CN109918877A - A kind of data ciphering method, system, client and computer readable storage medium - Google Patents
A kind of data ciphering method, system, client and computer readable storage medium Download PDFInfo
- Publication number
- CN109918877A CN109918877A CN201910217660.8A CN201910217660A CN109918877A CN 109918877 A CN109918877 A CN 109918877A CN 201910217660 A CN201910217660 A CN 201910217660A CN 109918877 A CN109918877 A CN 109918877A
- Authority
- CN
- China
- Prior art keywords
- encryption
- data
- ciphertext
- current
- characteristic parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000004364 calculation method Methods 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000012546 transfer Methods 0.000 claims description 3
- 238000005336 cracking Methods 0.000 abstract description 6
- 230000009286 beneficial effect Effects 0.000 abstract description 4
- 238000004321 preservation Methods 0.000 abstract description 3
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000002829 reductive effect Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000000670 limiting effect Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000004308 accommodation Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Abstract
This application discloses a kind of data ciphering methods; it is different from conventional circulation cipher mode; the application is by way of increasing characteristic parameter on the basis of the encrypted result obtained after encrypting every time come so that the basic data encrypted every time is inconsistent; even if being guessed by the algorithm of circulation encryption; the ciphertext that cracker finally can not also obtain from Tuo Ku obtains real, available user login information after inversely cracking, so that user login information is able to safer preservation under the protection of higher encryption intensity.The application further simultaneously discloses a kind of data encryption system, client and computer readable storage medium, has above-mentioned beneficial effect.
Description
Technical field
This application involves data security arts, in particular to a kind of data ciphering method, system, client and computer can
Read storage medium.
Background technique
In order to make that library person is dragged directly to protect according in database with plaintext version when server database is dragged library
The user login information deposited, the user login information would generally be encrypted at client, and clothes are sent in the form of ciphertext
Business device is saved.
It is existing in order to prevent by inversely cracking or Brute Force means restore the user login information of plaintext from ciphertext
There is technology usually using the mode of circulation encryption to increase the difficulty cracked, i.e., last encrypted result is calculated using identical encryption
Method is re-encrypted, but in the case where having plenty of time, and real user login information still remains the possibility for being reduced out
Property.
Therefore, how to prevent cracker from restoring real user login information from ciphertext, be those skilled in the art
Urgent problem to be solved.
Summary of the invention
The main purpose of the application is to provide a kind of data ciphering method, system, client and computer-readable storage
Medium, it is intended to solve the problems, such as it is existing directly to user login information circulation encryption for several times when still remain the possibility that is cracked,
The encryption intensity of user login information is promoted, a possibility that being cracked is reduced.
To achieve the above object, this application provides a kind of data ciphering methods, this method comprises:
S101: the logon information of user's input is received, and characteristic parameter is calculated according to the log-on message;
S102: the logon information is encrypted, and using logon information after obtained encryption as initial ciphertext;
S103: encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, and obtains encrypted result, and simultaneously
Encryption number is increased by 1;Wherein, the initial value of the encryption number is 1;
S104: judging whether current encryption number is greater than or equal to predetermined encryption number, if it is S106 is executed, otherwise
Execute S105;
S105: using current encrypted result as new ciphertext, and S103 is returned to;
S106: using current encrypted result as final ciphertext, and by the final ciphertext be sent to destination server into
Row verifying.
Optionally, encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, and obtains encrypted result, is wrapped
It includes:
The data being made of current ciphertext and the characteristic parameter are combined and carry out operation using SHA512 algorithm, are obtained
First operation result;
Operation is carried out using MD5 algorithm to first operation result, obtains the encrypted result.
Optionally, before encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, further includes:
The last Encryption Algorithm used of inquiry, obtains the first algorithm;
It is chosen by default selection rule and obtains second algorithm different from first algorithm;
Corresponding, encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, comprising:
It is combined using second algorithm for encryption by the data that current ciphertext and the characteristic parameter are constituted.
Optionally, the constituted mode of the data combination includes:
The characteristic parameter is inserted into the presetting digit capacity of current ciphertext, the data combination is obtained.
Optionally, the data ciphering method further include:
For the first time using the user login information log in the destination server when, by the characteristic parameter and it is described most
Whole ciphertext is sent to the destination server together and is saved.
To achieve the above object, present invention also provides a kind of data encryption system, which includes:
Acquisition of information and feature calculation unit, for receiving the logon information of user's input, and according to the log-on message
Characteristic parameter is calculated;
Logon information encryption unit, for encrypting the logon information, and using logon information after obtained encryption as just
The ciphertext of beginning;
Data combine encryption unit, are combined, are obtained by the data that current ciphertext and the characteristic parameter are constituted for encrypting
Encryption number is increased by 1 to encrypted result, and simultaneously;Wherein, the initial value of the encryption number is 1;
Frequency judging unit is encrypted, whether the encryption number for judging current is greater than or equal to predetermined encryption number;
New ciphertext generates and jump-transfer unit, will if being less than the predetermined encryption number not for current encryption number
Current encrypted result jumps to the data combination encryption unit as new ciphertext;
Final ciphertext generates and transmission unit, if being greater than or equal to the predetermined encryption for current encryption number
Number, then using current encrypted result as final ciphertext, and be sent to destination server for the final ciphertext and verify.
Optionally, the data combination encryption unit includes:
SHA512 operation subelement, for combining utilization to the data being made of current ciphertext and the characteristic parameter
SHA512 algorithm carries out operation, obtains the first operation result;
MD5 operation subelement obtains the encryption for carrying out operation using MD5 algorithm to first operation result
As a result.
Optionally, the data encryption system further include:
Last time uses Encryption Algorithm determination unit, for what is be made of in encryption current ciphertext and the characteristic parameter
Before data combination, the last Encryption Algorithm used of inquiry obtains the first algorithm;
Encryption Algorithm selection unit is used next time, is obtained with first algorithm not for choosing by default selection rule
The second same algorithm;
Corresponding, the data combination encryption unit includes:
Second algorithm for encryption subelement, for using second algorithm for encryption by current ciphertext and the characteristic parameter
The data of composition combine.
Optionally, the data encryption system further include:
Logon information transmission unit for the first time, for logging in the destination server using the user login information for the first time
When, the characteristic parameter and the final ciphertext are sent to the destination server together and saved.
To achieve the above object, present invention also provides a kind of client, the client include memory, processor and
Bus is stored with the log-on message encipheror that can be run on the processor on the memory, and the log-on message adds
Close program is transferred to the processor by the bus, and realizes when being executed by the processor as above content is retouched
The data ciphering method stated.
To achieve the above object, the application still further provides a kind of computer readable storage medium, the computer
Log-on message encipheror is stored on readable storage medium storing program for executing, the log-on message encipheror can be handled by one or more
Device executes, to realize the data ciphering method as described in above content.
Obviously, data ciphering method provided by the present application, is different from conventional circulation cipher mode, and the application passes through every
The mode for increasing characteristic parameter on the basis of the encrypted result obtained after secondary encryption come so that the basic data encrypted every time not
Unanimously, even if being guessed by the algorithm of circulation encryption, the ciphertext that cracker finally can not also obtain from Tuo Ku is after inversely cracking
Real, available user login information is obtained, so that user login information is more pacified under the protection of higher encryption intensity
Full preservation.The application additionally provides a kind of data encryption system, client and computer readable storage medium simultaneously, has upper
Beneficial effect is stated, details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of data ciphering method provided by the embodiments of the present application;
Constructive method and data combination of the Fig. 2 for data combination a kind of in data ciphering method provided by the embodiments of the present application
Encryption method flow chart;
Fig. 3 is a kind of structural block diagram of data encryption system provided by the embodiments of the present application;
Fig. 4 is a kind of structural schematic diagram of client provided by the embodiments of the present application.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing
The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage
The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein
Or the sequence other than the content of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that
Cover it is non-exclusive include, for example, containing the process, method, system, product or equipment of a series of steps or units need not limit
In step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, produce
The other step or units of product or equipment inherently.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot
It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the
One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment
Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution
Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims
Protection scope within.
Embodiment one
Referring to Figure 1, Fig. 1 is a kind of flow chart of data ciphering method provided by the embodiments of the present application, it should be noted that,
Scheme provided in this embodiment is mainly used under Client/Server mode, and user inputs logging in for oneself using client
Information attempts to log on in the scene for the personal account that destination server or destination server provide, for not logging in plaintext
The considerations of information is transmitted in a network and saves in the server, server are to verify lander based on the ciphertext received to be
It is no legal, therefore by the process that the plaintext logon information that user inputs is encrypted as ciphertext completed by client (Client),
Therefore the executing subject of the present embodiment is client comprising following steps:
S101: the logon information of user's input is received, and characteristic parameter is calculated according to log-on message;
This step is intended to receive user by client defeated by information input equipment (keyboard, mouse, touch display screen etc.)
The logon information entered, and one and the unique corresponding characteristic parameter of the logon information is calculated from logon information.Wherein, it steps on
The land information overwhelming majority is made of user name and modification logging, certainly, be also not excluded for it is some there are the server of particular/special requirement or
Some additional informations that login mechanism requires in addition, such as user device type, OS Type, and can limit
Equipment unique identifier of beaching accommodation etc..This feature parameter as with the unique corresponding parameter of the logon information, will be used for
It constitutes data with the encrypted result obtained after last encryption when in the next steps as each circulation encryption to combine, purpose exists
In making on the basis of conventional recycle encryption technology, the former number being encrypted every time is made by way of increasing this feature parameter
According to different, rather than simply a former data are repeatedly encrypted, so that can not be by simply repeatedly inversely cracking
Obtain correct plaintext logon information.
Specifically, being calculated there are many modes of characteristic parameter according to logon information, Hash simply can be directly utilized
Algorithm will cryptographic Hash corresponding with logon information as characteristic parameter, it is complicated, can also be with customized certain special character strings
Extracting rule intercepts out some characters under some position in the logon information being collected into, and combines it according to certain rules
For character string, and as characteristic parameter, etc..Characteristic parameter described in this step is stepped on based on each user is corresponding
Land information is calculated, therefore can make each characteristic parameter and each user based on unified calculation of characteristic parameters method
It is unique corresponding.And characteristic parameter can also select a random number by the way of simpler or more unified in fact at random
Or current timestamp and it is universal apply during the data formed after each user combine, but compared to based on logging in letter
The characteristic parameter being calculated is ceased, no unique corresponding relation, more unified characteristic parameter are beneficial to the broken of malice cracker
Solution, it is assumed that there is a ciphertext to be cracked out discovery so that the different characteristic parameter of former data encrypted every time is random number
" 2 ", malice cracker may will hold this characteristic parameter carry out it is more massive crack operation, and more visitors can be obtained
Family information, and the characteristic parameter being calculated based on logon information from crack difficulty and application to be all significantly better than use above simpler
The mode of single random number or timestamp.
S102: encryption logon information, and using logon information after obtained encryption as initial ciphertext;
On the basis of S101, this step is intended to first encrypt the logon information of plaintext for the first time, and will obtain
Logon information is as initial ciphertext after encryption.
S103: encryption is combined by the data that current ciphertext and characteristic parameter are constituted, and obtains encrypted result, and will be added simultaneously
Close number increases by 1;
On the basis of S102, this step is intended to constitute data by current ciphertext and characteristic parameter first and combine, and connects down
It combines to obtain encrypted result to encrypt the data, and after the encryption for completing once to combine data, encryption number is increased by 1,
Wherein, the initial value for encrypting number is 0.
S104: judging whether current encryption number is greater than or equal to predetermined encryption number, if it is S106 is executed, otherwise
Execute S105;
On the basis of S103, this step is intended to sentence by the way that whether current encryption is greater than or equal to predetermined encryption number
Whether the encryption number for breaking current is consistent with predetermined encryption number.For example, it is assumed that S103 is to encrypt for the first time, then current
Encrypting number is 1, can be because of the 1 and 5 inconsistent judging results for obtaining "No" if predetermined encryption number is 5, corresponding subsequent step
Rapid S105;If S103 has been the 5th encryption, then current encryption number is exactly 5, then consistent "Yes" can be obtained because of 5 and 5
Judging result, corresponding subsequent step S106.
S105: using current encrypted result as new ciphertext, and S103 is jumped to;
This step is established on the basis of the judging result of S104 is less than predetermined encryption number for current encryption number (i.e.
It is inconsistent), illustrate that current crypto number is also not up to predetermined encryption number, therefore also need to repeat ciphering process, is obtained current
The encrypted result arrived jumps to that S103 reuses updated ciphertext and characteristic parameter constitutes new number as new ciphertext
According to combination, to carry out new primary encryption, after so recycling enough predetermined encryption numbers, it will judged again in S104
When, S106 is jumped to because obtaining the judging result of "Yes".
S106: using current encrypted result as final ciphertext, and final ciphertext is sent to destination server and is tested
Card.
This step is established on the basis of the judging result of S104 is that current encryption number and predetermined encryption number are consistent,
Illustrate that current crypto number has had reached predetermined encryption number, meets the condition for jumping out circulation encryption, therefore current is added
Final ciphertext is sent to destination server and verified by close result as final ciphertext.Still assume predetermined encryption number
It is 5, then be after encryption on the basis of logon information by the final ciphertext that destination server saves at this time, joins with feature for 5 times
What number composition data combination obtained after being re-encrypted.
In order to make it easy to understand, for example, it is assumed that logon information is the combination of user name Admin and password 12345, encryption
Logon information is X afterwards, and calculated characteristic parameter is Y, then the first encryption is to encrypt to be combined by the data that X and Y are constituted, is obtained
X1;Second of encryption is to encrypt to be combined by the data that X1 and Y are constituted, and obtains X2;Third time is encrypted to be made of X2 and Y
Data combination, obtains X3;4th encryption is to encrypt to be combined by the data that X3 and Y are constituted, and obtains X4;Last time encryption is to add
The close data being made of X4 and Y combine, and obtain X5, and X5 is sent to destination server as final ciphertext and is verified.
It should be noted that logging in and being registered on the destination server for the first time in user and be, it is also necessary to by final ciphertext
It is sent to server together with characteristic parameter to be saved, wherein final ciphertext is for testing subsequent log in of same user
Card, server unlocks one layer therein when characteristic parameter then is used to need, and whether verifying wherein includes and this feature parameter one
The character string of cause, to realize safer verifying.
Based on above-mentioned example, it is assumed that the database of the destination server is dragged library, then drag that library person takes will be
Ciphertext, since these ciphertexts generate by the way of the encryption of above-mentioned circulation, even if library person is dragged to guess the Encryption Algorithm used
And then by the way of inversely cracking, due to the presence of Y, eventually leads to it and obtain being also some messy codes after decryption 5 times, therefore
The logon information of user is able to safer form and is saved.
Further, the mode for how constituting data combination also has very much, such as simplest can directly be arranged in Y
Mode after or before X constitutes data combination, relatively easy in this way, and more responsible can also be inserted into the X generated every time for Y
N to be located at N+1 intermediate, or even the digit for constituting be inserted into when data combine every time can also be changed in a certain order
N is more difficult to that the person of being cracked is reverse or Brute Force so that the data combination constituted is more responsible for.
Further, can also every time to data combination encrypt when using different Encryption Algorithm, further plus
Strong encryption intensity, specifically, add every time using the algorithm that sequencing table carrys out requirement according to preset Encryption Algorithm
It is close.Even, can also constitute every time data combination be but some other variations is done to Y without using constant Y so that
Encryption intensity is further strengthened.It herein and is not specifically limited, specifically how to select to be provided according to practical application scene
The most suitable mode of requirement flexible choice.
Based on data ciphering method provided in this embodiment, be different from conventional circulation cipher mode, the application by
The mode for increasing characteristic parameter on the basis of the encrypted result obtained after encryption every time is come so that the basic data encrypted every time is equal
Inconsistent, even if being guessed by the algorithm of circulation encryption, the ciphertext that cracker finally can not also obtain from Tuo Ku is inversely cracked
After obtain real, available user login information so that user login information is able to more under the protection of higher encryption intensity
The preservation of safety.
Embodiment two
Fig. 2 is referred to, Fig. 2 is a kind of constructive method of data combination in data ciphering method provided by the embodiments of the present application
And the flow chart of the encryption method of data combination, on the basis of example 1, the present embodiment is directed in S103 how to constitute number
A kind of concrete implementation mode is provided according to combination, is included the following steps:
S201: characteristic parameter is inserted into the presetting digit capacity of current ciphertext, obtains data combination;
This step, which is used, is inserted into the presetting digit capacity into current ciphertext for characteristic parameter (being equal to the Y in the example above)
In mode come obtain data combination.
S202: operation is carried out using SHA512 algorithm to data combination, obtains the first operation result;
S203: operation is carried out using MD5 algorithm to the first operation result, obtains encrypted result.
S202 carries out operation with data combination of the SHA512 algorithm to formation first, obtains first on the basis of S201
Operation result carries out operation to the first operation result in MD5 algorithm, obtains encrypted result.
SHA512 algorithm and MD5 algorithm be from MD4 algorithm development, be all fundamentally a kind of hash algorithm (or
Claim hash function), the character string of certain length can be reduced to the character string of regular length, and substantially irreversible.
The present embodiment on the basis of example 1, provides a kind of mode of a certain position by characteristic parameter insertion ciphertext
It is combined to constitute data, makess it more difficult to split out correct two parts from data combination, so that cracking difficulty
It is higher, and after forming data, successively use SHA512 and MD5 algorithm to carry out operation twice as primary complete encrypted
Journey more reduces a possibility that being cracked due to the particularity of SHA512 and MD5.
Because situation is complicated, it can not enumerate and be illustrated, those skilled in the art should be able to recognize according to the application
The basic skills principle combination actual conditions of offer may exist many examples, in the case where not paying enough creative works,
It should within the scope of protection of this application.
Embodiment three
Fig. 3 is referred to, Fig. 3 is a kind of structural block diagram of data encryption system provided by the embodiments of the present application, which adds
Close system may include:
Acquisition of information and feature calculation unit 100, for receiving the logon information of user's input, and according to log-on message meter
Calculation obtains characteristic parameter;
Logon information encryption unit 200, for encrypting logon information, and using logon information after obtained encryption as initial
Ciphertext;
Data combine encryption unit 300, are combined, are obtained by the data that current ciphertext and characteristic parameter are constituted for encrypting
Encrypted result, and encryption number is increased by 1 simultaneously;Wherein, the initial value for encrypting number is 1;
Frequency judging unit 400 is encrypted, whether the encryption number for judging current is greater than or equal to predetermined encryption number;
New ciphertext generates and jump-transfer unit 500, will be current if being less than predetermined encryption number for current encryption number
Encrypted result as new ciphertext, and jump to data combination encryption unit;
Final ciphertext generates and transmission unit 600, if being greater than or equal to predetermined encryption number for current encryption number,
Then using current encrypted result as final ciphertext, and final ciphertext is sent to destination server and is saved.
Wherein, data combination encryption unit 300 may include:
SHA512 operation subelement utilizes SHA512 for combining to the data being made of current ciphertext and characteristic parameter
Algorithm carries out operation, obtains the first operation result;
MD5 operation subelement obtains encrypted result for carrying out operation using MD5 algorithm to the first operation result.
Further, which can also include:
Last time uses Encryption Algorithm determination unit, the data for being made of in encryption current ciphertext and characteristic parameter
Before combination, the last Encryption Algorithm used of inquiry obtains the first algorithm;
Encryption Algorithm selection unit is used next time, it is different from the first algorithm for being obtained by default selection rule selection
Second algorithm;
Corresponding, data combination encryption unit 300 may include:
Second algorithm for encryption subelement, the number for being made of using the second algorithm for encryption current ciphertext and characteristic parameter
According to combination.
Further, which can also include:
Characteristic parameter sends extra cell for the first time, is used for when using user login information to log in opposite end server for the first time,
Characteristic parameter is sent to opposite end server to save together with final ciphertext.
Data encryption system provided in this embodiment is corresponding with the data ciphering method that embodiment one provides, the present embodiment
Exist as product embodiments corresponding with Solution Embodiments, there is beneficial effect identical with embodiment of the method, herein no longer
It repeats one by one.
Example IV
By above-mentioned several embodiments to how it is upper it is primary encrypt obtain encrypted result on the basis of increase feature ginseng
Several modes is described in detail to carry out circulation encryption, and the application also provides a kind of entity hardware corresponding with this method
Device, this partial content principle is corresponding with scheme section, and details are not described herein again for the part of realization principle, below will be to the entity
The hardware composition of hardware device is described, and refers to Fig. 4, and Fig. 4 is a kind of structure of client provided by the embodiments of the present application
Schematic diagram:
The client 700 includes memory 710, processor 720 and bus 730, is stored with and can locate on memory 710
The data encryption program run on reason device 720, which is transmitted to processor 720 by bus 730, and is being located
Reason device 720 can realize the step as described in above-described embodiment when executing.
Wherein, memory 710 includes at least a type of readable storage medium storing program for executing, and readable storage medium storing program for executing includes flash memory, hard
Disk, multimedia card, card-type memory (for example, SD or DX memory etc.), magnetic storage, disk, CD etc..Memory 710
It can be the internal storage unit of client 700, such as the hard disk of client 700 in some embodiments.Memory 710 is another
It is also possible to the plug-in type hard disk being equipped on the External memory equipment of client 700, such as client 700 in some embodiments,
Intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash
Card) etc..Further, memory 710 can also be made of internal storage unit and External memory equipment simultaneously simultaneously.Into one
Step, memory 710 can be not only used for various application software and the Various types of data that storage is installed in client 700, may be used also
For temporarily storing the data that has exported or will export.
Processor 720 can be in some embodiments central processing unit (Central Processing Unit, CPU),
Controller, microcontroller, microprocessor or other data processing chips, the program code for being stored in run memory 710
Or processing data, such as execute logon information encipheror etc..
Bus 730 can be Peripheral Component Interconnect standard (peripheral component interconnect, abbreviation
PCI) bus or expanding the industrial standard structure (extended industry standard architecture, abbreviation EISA)
Bus etc..The bus can be divided into address bus, data/address bus, control bus etc..For convenient for indicating, only with one pair in Fig. 4
It is indicated to hollow index line, it is not intended that an only bus or a type of bus.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.In several embodiments provided herein, it should be understood that disclosed system, device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit
It connects, can be electrical property, mechanical or other forms.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit
Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks
On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
It, can if integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product
To be stored in a computer readable storage medium.Based on this understanding, the technical solution of the application substantially or
Say that all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products
Out, which is stored in a storage medium, including some instructions are used so that a computer equipment
(can be personal computer, server or the network equipment etc.) executes the method gone out given in each embodiment of the application
All or part of the steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
It should be noted that the serial number of the above embodiments of the invention is only for description, do not represent the advantages or disadvantages of the embodiments.And
The terms "include", "comprise" herein or any other variant thereof is intended to cover non-exclusive inclusion, so that packet
Process, device, article or the method for including a series of elements not only include those elements, but also including being not explicitly listed
Other element, or further include for this process, device, article or the intrinsic element of method.Do not limiting more
In the case where, the element that is limited by sentence "including a ...", it is not excluded that including process, device, the article of the element
Or there is also other identical elements in method.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of data ciphering method, which is characterized in that the data ciphering method includes:
S101: the logon information of user's input is received, and characteristic parameter is calculated according to the log-on message;
S102: the logon information is encrypted, and using logon information after obtained encryption as initial ciphertext;
S103: encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, and obtains encrypted result, and will be added simultaneously
Close number increases by 1;Wherein, the initial value of the encryption number is 1;
S104: judging whether current encryption number is greater than or equal to predetermined encryption number, if it is S106 is executed, otherwise executes
S105;
S105: using current encrypted result as new ciphertext, and S103 is returned to;
S106: using current encrypted result as final ciphertext, and the final ciphertext is sent to destination server and is tested
Card.
2. data ciphering method according to claim 1, which is characterized in that encryption is joined by current ciphertext and the feature
The data combination that number is constituted, obtains encrypted result, comprising:
The data being made of current ciphertext and the characteristic parameter are combined and carry out operation using SHA512 algorithm, obtain first
Operation result;
Operation is carried out using MD5 algorithm to first operation result, obtains the encrypted result.
3. data ciphering method according to claim 1, which is characterized in that in encryption by current ciphertext and the feature
Before the data combination that parameter is constituted, further includes:
The last Encryption Algorithm used of inquiry, obtains the first algorithm;
It is chosen by default selection rule and obtains second algorithm different from first algorithm;
Corresponding, encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, comprising:
It is combined using second algorithm for encryption by the data that current ciphertext and the characteristic parameter are constituted.
4. data ciphering method according to any one of claims 1 to 3, which is characterized in that the composition of the data combination
Mode includes:
The characteristic parameter is inserted into the presetting digit capacity of current ciphertext, the data combination is obtained.
5. data ciphering method according to claim 4, which is characterized in that further include:
When logging in the destination server using the user login information for the first time, by the characteristic parameter and described final close
Text is sent to the destination server together and is saved.
6. a kind of data encryption system, which is characterized in that the data encryption system includes:
Acquisition of information and feature calculation unit are calculated for receiving the logon information of user's input, and according to the log-on message
Obtain characteristic parameter;
Logon information encryption unit, for encrypting the logon information, and using logon information after obtained encryption as initial
Ciphertext;
Data combine encryption unit, are combined, are added by the data that current ciphertext and the characteristic parameter are constituted for encrypting
It is close as a result, simultaneously simultaneously will encryption number increase by 1;Wherein, the initial value of the encryption number is 1;
Frequency judging unit is encrypted, whether the encryption number for judging current is greater than or equal to predetermined encryption number;
New ciphertext generates and jump-transfer unit, will be current if being less than the predetermined encryption number for current encryption number
Encrypted result jumps to the data combination encryption unit as new ciphertext;
Final ciphertext generates and transmission unit, if being greater than or equal to the predetermined encryption number for current encryption number,
Using current encrypted result as final ciphertext, and the final ciphertext is sent to destination server and is verified.
7. data encryption system according to claim 6, which is characterized in that the data combine encryption unit and include:
SHA512 operation subelement utilizes SHA512 for combining to the data being made of current ciphertext and the characteristic parameter
Algorithm carries out operation, obtains the first operation result;
MD5 operation subelement obtains the encrypted result for carrying out operation using MD5 algorithm to first operation result.
8. a kind of client, which is characterized in that the client includes memory, processor and bus, is deposited on the memory
The log-on message encipheror that can be run on the processor is contained, the log-on message encipheror passes through the bus quilt
It is transmitted to the processor, and realizes following steps when being executed by the processor:
S101: the logon information of user's input is received, and characteristic parameter is calculated according to the log-on message;
S102: the logon information is encrypted, and using logon information after obtained encryption as initial ciphertext;
S103: encryption is combined by the data that current ciphertext and the characteristic parameter are constituted, and obtains encrypted result, and will be added simultaneously
Close number increases by 1;Wherein, the initial value of the encryption number is 1;
S104: judging whether current encryption number is greater than or equal to predetermined encryption number, if it is executes S106, otherwise holds
Row S105;
S105: using current encrypted result as new ciphertext, and S103 is returned to;
S106: using current encrypted result as final ciphertext, and the final ciphertext is sent to destination server and is tested
Card.
9. client according to claim 8, which is characterized in that the log-on message encipheror is held by the processor
It is also realized when row:
When logging in the destination server using the user login information for the first time, by the characteristic parameter and described final close
Text is sent to the destination server together and is saved.
10. a kind of computer readable storage medium, which is characterized in that be stored with login letter on the computer readable storage medium
Encryption for information program, the log-on message encipheror can be executed by one or more processor, with realize as claim 1 to
5 described in any item data ciphering methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910217660.8A CN109918877A (en) | 2019-03-21 | 2019-03-21 | A kind of data ciphering method, system, client and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910217660.8A CN109918877A (en) | 2019-03-21 | 2019-03-21 | A kind of data ciphering method, system, client and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109918877A true CN109918877A (en) | 2019-06-21 |
Family
ID=66966169
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910217660.8A Pending CN109918877A (en) | 2019-03-21 | 2019-03-21 | A kind of data ciphering method, system, client and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109918877A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111314321A (en) * | 2020-01-21 | 2020-06-19 | 深圳前海环融联易信息科技服务有限公司 | Parameter encryption management method and device, computer equipment and storage medium |
CN113268748A (en) * | 2021-04-28 | 2021-08-17 | 四川万信数字科技有限公司 | Commercial password security management system based on mobile payment terminal |
CN116776346A (en) * | 2023-06-08 | 2023-09-19 | 南京师范大学常州创新发展研究院 | Data security management system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101488848A (en) * | 2008-02-13 | 2009-07-22 | 刘海云 | Ciphering method for generating cipher code recognition information |
CN104134048A (en) * | 2014-07-31 | 2014-11-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for encrypting memory card |
CN104683111A (en) * | 2015-03-18 | 2015-06-03 | 中国联合网络通信集团有限公司 | Encryption method and system based on MD5 |
CN105721390A (en) * | 2014-12-01 | 2016-06-29 | 阿里巴巴集团控股有限公司 | Encrypted storage method and encrypted storage device |
CN106656972A (en) * | 2016-10-14 | 2017-05-10 | 郑州云海信息技术有限公司 | Data encryption method and device |
CN108055274A (en) * | 2017-12-22 | 2018-05-18 | 广东工业大学 | A kind of encryption based on alliance's chain storage data and shared method and system |
CN108462574A (en) * | 2018-02-12 | 2018-08-28 | 广东睿江云计算股份有限公司 | A kind of lightweight cipher encrypting method and system |
CN109450622A (en) * | 2018-10-16 | 2019-03-08 | 平安普惠企业管理有限公司 | Data ciphering method, data verification method, device, equipment and storage medium |
-
2019
- 2019-03-21 CN CN201910217660.8A patent/CN109918877A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101488848A (en) * | 2008-02-13 | 2009-07-22 | 刘海云 | Ciphering method for generating cipher code recognition information |
CN104134048A (en) * | 2014-07-31 | 2014-11-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for encrypting memory card |
CN105721390A (en) * | 2014-12-01 | 2016-06-29 | 阿里巴巴集团控股有限公司 | Encrypted storage method and encrypted storage device |
CN104683111A (en) * | 2015-03-18 | 2015-06-03 | 中国联合网络通信集团有限公司 | Encryption method and system based on MD5 |
CN106656972A (en) * | 2016-10-14 | 2017-05-10 | 郑州云海信息技术有限公司 | Data encryption method and device |
CN108055274A (en) * | 2017-12-22 | 2018-05-18 | 广东工业大学 | A kind of encryption based on alliance's chain storage data and shared method and system |
CN108462574A (en) * | 2018-02-12 | 2018-08-28 | 广东睿江云计算股份有限公司 | A kind of lightweight cipher encrypting method and system |
CN109450622A (en) * | 2018-10-16 | 2019-03-08 | 平安普惠企业管理有限公司 | Data ciphering method, data verification method, device, equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
赵力: "打造一个安全的用户名密码登陆系统", 《计算机与网络》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111314321A (en) * | 2020-01-21 | 2020-06-19 | 深圳前海环融联易信息科技服务有限公司 | Parameter encryption management method and device, computer equipment and storage medium |
CN113268748A (en) * | 2021-04-28 | 2021-08-17 | 四川万信数字科技有限公司 | Commercial password security management system based on mobile payment terminal |
CN116776346A (en) * | 2023-06-08 | 2023-09-19 | 南京师范大学常州创新发展研究院 | Data security management system |
CN116776346B (en) * | 2023-06-08 | 2024-03-05 | 南京师范大学常州创新发展研究院 | Data security management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105512881B (en) | A kind of method and terminal for completing payment based on two dimensional code | |
EP3255832B1 (en) | Dynamic encryption method, terminal and server | |
CN109918877A (en) | A kind of data ciphering method, system, client and computer readable storage medium | |
CN109766479B (en) | Data processing method and device, electronic equipment and storage medium | |
CN105701423B (en) | Date storage method and device applied to high in the clouds payment transaction | |
CN104426847A (en) | Method, system and server for securely accessing and verifying an Internet service | |
CN109150903A (en) | A kind of account management method, device, storage medium and terminal device | |
CN107094261A (en) | The authorization check method and device of video playback | |
CN110224999A (en) | Information interacting method, device and storage medium | |
CN110061967A (en) | Business datum providing method, device, equipment and computer readable storage medium | |
CN108777685A (en) | Method and apparatus for handling information | |
CN107040799A (en) | The authorization check method and device of video playback | |
CN109977039A (en) | HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing | |
CN113839780A (en) | Encryption method, decryption method, server and storage medium | |
CN111327561B (en) | Authentication method, system, authentication server, and computer-readable storage medium | |
CN110266653B (en) | Authentication method, system and terminal equipment | |
CN103592927A (en) | Method for binding product server and service function through license | |
CN106664535A (en) | Information sending method and apparatus, terminal device, and system | |
CN110493251A (en) | A kind of data processing method, device, electronic equipment and storage medium | |
CN112235104B (en) | Data encryption transmission method, system, terminal and storage medium | |
CN111368322B (en) | File decryption method and device, electronic equipment and storage medium | |
CN112199730A (en) | Method and device for processing application data on terminal and electronic equipment | |
CN112039876A (en) | Data ferrying method, device, equipment and medium | |
CN109977692B (en) | Data processing method and device, storage medium and electronic equipment | |
CN104917763B (en) | A kind of PIN cache method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190621 |