CN115189875A - Login management method, system and medium based on information encryption - Google Patents

Login management method, system and medium based on information encryption Download PDF

Info

Publication number
CN115189875A
CN115189875A CN202210837134.3A CN202210837134A CN115189875A CN 115189875 A CN115189875 A CN 115189875A CN 202210837134 A CN202210837134 A CN 202210837134A CN 115189875 A CN115189875 A CN 115189875A
Authority
CN
China
Prior art keywords
information
encrypted
login
file
character string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210837134.3A
Other languages
Chinese (zh)
Inventor
周程伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lianrong Technology Co ltd
Original Assignee
Shenzhen Lianrong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lianrong Technology Co ltd filed Critical Shenzhen Lianrong Technology Co ltd
Priority to CN202210837134.3A priority Critical patent/CN115189875A/en
Publication of CN115189875A publication Critical patent/CN115189875A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a login management method, a system and a medium based on information encryption, wherein the method comprises the following steps: the client side sends the input login information to the management server to obtain a verification result, if the verification result is passed, a target directory address is obtained from the verification result to switch directories, the encrypted database in the independent directory is decrypted according to the encrypted character string fed back by the server to obtain decryption information, the encrypted file in the independent directory corresponding to the target directory address is decrypted to read the file content of the encrypted file to load the file content, and the loaded file content is displayed to complete login. The invention belongs to the technical field of internet, can switch directories according to a verification result, decrypts an encrypted database in an independent directory according to an encrypted character string fed back by a server to obtain decryption information, decrypts an encrypted file to read file content for display, does not need to acquire the file remotely, reduces time consumption for login, and greatly improves login efficiency.

Description

Login management method, system and medium based on information encryption
Technical Field
The invention relates to the technical field of internet, in particular to a login management method, a login management system and a login management medium based on information encryption.
Background
In order to obtain the corresponding service from the server, the user can log in the server through the client, however, in some application scenarios, the client needs to load the configuration file during the login process. In the traditional technical method, after a user successfully logs in a server, the server remotely sends a configuration file to a client, however, the configuration file needs a long time to be transmitted through a network, so that the logging process is long, and the logging efficiency of the user is influenced; if a network fault occurs in the file transmission process, the file cannot be successfully transmitted to the client, and the success rate of login operation is affected. Therefore, the prior art method has the problem that the user cannot log in efficiently due to long time consumption of file transmission.
Disclosure of Invention
The embodiment of the invention provides a login management method, a system and a medium based on information encryption, and aims to solve the problem that a user cannot login efficiently due to long time consumption of file transmission in the prior art.
In a first aspect, an embodiment of the present invention provides a login management method based on information encryption, where the method includes:
sending login information input by a user to a management server to obtain a verification result obtained by verifying the login information;
if the verification result is passed, acquiring a target directory address from the verification result to perform directory switching on the client;
sending a decryption request to the management server to receive an encrypted character string fed back by the management server according to the decryption request;
decrypting an encrypted database in the independent directory corresponding to the target directory address according to the encrypted character string to obtain decryption information in the encrypted database;
decrypting the encrypted file in the independent directory according to the decryption information so as to read the file content of the encrypted file for loading;
displaying the loaded file content to complete login.
In a second aspect, an embodiment of the present invention provides a login management system based on information encryption, including:
the authentication result acquisition unit is used for sending login information input by a user to a management server so as to acquire an authentication result obtained by authenticating the login information;
the directory switching unit is used for acquiring a target directory address from the verification result to switch the directory of the client if the verification result is passed;
the encryption character string acquisition unit is used for sending a decryption request to the management server so as to receive an encryption character string fed back by the management server according to the decryption request;
a decryption information obtaining unit, configured to decrypt, according to the encrypted character string, an encrypted database in the independent directory corresponding to the target directory address, so as to obtain decryption information in the encrypted database;
the file content loading unit is used for decrypting the encrypted file in the independent directory according to the decryption information so as to read the file content of the encrypted file for loading;
and the file content display unit is used for displaying the loaded file content to finish login.
In a third aspect, an embodiment of the present invention further provides an information encryption-based login management system, including a client and a management server, where the client includes a first memory, a first processor, and a first computer program stored in the first memory and executable on the first processor, and the management server includes a second memory, a second processor, and a second computer program stored in the second memory and executable on the second processor, where the first processor executes the first computer program and the second processor executes the second computer program, which collectively implement the information encryption-based login management method according to the first aspect.
In a fourth aspect, the embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores a first computer program or a second computer program, and when the first computer program is executed by a first processor and the second computer program is executed by a second processor, the first computer program and the second computer program jointly implement the login management method based on information encryption according to the first aspect.
The embodiment of the invention provides a login management method, a system and a medium based on information encryption. The client side sends the input login information to the management server to obtain a verification result, if the verification result is passed, a target directory address is obtained from the verification result to conduct directory switching, the encrypted database in the independent directory is decrypted according to the encrypted character string fed back by the server, decryption information is obtained, the encrypted file in the independent directory corresponding to the target directory address is decrypted, the file content of the encrypted file is read to load the encrypted file, and the loaded file content is displayed to complete login. By the method, the directory can be switched according to the verification result, the encrypted database in the independent directory is decrypted according to the encrypted character string fed back by the server, the decrypted information is obtained, the encrypted file is decrypted, the file content is read and displayed, the file does not need to be acquired remotely, time consumption for login is reduced, and login efficiency is greatly improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a login management method based on information encryption according to an embodiment of the present invention;
fig. 2 is a schematic view of an application scenario of a login management method based on information encryption according to an embodiment of the present invention;
fig. 3 is a sub-flowchart schematic diagram of a login management method based on information encryption according to an embodiment of the present invention;
fig. 4 is a schematic sub-flowchart of a login management method based on information encryption according to an embodiment of the present invention;
fig. 5 is another schematic flowchart of a login management method based on information encryption according to an embodiment of the present invention;
fig. 6 is a schematic sub-flowchart of a login management method based on information encryption according to an embodiment of the present invention;
fig. 7 is a schematic view of another sub-flow of a login management method based on information encryption according to an embodiment of the present invention;
fig. 8 is a schematic flowchart of a login management method based on information encryption according to an embodiment of the present invention;
FIG. 9 is a schematic block diagram of a login management system based on information encryption provided by an embodiment of the present invention;
FIG. 10 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic flowchart of a login management method based on information encryption according to an embodiment of the present invention, and fig. 2 is a schematic application scenario diagram of the login management method based on information encryption according to the embodiment of the present invention; the login management method based on the information encryption is applied to a login management system 100 based on the information encryption, the system comprises a plurality of client sides 10 and a management server 20 which establishes network connection with each client side 10 to realize data information transmission, and the login management method based on the information encryption is executed through application software installed in the client sides 10 and the management server 20; the client 10 may be configured to execute a login management method based on information encryption to decrypt an encrypted file stored locally and read the content of the file to complete a login operation, the client 10 may be a terminal device such as a desktop computer, a notebook computer, a tablet computer, or a mobile phone, and the management server 20 is a server configured to execute the login management method based on information encryption to verify login information and obtain the login information for user registration, such as a server built in an enterprise or a government department. As shown in fig. 1, the method includes steps S110 to S160 performed at the client.
S110, sending login information input by a user to a management server to obtain a verification result obtained by verifying the login information.
The user can send login information to the management server through the client, the management server can verify the login information after receiving the login information, and the management server feeds back a verification result obtained by verification to the client. The verification result includes a result of verification pass or verification fail.
Specifically, a verification database is configured in the management server, the management server can verify the received login information through the verification database, the login information comprises a login account and a login password, the login account can be a unique account, the unique account is account information which is used for identifying the identity of the user and is uniquely corresponding to the identity of the user, and once the unique account is generated, the unique account and the verification password of the user are stored in the verification database; the login account can also be a user account which can be changed randomly, and a user can set the user account according to the preference, wherein the set user account corresponds to the unique account; the authentication database stores at least a user account, a unique account and an authentication password of the user. The management server can acquire a unique account corresponding to the login information from the verification database, verify whether a login password in the login information is consistent with a verification password corresponding to the unique account, and if the login password is consistent with the corresponding verification password, the verification result of the login information is passed; and if the login password is not consistent with the corresponding verification password, the verification result of the login information is failed.
In an embodiment, as shown in fig. 5, the login management method based on information encryption further includes steps S210 to S250 executed in the management server. In a normal case, steps S210 to S250 are executed before step S110, that is, the user uses the client to register in the management server before the login function is implemented.
And S210, if the registration information from any client is received, generating a unique account and a root password corresponding to the registration information.
The management server can also receive registration information of the client, and the registration information can complete registration of a new user. After receiving the registration information, the management server can generate a unique account and a root password corresponding to the registration information, wherein the unique account and the root password are uniquely corresponding to the user of the registration information, and the generated unique account and the generated root password cannot be changed.
In one embodiment, as shown in fig. 6, step S210 includes substeps S211 and S212.
S211, generating random characters with the number equal to a first preset number according to a preset first character type to serve as the unique account; s212, generating random characters with the number equal to a second preset number according to a preset second character type to serve as the root password.
The unique account number and the root password can be generated by acquiring random characters.
Specifically, random characters equal to the first preset number may be generated according to the first character type to obtain the unique account, for example, the first character type may be numbers and lower case letters, the first preset number may be 16, the random characters may be generated according to the first preset number, and the random characters are numbers or lower case letters, and the unique account may be generated by combining the obtained random characters. The root password is obtained by generating random characters equal to a second preset number according to the second character type, for example, the second character type may be numbers, upper and lower case letters and special characters, the second preset number may be 32, and the method for generating the root password is similar to the method for generating the unique account. Wherein the special characters include "%", "&", "#", "-", etc.
In one embodiment, as shown in fig. 7, step S210 includes sub-steps S221, S222, S223, S224, S225 and S226.
S221, combining all information items contained in the registration information to obtain an initial character string.
The registration information includes a plurality of information items corresponding to the user and the client, such as a client network Address, a Media Access Control Address (MAC), a user token, a user phone number, and the like, and each information item in the registration information may be connected in the first place by using the same system to form an initial character string by combination, for example, using hexadecimal characters to form a combination.
S222, encoding the characters contained in the initial character string according to a preset encoding rule to generate encoding information corresponding to the initial character string.
And encoding the characters contained in the initial character string according to a preset encoding rule so as to generate encoding information corresponding to the initial character string, wherein the encoding information can be information only containing lower case letters and numeric characters. For example, the encoding rule may be based on base64 encoding, and the hexadecimal initial character string may be encoded into the corresponding encoding sequence by base64 encoding, and the information of lower case letters and numeric characters is screened out from the encoding sequence to obtain the encoded information, that is, characters which are not lower case letters and numeric characters are screened out from the obtained encoding sequence to obtain the encoded information.
S223, randomly acquiring a first preset number of character combinations from the coded information as the unique account.
And randomly acquiring character combinations equal to the first preset number from the coded information as the unique account, for example, if the first preset number is 16, randomly acquiring 16 character combinations from the coded information as the unique account.
S224, randomly acquiring a third preset number of character combinations from the coded information to form standby character strings; and S225, adding a fourth preset number of special characters in the spare character string to obtain a target character string.
And further randomly acquiring characters equal to the third preset number from the coded information and combining the characters into an alternative character string, and if the third preset number is 20, randomly acquiring 20 characters from the coded information to form the alternative character string. Further, a fourth preset number of special characters are added in the alternative character string, that is, the special characters equal to the fourth preset number are randomly acquired, and the acquired special characters are randomly inserted into the alternative character string, so that the target character string is obtained. Special characters include "%", "&", "#", etc.
S226, serializing the target character string according to a preset serializing rule to generate the root password.
And serializing the target character string according to a serialization rule, specifically, randomly selecting partial lower case characters in the target character string and serializing the partial lower case characters into corresponding upper case characters so as to generate a root password, wherein the generated root password comprises numbers, upper case letters and lower case letters and special characters.
After the unique account and the root password are generated, judging whether the newly generated unique account is repeated with the unique account stored in the verification database, judging whether the newly generated root password is repeated with the root password stored in the verification database, if the newly generated unique account and the root password are not repeated, using the newly generated unique account, and if the newly generated unique account is repeated, generating the unique account again; if the newly generated root code is repeated, it must be generated again as well.
S220, combining the registration password in the registration information with the unique account to obtain combined information.
And sequentially combining the registration password in the registration information with the unique account number to obtain combined information, wherein the combined information is a character string containing a plurality of characters.
S230, encrypting the root password according to the combination information and a preset encryption rule to obtain a corresponding encryption character string; s240, storing the unique account number, the encrypted character string and the registration password into the preset verification database.
The root password can be encrypted through the combined information and the encryption rule to obtain the encrypted character string, the encryption rule can be an AES symmetric encryption rule, and the combined information is used as a secret key to encrypt the root password to obtain the encrypted character string. The encryption character string is correspondingly generated according to the root password, and under the condition that the secret key is not changed, if the content contained in the root password is not changed, the correspondingly generated encryption character string is not changed.
And storing the generated unique account number, the generated encryption character string and the generated registration password into a verification database, wherein the unique account number, the generated encryption character string and the generated registration password all correspond to one user, and the registration password stored into the verification database can be used as the verification password.
The user can modify the verification password in the verification database, and in the process of modifying the verification password, the user needs to synchronously update the corresponding encrypted character string besides updating the verification password. Specifically, the unique account and the old verification password may be combined, the encrypted character string may be decrypted according to the combination information to restore the encrypted character string to obtain a root password, the unique account and the new verification password may be combined, the restored root password may be re-encrypted according to the combination information to obtain a new encrypted character string, and the old encrypted character string stored in the verification database may be updated.
And S250, generating registration feedback information containing the unique account to the client.
And after the steps are completed, the management server sends the registration feedback information containing the unique account to the client.
In an embodiment, as shown in fig. 8, the login management method based on information encryption further includes steps S310 to S340 executed in the client, and steps S310 to S340 are executed after step S250.
And S310, generating an independent directory with a directory address as the unique account.
After receiving the registration feedback information, the client may generate an independent directory corresponding to the unique account according to the registration feedback information, where the generated independent directory uses the unique account as a corresponding directory address, for example, the unique account is used as a directory name of the independent directory, and obtains a directory address containing the unique account, that is, the storage location of the independent directory may be located through the unique account.
If the unique account number is S3fh7c4k95r11o3f, the corresponding directory address may be S \ S3fh7c4k95r11o3f.
And S320, creating an initial database in the independent directory.
And creating initial databases in the generated independent directories, wherein each independent directory corresponds to one initial database. For example, the initial database created may be a sql lite database.
S330, acquiring characteristic information of each encrypted file in the independent directory and storing the characteristic information into the initial database, wherein the characteristic information comprises a file name and a decryption password corresponding to each encrypted file.
The independent directory comprises at least one encrypted file, the characteristic information of the encrypted file in the independent directory can be obtained, the characteristic information comprises the file name of the encrypted file and a decryption password, the decryption password can be generated in a random number generation mode, and the file name of each encrypted file corresponds to the decryption password.
Specifically, each file in the independent directory generates a 16-ary file name, and the file name has no extension.
S340, combining the root password and the unique account in the verification result to serve as a secret key to encrypt the initial database to obtain an encrypted database.
The root password and the unique account in the login information are combined to be used as a secret key, the initial database is encrypted through the secret key to obtain an encrypted database, if the secret key is set as an opening password of the initial database, the initial database is encrypted, and when the encrypted database is subsequently opened, a correct secret key needs to be input, so that the encrypted database can be successfully opened and the data information stored in the encrypted database can be obtained. There is one and only one encryption database in each independent directory.
And S120, if the verification result is passed, obtaining a target directory address from the verification result to perform directory switching on the client.
And if the verification result of the login information is passed, acquiring a target directory address corresponding to the unique account from the verification result, and switching directories of the client according to the target directory address. I.e. switching the default directory address of the client to the target directory address.
S130, sending a decryption request to the management server to receive an encrypted character string fed back by the management server according to the decryption request.
After the catalog switching is completed, the client can send a decryption request to the management server, the management server reads an encrypted character string corresponding to the current user of the decryption request from the verification database according to the decryption request and feeds the read encrypted character string back to the client, and the client can receive the encrypted character string.
S140, decrypting the encrypted database in the independent directory corresponding to the target directory address according to the encrypted character string to obtain decryption information in the encrypted database.
And after receiving the encrypted character string, the client side can decrypt the encrypted database in the independent directory corresponding to the target directory address through the encrypted character string. The decryption information stored in the encrypted data can be read after the encrypted database is decrypted.
In one embodiment, as shown in fig. 3, step S140 includes sub-steps S141, S142 and S143.
S141, decrypting the encrypted character string according to a preset decryption rule to obtain a root password; s142, combining the root password and the unique account in the verification result to be used as a secret key; s143, decrypting the encrypted database with the key to read decryption information from the decrypted encrypted database.
Specifically, the encrypted character string can be decrypted according to a decryption rule to obtain a root password; specifically, the unique account in the verification result may be combined with the login password in the login information input by the user, and the encrypted string may be decrypted based on the key obtained by the combination, so as to obtain the root password.
And combining the obtained root password with the unique account number in the verification result to be used as a secret key, decrypting the encrypted database through the secret key, and normally opening the encrypted database by inputting the secret key so as to read decryption information in the decrypted encrypted database.
S150, decrypting the encrypted file in the independent directory according to the decryption information so as to read the file content of the encrypted file for loading.
The decryption information comprises file names of the files in the independent directory and decryption passwords corresponding to the files, the encrypted files corresponding to the file names can be decrypted through the decryption passwords corresponding to the file names, so that the file contents of the encrypted files are read, and the read file contents are loaded in the client.
In one embodiment, as shown in fig. 4, step S150 includes substeps S151 and S152.
S151, decompressing the encrypted files according to the decryption passwords corresponding to the file names of the encrypted files in the decryption information to obtain decrypted files corresponding to the encrypted files; and S152, reading the file content of the decrypted file and loading the file content to a cache area of the client.
Specifically, each encrypted file can be decompressed according to the decryption password corresponding to the file name of each encrypted file in the decryption information, and each encrypted file is decrypted through decompression, so that the decrypted file corresponding to each encrypted file is obtained.
For example, if the encrypted file is a zip compressed file, the decryption password may be used as a decompression password to perform zip decompression on the encrypted file, so as to obtain a corresponding decrypted file. The decryption speed of the encrypted file can be greatly improved by decrypting the encrypted file in a zip decompression mode.
The file content in each decrypted file is read and loaded into a cache region of the client, and the cache region may be configured in a Random Access Memory (RAM) of the client, for example, a block region is allocated in the RAM to be used as a cache region for loading the file content.
And S160, displaying the loaded file content to complete login.
And displaying the file content loaded in the cache area in the client so as to finish login.
In the login management method based on information encryption provided by the embodiment of the invention, the client sends the input login information to the management server to obtain the verification result, if the verification result is passed, the target directory address is obtained from the verification result to perform directory switching, the encrypted database in the independent directory is decrypted according to the encrypted character string fed back by the server to obtain the decryption information, the encrypted file in the independent directory corresponding to the target directory address is decrypted to read the file content of the encrypted file to load, and the loaded file content is displayed to complete login. By the method, the directory can be switched according to the verification result, the encrypted database in the independent directory is decrypted according to the encrypted character string fed back by the server, the decrypted information is obtained, the encrypted file is decrypted, the file content is read and displayed, the file does not need to be acquired remotely, time consumption for login is reduced, and login efficiency is greatly improved.
The embodiment of the present invention further provides an information encryption-based login management system, where the information encryption-based login management system 100 includes a plurality of clients 10 and a management server 20 that establishes a network connection with each of the clients 10 to implement data information transmission, and the information encryption-based login management system 100 is configured to execute any one of the embodiments of the aforementioned information encryption-based login management method. Specifically, referring to fig. 9, fig. 9 is a schematic block diagram of a login management system based on information encryption according to an embodiment of the present invention.
As shown in fig. 9, the login management system 100 based on information encryption includes an authentication result acquisition unit 110, a directory switching unit 120, an encryption string acquisition unit 130, a decryption information acquisition unit 140, a file content loading unit 150, and a file content display unit 160, which are arranged within the client terminal 10.
An authentication result obtaining unit 110, configured to send login information input by a user to a management server, so as to obtain an authentication result obtained by authenticating the login information.
A directory switching unit 120, configured to, if the verification result is that the target directory address passes, obtain a target directory address from the verification result to perform directory switching on the client.
An encrypted string obtaining unit 130, configured to send a decryption request to the management server, so as to receive an encrypted string fed back by the management server according to the decryption request.
And a decryption information obtaining unit 140, configured to decrypt the encrypted database in the independent directory corresponding to the target directory address according to the encrypted character string, so as to obtain decryption information in the encrypted database.
And a file content loading unit 150, configured to decrypt the encrypted file in the independent directory according to the decryption information, so as to read the file content of the encrypted file for loading.
A file content display unit 160 for displaying the loaded file content to complete the login.
As shown in fig. 9, the login management system 100 based on information encryption further includes a generation unit 210, a combination information acquisition unit 220, a root password encryption unit 230, an information storage unit 240, and a registration feedback information transmission unit 250 within the management server 20.
A generating unit 210, configured to generate a unique account and a root password corresponding to registration information if the registration information from any client is received.
A combined information obtaining unit 220, configured to combine the registration password in the registration information with the unique account to obtain combined information.
And a root password encryption unit 230, configured to encrypt the root password according to the combination information and a preset encryption rule, so as to obtain a corresponding encryption character string.
An information storage unit 240, configured to store the unique account number, the encrypted character string, and the registration password in the preset verification database.
A registration feedback information sending unit 250, configured to send registration feedback information including the unique account to the client.
The login management system based on the information encryption provided by the embodiment of the invention applies the login management method based on the information encryption, the client sends the input login information to the management server to obtain the verification result, if the verification result is passed, the target directory address is obtained from the verification result to carry out directory switching, the encrypted database in the independent directory is decrypted according to the encrypted character string fed back by the server to obtain the decryption information, the encrypted file in the independent directory corresponding to the target directory address is decrypted to read the file content of the encrypted file to load, and the loaded file content is displayed to finish login. By the method, the directory can be switched according to the verification result, the encrypted database in the independent directory is decrypted according to the encrypted character string fed back by the server, the decrypted information is obtained, the encrypted file is decrypted, the file content is read and displayed, the file does not need to be acquired remotely, time consumption for login is reduced, and login efficiency is greatly improved.
The steps executed by the login management system based on information encryption can be implemented in the form of a computer program, and both the client and the management server in the login management system based on information encryption can be implemented in the form of a computer device, and the computer program can be run on the computer device as shown in fig. 10.
Referring to fig. 10, fig. 10 is a schematic block diagram of a computer device according to an embodiment of the present invention. The computer device may be a client or a management server for executing a login management method based on information encryption.
Referring to fig. 10, the computer device 500 includes a processor 502, memory, and a network interface 505 connected by a system bus 501, where the memory may include a storage medium 503 and an internal memory 504.
The storage medium 503 may store an operating system 5031 and a computer program 5032. The computer program 5032, when executed, may cause the processor 502 to perform a login management method based on information encryption, wherein the storage medium 503 may be a volatile storage medium or a non-volatile storage medium.
The processor 502 is used to provide computing and control capabilities that support the operation of the overall computer device 500.
The internal memory 504 provides an environment for running the computer program 5032 in the storage medium 503, and when the computer program 5032 is executed by the processor 502, the processor 502 can be caused to execute a login management method based on information encryption.
The network interface 505 is used for network communication, such as providing transmission of data information. Those skilled in the art will appreciate that the configuration shown in fig. 10 is a block diagram of only a portion of the configuration associated with aspects of the present invention and is not intended to limit the computing device 500 to which aspects of the present invention may be applied, and that a particular computing device 500 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The processor 502 is configured to run the computer program 5032 stored in the memory to implement the corresponding functions in the above login management method based on information encryption.
Those skilled in the art will appreciate that the embodiment of a computer device illustrated in fig. 10 does not constitute a limitation on the specific construction of the computer device, and that in other embodiments a computer device may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. For example, in some embodiments, the computer device may only include a memory and a processor, and in such embodiments, the structures and functions of the memory and the processor are consistent with those of the embodiment shown in fig. 10, and are not described herein again.
It should be understood that, in the embodiment of the present invention, the Processor 502 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general-purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In another embodiment of the invention, a computer-readable storage medium is provided. The computer readable storage medium may be a volatile or non-volatile computer readable storage medium. The computer-readable storage medium stores a computer program, wherein the computer program, when executed by a processor, implements the steps included in the above-described login management method based on information encryption.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses, devices and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only a logical division, and there may be other divisions when the actual implementation is performed, or units having the same function may be grouped into one unit, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a computer-readable storage medium, which includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned computer-readable storage media comprise: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A login management method based on information encryption is applied to a login management system based on information encryption, the system comprises a plurality of clients and a management server which establishes network connection with each client to realize data information transmission, and the method is characterized by comprising the following steps executed in the clients:
sending login information input by a user to a management server to obtain a verification result obtained by verifying the login information;
if the verification result is passed, acquiring a target directory address from the verification result to perform directory switching on the client;
sending a decryption request to the management server to receive an encrypted character string fed back by the management server according to the decryption request;
decrypting an encrypted database in the independent directory corresponding to the target directory address according to the encrypted character string to obtain decryption information in the encrypted database;
decrypting the encrypted file in the independent directory according to the decryption information so as to read the file content of the encrypted file for loading;
displaying the loaded file content to complete login.
2. The login management method based on information encryption according to claim 1, wherein the decrypting the encrypted database in the independent directory corresponding to the target directory address according to the encrypted character string to obtain the decryption information in the encrypted database comprises:
decrypting the encrypted character string according to a preset decryption rule to obtain a root password;
combining the root password with the unique account number in the verification result to serve as a secret key;
decrypting the encrypted database with the key to read decryption information from the decrypted encrypted database.
3. The login management method based on information encryption according to claim 1, wherein the decrypting the encrypted file in the independent directory according to the decryption information to read the file content of the encrypted file for loading comprises:
decompressing each encrypted file according to the decryption password corresponding to the file name of each encrypted file in the decryption information to obtain a decrypted file corresponding to each encrypted file;
and reading the file content of the decrypted file and loading the file content to a cache area of the client.
4. The login management method based on information encryption according to claim 1 or 2, wherein the method further comprises the following steps executed in the management server:
if registration information from any client is received, generating a unique account and a root password corresponding to the registration information;
combining the registration password in the registration information with the unique account to obtain combined information;
encrypting the root password according to the combined information and a preset encryption rule to obtain a corresponding encryption character string;
storing the unique account number, the encrypted character string and the registration password into the preset verification database;
and generating registration feedback information containing the unique account to the client.
5. The login management method based on information encryption according to claim 4, wherein the generating of the unique account and the root password corresponding to the registration information includes:
generating random characters with the number equal to a first preset number according to a preset first character type to serve as the unique account;
and generating random characters with the number equal to a second preset number according to a preset second character type to serve as the root password.
6. The login management method based on information encryption according to claim 4, wherein the generating a unique account number and a root password corresponding to the registration information includes:
combining all information items contained in the registration information to obtain an initial character string;
encoding characters contained in the initial character string according to a preset encoding rule to generate encoding information corresponding to the initial character string;
randomly acquiring a first preset number of character combinations from the coded information to be the unique account;
randomly acquiring a third preset number of character combinations from the coded information to be standby character strings;
adding a fourth preset number of special characters in the standby character string to obtain a target character string;
and serializing the target character string according to a preset serialization rule to generate the root password.
7. The login management method based on information encryption, according to claim 4, wherein after the registration feedback information containing the unique account number is sent to the client, the method further comprises the following steps executed in the client:
generating an independent directory with a directory address as the unique account;
creating an initial database in the independent directory;
acquiring characteristic information of each encrypted file in the independent directory and storing the characteristic information into the initial database, wherein the characteristic information comprises a file name and a decryption password corresponding to each encrypted file;
and combining the root password and the unique account in the verification result to be used as a secret key to encrypt the initial database to obtain an encrypted database.
8. A login management system based on information encryption, the system comprises a plurality of clients and a management server which establishes network connection with each client to realize data information transmission, and the system is characterized by comprising the following units configured in the clients:
a verification result acquisition unit configured to send login information input by a user to a management server to acquire a verification result obtained by verifying the login information;
the directory switching unit is used for acquiring a target directory address from the verification result to switch the directory of the client if the verification result is passed;
the encrypted character string acquisition unit is used for sending a decryption request to the management server so as to receive an encrypted character string fed back by the management server according to the decryption request;
a decryption information obtaining unit, configured to decrypt, according to the encrypted character string, an encrypted database in the independent directory corresponding to the target directory address, to obtain decryption information in the encrypted database;
the file content loading unit is used for decrypting the encrypted file in the independent directory according to the decryption information so as to read the file content of the encrypted file for loading;
and the file content display unit is used for displaying the loaded file content to finish login.
9. A login management system based on information encryption, comprising a client and a management server, wherein the client comprises a first memory, a first processor and a first computer program stored on the first memory and operable on the first processor, and the management server comprises a second memory, a second processor and a second computer program stored on the second memory and operable on the second processor, wherein the first processor executes the first computer program and the second processor executes the second computer program, so as to jointly implement the login management method based on information encryption according to any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that it stores a first computer program or a second computer program which, when executed by a first processor and by a second processor, together implement the method for login management based on information encryption according to any of claims 1 to 7.
CN202210837134.3A 2022-07-15 2022-07-15 Login management method, system and medium based on information encryption Pending CN115189875A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210837134.3A CN115189875A (en) 2022-07-15 2022-07-15 Login management method, system and medium based on information encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210837134.3A CN115189875A (en) 2022-07-15 2022-07-15 Login management method, system and medium based on information encryption

Publications (1)

Publication Number Publication Date
CN115189875A true CN115189875A (en) 2022-10-14

Family

ID=83519382

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210837134.3A Pending CN115189875A (en) 2022-07-15 2022-07-15 Login management method, system and medium based on information encryption

Country Status (1)

Country Link
CN (1) CN115189875A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116881869A (en) * 2023-09-07 2023-10-13 麒麟软件有限公司 Encryption protection method and system for executable program on Linux system
CN117118754A (en) * 2023-10-23 2023-11-24 深圳市几米物联有限公司 Information interaction management method, device, equipment and medium of Internet of things equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116881869A (en) * 2023-09-07 2023-10-13 麒麟软件有限公司 Encryption protection method and system for executable program on Linux system
CN116881869B (en) * 2023-09-07 2023-12-26 麒麟软件有限公司 Encryption protection method and system for executable program on Linux system
CN117118754A (en) * 2023-10-23 2023-11-24 深圳市几米物联有限公司 Information interaction management method, device, equipment and medium of Internet of things equipment
CN117118754B (en) * 2023-10-23 2023-12-22 深圳市几米物联有限公司 Information interaction management method, device, equipment and medium of Internet of things equipment

Similar Documents

Publication Publication Date Title
CN109583189B (en) Firmware secure loading method and device, computer equipment and storage medium
US10326740B2 (en) Efficient secret-key encrypted secure slice
US10360097B2 (en) Securing data in a dispersed storage network
CN115189875A (en) Login management method, system and medium based on information encryption
CN112883361B (en) Function jump method and device of application program, computer equipment and storage medium
CN110138739B (en) Data information encryption method and device, computer equipment and storage medium
CN112738051B (en) Data information encryption method, system and computer readable storage medium
US20170019253A1 (en) Decrypting segmented data in a distributed computing system
CN112529586B (en) Transaction information management method, device, equipment and storage medium
US10650160B2 (en) Enhancing security for multiple storage configurations
CN113449338A (en) Information encryption storage method and system based on block chain
US11741125B2 (en) Storage network for rebuilding failed slices
US10785194B2 (en) Processing intents using trusted entities in a dispersed storage network
CN113127844A (en) Variable access method, device, system, equipment and medium
CN112434094A (en) Database connection method and device based on encryption algorithm and computer equipment
CN114553556B (en) Data encryption method, device, computer equipment and storage medium
US10581807B2 (en) Using dispersal techniques to securely store cryptographic resources and respond to attacks
US10853171B2 (en) Encoding data in a dispersed storage network
US11360851B2 (en) Duplicating authentication information between connections
CN110781511A (en) Transaction information storage method and device, computer equipment and storage medium
CN116484407B (en) Data security protection method and device, electronic equipment and storage medium
CN113127034B (en) BMC-based board card updating method, system, equipment and medium
US20240104184A1 (en) Systems and methods for access control
US9547777B2 (en) Validating compressed archive keys
CN116961889A (en) Password saving and recovering method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination