CN112395591A - Encryption method and system - Google Patents

Encryption method and system Download PDF

Info

Publication number
CN112395591A
CN112395591A CN202011288206.0A CN202011288206A CN112395591A CN 112395591 A CN112395591 A CN 112395591A CN 202011288206 A CN202011288206 A CN 202011288206A CN 112395591 A CN112395591 A CN 112395591A
Authority
CN
China
Prior art keywords
encryption
database protocol
database
script
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011288206.0A
Other languages
Chinese (zh)
Inventor
刘帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Suninfo Technology Co ltd
Original Assignee
Shaanxi Suninfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Suninfo Technology Co ltd filed Critical Shaanxi Suninfo Technology Co ltd
Priority to CN202011288206.0A priority Critical patent/CN112395591A/en
Publication of CN112395591A publication Critical patent/CN112395591A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention aims to provide a secret-improving method and a secret-improving system, which can be based on a B/S framework and mainly comprise a foreground operation and maintenance management page, a background secret-improving service program, a database protocol secret-improving script and a database protocol secret-checking script. By adopting the automatic database encryption technology, the invention greatly reduces the operation difficulty and complexity of the client database, simultaneously prevents the problems of misoperation, password forgetting, password recording error, encryption changing and forgetting a certain device and the like of a user, can reduce the labor cost of the client, avoids the confusion of account management, can improve the security of the database account, realizes the simple management of the database account, and improves the security of the database operation.

Description

Encryption method and system
Technical Field
The invention relates to the field of computers, in particular to a method and a system for improving encryption.
Background
With the rapid development of internet information technology, various information systems are in endless, and the types of IT equipment in charge of an IT operation and maintenance department are more and more, and more account numbers need to be managed. The prior art cannot meet the current requirements by directly carrying out periodic secret-changing on equipment by manpower alone. Under such circumstances, various operation and maintenance management systems have been developed.
The operation and maintenance management system is used as a middle layer of the operation and maintenance client and the operation and maintenance target device, and the most core part of the operation and maintenance management system is an agent of the equipment asset management and operation and maintenance process. In the prior art of this function, usually, the operation and maintenance client is in butt joint with the operation and maintenance management system, and the operation and maintenance management system is in butt joint with the target device, so that the operation information of the client can smoothly pass through the target device of the operation and maintenance management system, and the management system manages the assets of the target device.
In the existing operation and maintenance management system, the asset management of the existing operation and maintenance management system is limited to encryption of asset account numbers such as linux, windows, network equipment and the like, then account number management of a database is still lack, the existing database assets are more and more, and if periodical encryption changing is not carried out, the hidden danger of stealing exists. If the password is changed, the administrator needs a lot of time to manually change the password of the database. Password management after encryption is also problematic, and the database asset account is required to be uploaded to various management systems again, which is very troublesome.
Disclosure of Invention
An object of the present invention is to provide an improved encryption method and system.
According to an aspect of the present invention, there is provided an encryption method, the method comprising:
the client management page acquires the encryption task and writes the encryption task into an encryption database;
the background encryption changing service program calls a corresponding database protocol encryption changing script based on the encryption changing task, and the database protocol encryption changing script carries out encryption changing on a database protocol to be encrypted so as to obtain a new password;
and calling a corresponding database protocol password verification script by the background password changing service program, and logging in the system of the database protocol to be changed with the new password by the database protocol password verification script to verify the new password.
Further, in the above method, the encryption task further includes: the initial encryption time, the encryption period, the complexity of the password and the account information of the database protocol needing encryption.
Further, in the above method, the step of calling, by the background encryption changing service program, the corresponding database protocol encryption changing script based on the encryption changing task, and encrypting the database protocol to be encrypted by the database protocol encryption changing script to obtain the new password includes:
the background secret-changing service program checks the account information of the database protocol in the secret-changing task,
if the account information of the database conforms to a preset rule, the background encryption changing service routine calls a corresponding database protocol encryption changing script based on the encryption changing task, and the database protocol encryption changing script carries out encryption changing on a database protocol to be encrypted so as to obtain a new password.
Further, in the above method, the invoking, by the background encryption service program, the corresponding database protocol encryption script based on the encryption task includes:
the background secret-changing service program determines the time of the secret-changing task based on the initial secret-changing time and the secret-changing period in the secret-changing task, and detects all the secret-changing tasks at regular time,
and if a certain encryption task reaches the encryption task time of the database protocol, calling a corresponding database protocol encryption script based on the account information of the database protocol in the encryption task.
Further, in the above method, the encrypting the database protocol to be encrypted by the database protocol encryption script to obtain a new password includes:
the database encryption script firstly logs in a system of a database protocol through an original password of the database protocol to be encrypted,
if the original password fails to log in, the original password is wrong;
if the original password is successfully logged in, the database protocol encryption script calls an encryption sentence of the database protocol to carry out encryption so as to obtain a new password, and the new password is returned to the background encryption service program.
Further, in the above method, the step of logging in the database protocol to be encrypted by the new password for new password verification by the database protocol encryption verification script includes:
the database protocol password verifying script respectively adopts the original password and the new password to log in the system of the database protocol to be encrypted,
if the new password is successfully logged in, the new password is saved;
and if the old password is successfully logged in, saving the old password.
According to another aspect of the present invention, there is also provided an encryption system, wherein the system comprises:
the client management page is used for acquiring the encryption task and writing the encryption task into the encryption database;
the background encryption changing service program is used for calling a corresponding database protocol encryption changing script based on the encryption changing task, and the database protocol encryption changing script carries out encryption changing on a database protocol to be encrypted so as to obtain a new password; and calling a corresponding database protocol encryption verification script, wherein the database protocol encryption verification script is adopted.
According to another aspect of the present invention, there is also provided a computer readable medium having computer readable instructions stored thereon, the computer readable instructions being executable by a processor to implement the method of any one of the above.
According to another aspect of the present invention, there is also provided an apparatus for information processing at a network device, the apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform any of the methods described above.
Compared with the prior art, the method can be based on a B/S framework and mainly comprises a foreground operation and maintenance management page, a background encryption changing service program, a database protocol encryption changing script and a database protocol encryption verifying script. By adopting the automatic database encryption technology, the invention greatly reduces the operation difficulty and complexity of the client database, simultaneously prevents the problems of misoperation, password forgetting, password recording error, encryption changing and forgetting a certain device and the like of a user, can reduce the labor cost of the client, avoids the confusion of account management, can improve the security of the database account, realizes the simple management of the database account, and improves the security of the database operation.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 shows a schematic diagram of an encryption method according to an embodiment of the present invention.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present invention is described in further detail below with reference to the attached drawing figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
As shown in fig. 1, the present invention provides a method of improving encryption, the method comprising:
step S1, the client management page acquires the encryption task and writes the encryption task into the encryption database;
step S2, the background encryption changing service program calls a corresponding database protocol encryption changing script based on the encryption changing task, and the database protocol encryption changing script changes the encryption of the database protocol to be encrypted to obtain a new password;
and step S3, the background encryption changing service program calls a corresponding database protocol encryption verifying script, and the database protocol encryption verifying script adopts the new password to log in the system of the database protocol to be encrypted for new password verification.
The invention can be based on a B/S framework and mainly comprises a foreground operation and maintenance management page, a background encryption service program, a database protocol encryption script and a database protocol encryption verification script. By adopting the automatic database encryption technology, the invention greatly reduces the operation difficulty and complexity of the client database, simultaneously prevents the problems of misoperation, password forgetting, password recording error, encryption changing and forgetting a certain device and the like of a user, can reduce the labor cost of the client, avoids the confusion of account management, can improve the security of the database account, realizes the simple management of the database account, and improves the security of the database operation.
In an embodiment of the encryption method of the present invention, the encryption task further includes: the initial encryption time, the encryption period, the complexity of the password and the account information of the database protocol needing encryption.
Here, a secret modification task, initial secret modification time, a secret modification period, complexity of a password, and account information (an IP of a database protocol, a port of the database protocol, a type of the database protocol, an instance of the database protocol, a name of the database protocol, an account of the database protocol, etc.) associated with the account information that needs secret modification may be added to a client management page of a foreground, and associated data may be written into a secret modification database for storage, so that the secret modification task is established.
The client management page of the foreground is mainly responsible for collecting information of the operation and maintenance target machine, and the information mainly comprises an ip address of the target machine to be managed with the database, port information, a used protocol type, a database instance, a database name and a database account password. And meanwhile, a password verification button is provided to ensure that the database account is correct. And providing a timing task, and associating the information of the database account needing to be encrypted. The interaction process of foreground and background can use the web server which is popular at present, such as lighttpd, nginx, apach, etc.
In an embodiment of the encryption method of the present invention, in step S2, the background encryption server invokes a corresponding database protocol encryption script based on the encryption task, and the database protocol encryption script encrypts the database protocol to be encrypted to obtain a new password, where the method includes:
the background secret-changing service program checks the account information of the database protocol in the secret-changing task,
if the account information of the database conforms to a preset rule, the background encryption changing service routine calls a corresponding database protocol encryption changing script based on the encryption changing task, and the database protocol encryption changing script carries out encryption changing on a database protocol to be encrypted so as to obtain a new password.
Here, the background encryption service: and the system is responsible for carrying out information interaction with a foreground management page, verifying the acquired information, and if the account information of the database conforms to the rule, carrying out encryption modification on the database protocol.
In an embodiment of the encryption method of the present invention, in step S2, the background encryption service program invokes a corresponding database protocol encryption script based on the encryption task, including:
the background secret-changing service program determines the time of the secret-changing task based on the initial secret-changing time and the secret-changing period in the secret-changing task, and detects all the secret-changing tasks at regular time,
and if a certain encryption task reaches the encryption task time of the database protocol, calling a corresponding database protocol encryption script based on the account information of the database protocol in the encryption task.
The background encryption changing service program regularly detects all encryption changing tasks based on the initial encryption changing time and the encryption changing period, if a certain encryption changing task reaches the encryption changing task time of the database protocol, the account information of the database protocol needing encryption changing is taken out, and the related database encryption changing script is called according to the type of the database needing encryption changing.
In an embodiment of the encryption method of the present invention, in step S2, the encrypting script of the database protocol encrypts the database protocol to be encrypted to obtain a new password, including:
the database encryption script firstly logs in a system of a database protocol through an original password of the database protocol to be encrypted,
if the original password fails to log in, the original password is wrong;
if the original password is successfully logged in, the database protocol encryption script calls an encryption sentence of the database protocol to carry out encryption so as to obtain a new password, and the new password is returned to the background encryption service program.
The database protocol encryption script is mainly responsible for encrypting various database protocols. Different information can be returned to the background encryption service program according to the encryption result.
In an embodiment of the encryption method of the present invention, in step S3, the step of logging in the database protocol to be encrypted by the database protocol encryption verification script using the new password to perform new password verification includes:
the database protocol password verifying script respectively adopts the original password and the new password to log in the system of the database protocol to be encrypted,
if the new password is successfully logged in, the new password is saved;
and if the old password is successfully logged in, saving the old password.
Here, the database protocol encryption script: the method is mainly responsible for verifying or rolling back various database protocols with modified passwords.
And the abnormal password changing is prevented, the database password verification script performs login verification on the new password and the old password once, and if the new password is successful, the new password is stored. If the old password is successful, the old password is saved.
According to another aspect of the present invention, there is also provided an encryption system, wherein the system comprises:
the client management page is used for acquiring the encryption task and writing the encryption task into the encryption database;
the background encryption changing service program is used for calling a corresponding database protocol encryption changing script based on the encryption changing task, and the database protocol encryption changing script carries out encryption changing on a database protocol to be encrypted so as to obtain a new password; and calling a corresponding database protocol encryption verification script, wherein the database protocol encryption verification script is adopted.
According to another aspect of the present invention, there is also provided a computer readable medium having computer readable instructions stored thereon, the computer readable instructions being executable by a processor to implement the method of any one of the above.
According to another aspect of the present invention, there is also provided an apparatus for information processing at a network device, the apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform any of the methods described above.
For details of embodiments of each device and storage medium of the present invention, reference may be made to corresponding parts of each method embodiment, and details are not described herein again.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
It should be noted that the present invention may be implemented in software and/or in a combination of software and hardware, for example, as an Application Specific Integrated Circuit (ASIC), a general purpose computer or any other similar hardware device. In one embodiment, the software program of the present invention may be executed by a processor to implement the steps or functions described above. Also, the software programs (including associated data structures) of the present invention can be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Further, some of the steps or functions of the present invention may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present invention can be applied as a computer program product, such as computer program instructions, which when executed by a computer, can invoke or provide the method and/or technical solution according to the present invention through the operation of the computer. Program instructions which invoke the methods of the present invention may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the invention herein comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or solution according to embodiments of the invention as described above.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (9)

1.一种改密方法,其中,该方法包括:1. A method for changing encryption, wherein the method comprises: 客户端管理页面获取改密任务,并将改密任务写入改密数据库;The client management page obtains the encryption task, and writes the encryption task into the encryption database; 后台改密服务程序基于所述改密任务,调用对应的数据库协议改密脚本,所述数据库协议改密脚本对待改密的数据库协议进行改密,以得到新密码;The background encryption change service program calls the corresponding database protocol encryption script based on the encryption encryption task, and the database protocol encryption encryption script changes encryption of the database protocol to be encrypted to obtain a new password; 后台改密服务程序调用对应的数据库协议验密脚本,所述数据库协议验密脚本采用所述新密码登陆所述待改密的数据库协议的系统进行新密码校验。The background encryption modification service program invokes the corresponding database protocol encryption verification script, and the database protocol encryption verification script uses the new password to log in to the system of the database protocol to be encrypted to perform new password verification. 2.根据权利要求1所述的方法,其中,所述改密任务还包括:初次改密时间、改密周期、密码的复杂度和需要改密的数据库协议的账号信息。2 . The method according to claim 1 , wherein the encryption task further comprises: initial encryption time, encryption period, password complexity and account information of the database protocol that needs to be encrypted. 3 . 3.根据权利要求2所述的方法,其中,后台改密服务程序基于所述改密任务调用对应的数据库协议改密脚本,所述数据库协议改密脚本对待改密的数据库协议进行改密,以得到新密码,包括:3. method according to claim 2, wherein, the back-stage encryption changing service program calls the corresponding database protocol encryption script based on described encryption encryption task, and described database protocol encryption encryption script is to be treated to change encryption The database protocol changes encryption, to get a new password, including: 后台改密服务程序对所述改密任务中的数据库协议的账号信息进行校验,The background encryption service program verifies the account information of the database protocol in the encryption modification task, 若数据库的账号信息符合预设规则,则所述后台改密服务程基于所述改密任务调用对应的数据库协议改密脚本,所述数据库协议改密脚本对待改密的数据库协议进行改密,以得到新密码。If the account information of the database complies with the preset rules, the background encryption change service process calls the corresponding database protocol encryption script based on the encryption change task, and the database protocol encryption script changes the encryption of the database protocol to be encrypted, to get a new password. 4.根据权利要求2所述的方法,其中,后台改密服务程序基于所述改密任务调用对应的数据库协议改密脚本,包括:4. The method according to claim 2, wherein, the background encryption modification service program calls corresponding database protocol encryption script based on the encryption modification task, comprising: 后台改密服务程序基于改密任务中的初次改密时间和改密周期确定改密任务时间,并定时检测所有的改密任务,The background encryption modification service program determines the encryption modification task time based on the initial encryption modification time and encryption modification period in the encryption modification task, and regularly detects all encryption modification tasks. 若某个改密任务达到数据库协议的改密任务时间,则基于改密任务中数据库协议的账号信息,调用对应的数据库协议改密脚本。If a certain encryption task reaches the encryption task time of the database protocol, the corresponding database protocol encryption script is called based on the account information of the database protocol in the encryption task. 5.根据权利要求1所述的方法,其中,所述数据库协议改密脚本对待改密的数据库协议进行改密,以得到新密码,包括:5. method according to claim 1, wherein, described database protocol encryption script is to be encrypted database protocol to be changed encryption, to obtain new password, comprising: 所述数据库改密脚本通过待改密的数据库协议的原密码先登录数据库协议的系统中,The database encryption script is first logged into the system of the database protocol through the original password of the database protocol to be encrypted, 如果原密码登陆失败,原密码错误;If the original password fails to log in, the original password is wrong; 如果原密码登陆成功,则所述数据库协议改密脚本调用数据库协议的改密语句进行改密,以得到新密码,并返回给所述后台改密服务程序。If the original password is successfully logged in, the database protocol encryption script calls the encryption encryption statement of the database protocol to change encryption to obtain a new password, and returns to the background encryption encryption service program. 6.根据权利要求1所述的方法,其中,所述数据库协议验密脚本采用所述新密码登陆所述待改密的数据库协议进行新密码校验,包括:6. The method according to claim 1, wherein the database protocol password verification script adopts the new password to log in the database protocol to be encrypted to perform new password verification, comprising: 所述数据库协议验密脚本分别采用原密码和新密码登陆所述待改密的数据库协议的系统,The database protocol password verification script uses the original password and the new password to log in to the system of the database protocol to be encrypted, respectively, 若新密码登陆成功,则保存所述新密码;If the new password is successfully logged in, the new password is saved; 若所述旧密码登陆成功,则保存所述旧密码。If the old password is successfully logged in, the old password is saved. 7.一种改密系统,其中,该系统包括:7. An encryption system, wherein the system comprises: 客户端管理页面,用于获取改密任务,并将改密任务写入改密数据库;The client management page is used to obtain the encryption task and write the encryption task to the encryption database; 后台改密服务程序,用于基于所述改密任务,调用对应的数据库协议改密脚本,所述数据库协议改密脚本对待改密的数据库协议进行改密,以得到新密码;及调用对应的数据库协议验密脚本,所述数据库协议验密脚本采用。The background encryption service program is used to call the corresponding database protocol encryption script based on the encryption encryption task, and the database protocol encryption script changes encryption to the database protocol to be encrypted to obtain a new password; and call the corresponding encryption Database protocol encryption script, the database protocol encryption script is adopted. 8.一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现权利要求1至6中任一项所述的方法。8. A computer readable medium having stored thereon computer readable instructions executable by a processor to implement the method of any one of claims 1 to 6. 9.一种用于在网络设备端信息处理的设备,该设备包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该设备执行权利要求1至6中任一项所述的方法。9. A device for information processing at a network device side, the device comprising a memory for storing computer program instructions and a processor for executing program instructions, wherein, when the computer program instructions are executed by the processor, The device is triggered to perform the method of any one of claims 1 to 6 .
CN202011288206.0A 2020-11-17 2020-11-17 Encryption method and system Pending CN112395591A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011288206.0A CN112395591A (en) 2020-11-17 2020-11-17 Encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011288206.0A CN112395591A (en) 2020-11-17 2020-11-17 Encryption method and system

Publications (1)

Publication Number Publication Date
CN112395591A true CN112395591A (en) 2021-02-23

Family

ID=74606041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011288206.0A Pending CN112395591A (en) 2020-11-17 2020-11-17 Encryption method and system

Country Status (1)

Country Link
CN (1) CN112395591A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114091010A (en) * 2021-11-30 2022-02-25 北京天融信网络安全技术有限公司 Encryption self-adaptive optimization method and device, electronic equipment and storage medium
CN114553609A (en) * 2022-04-24 2022-05-27 北京圣博润高新技术股份有限公司 Linux-based remote equipment account number encryption method, device, equipment and medium
CN114969715A (en) * 2022-05-11 2022-08-30 北京圣博润高新技术股份有限公司 Encryption method, device, equipment and medium for WEB site

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106021497A (en) * 2016-05-23 2016-10-12 中国银联股份有限公司 Database access password management method
CN107423638A (en) * 2017-08-02 2017-12-01 成都安恒信息技术有限公司 A kind of password management system and application method based on order detection type Modify password
CN108712247A (en) * 2018-05-16 2018-10-26 成都天翼空间科技有限公司 Server account cipher management method, system and server
CN109308285A (en) * 2018-10-11 2019-02-05 平安科技(深圳)有限公司 Database script management method, device, computer equipment and storage medium
CN110401529A (en) * 2019-07-23 2019-11-01 南瑞集团有限公司 A password management method
CN111010397A (en) * 2019-12-18 2020-04-14 吉林亿联银行股份有限公司 Database password modification method and device
CN111177112A (en) * 2019-12-06 2020-05-19 陕西上讯信息技术有限公司 Database blocking method and device based on operation and maintenance management system and electronic equipment
CN111786780A (en) * 2020-06-23 2020-10-16 北京思特奇信息技术股份有限公司 Method, system, medium and equipment for secure password use of shell script

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106021497A (en) * 2016-05-23 2016-10-12 中国银联股份有限公司 Database access password management method
CN107423638A (en) * 2017-08-02 2017-12-01 成都安恒信息技术有限公司 A kind of password management system and application method based on order detection type Modify password
CN108712247A (en) * 2018-05-16 2018-10-26 成都天翼空间科技有限公司 Server account cipher management method, system and server
CN109308285A (en) * 2018-10-11 2019-02-05 平安科技(深圳)有限公司 Database script management method, device, computer equipment and storage medium
CN110401529A (en) * 2019-07-23 2019-11-01 南瑞集团有限公司 A password management method
CN111177112A (en) * 2019-12-06 2020-05-19 陕西上讯信息技术有限公司 Database blocking method and device based on operation and maintenance management system and electronic equipment
CN111010397A (en) * 2019-12-18 2020-04-14 吉林亿联银行股份有限公司 Database password modification method and device
CN111786780A (en) * 2020-06-23 2020-10-16 北京思特奇信息技术股份有限公司 Method, system, medium and equipment for secure password use of shell script

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114091010A (en) * 2021-11-30 2022-02-25 北京天融信网络安全技术有限公司 Encryption self-adaptive optimization method and device, electronic equipment and storage medium
CN114553609A (en) * 2022-04-24 2022-05-27 北京圣博润高新技术股份有限公司 Linux-based remote equipment account number encryption method, device, equipment and medium
CN114553609B (en) * 2022-04-24 2022-08-16 北京圣博润高新技术股份有限公司 Linux-based remote equipment account number encryption method, device, equipment and medium
CN114969715A (en) * 2022-05-11 2022-08-30 北京圣博润高新技术股份有限公司 Encryption method, device, equipment and medium for WEB site

Similar Documents

Publication Publication Date Title
US11627054B1 (en) Methods and systems to manage data objects in a cloud computing environment
US10467426B1 (en) Methods and systems to manage data objects in a cloud computing environment
US10318285B1 (en) Deployment of infrastructure in pipelines
US9705855B2 (en) Secure data destruction in a distributed environment using key protection mechanisms
US10375013B2 (en) Managed directory service connection
US20140237293A1 (en) Application monitoring through continuous record and replay
CN112395591A (en) Encryption method and system
JP2017539017A (en) Identity infrastructure as a service
US9146841B2 (en) Proxy server assisted product testing
CN107092535B (en) Method and apparatus for data storage of test interface
WO2022116761A1 (en) Self auditing blockchain
CN110968760A (en) Webpage data crawling method and device, and webpage login method and device
CN113132363A (en) Front-end and back-end security verification method and equipment
CN112115436B (en) AD domain account password modification method and device
CN115118434A (en) Blockchain-based key management method and device
CN110555682A (en) multi-channel implementation method based on alliance chain
US20230246814A1 (en) Data intermediary registry security
WO2022121673A1 (en) Decentralized broadcast encryption and key generation facility
CN116107781A (en) Log tracking method, device, electronic equipment and computer program product
GB2623225A (en) Method, system, and apparatus for securely sharing video stream, and storage medium
CN110851851B (en) Authority management method, device and equipment in block chain type account book
US20220164729A1 (en) Automated control compliance evidence manager using a secure distributed ledger
CN111291393A (en) Request checking method and device
CN113190820A (en) Fingerprint login method and device based on bastion machine
CN116781392A (en) Login method, device, system and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210223