109150903A (en) A kind of account management method, device, storage medium and terminal device
CN107094261A (en) The authorization check method and device of video playback
CN110224999A (en) Information interacting method, device and storage medium
CN110061967A (en) Business datum providing method, device, equipment and computer readable storage medium
CN108777685A (en) Method and apparatus for handling information
CN107040799A (en) The authorization check method and device of video playback
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN113839780A (en) Encryption method, decryption method, server and storage medium
CN111327561B (en) Authentication method, system, authentication server, and computer-readable storage medium
CN110266653B (en) Authentication method, system and terminal equipment
CN103592927A (en) Method for binding product server and service function through license
CN106664535A (en) Information sending method and apparatus, terminal device, and system
CN110493251A (en) A kind of data processing method, device, electronic equipment and storage medium
CN112235104B (en) Data encryption transmission method, system, terminal and storage medium
CN111368322B (en) File decryption method and device, electronic equipment and storage medium
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN112039876A (en) Data ferrying method, device, equipment and medium
CN109977692B (en) Data processing method and device, storage medium and electronic equipment
CN104917763B (en) A kind of PIN cache method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190621