CN115426166A - Data encryption method, device, equipment and computer readable storage medium - Google Patents

Data encryption method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN115426166A
CN115426166A CN202211057152.6A CN202211057152A CN115426166A CN 115426166 A CN115426166 A CN 115426166A CN 202211057152 A CN202211057152 A CN 202211057152A CN 115426166 A CN115426166 A CN 115426166A
Authority
CN
China
Prior art keywords
data
verified
user
encryption
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211057152.6A
Other languages
Chinese (zh)
Inventor
吕明明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202211057152.6A priority Critical patent/CN115426166A/en
Publication of CN115426166A publication Critical patent/CN115426166A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data encryption method, a data encryption device, data encryption equipment and a computer readable storage medium, which can be applied to the financial field or other fields. In response to the acquisition of the account information and the data to be verified input by the user, acquiring standard data corresponding to the account information; if the data to be verified are different from the standard data, obtaining comparison result data of the data to be verified and the standard data; encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain encrypted data to be verified; and responding to a display request triggered by the user, and displaying the encrypted data to be verified to the user. Therefore, the data to be verified and the standard data are obtained, the data to be verified are encrypted according to the comparison result data and the encryption rule, the encrypted data to be verified are obtained and displayed to a user, the specific digit of the data error of the user can be prompted, and the precision of determining the digit of the data error is improved.

Description

Data encryption method, device, equipment and computer readable storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a data encryption method, apparatus, device, and computer-readable storage medium.
Background
The user needs to input the corresponding password of the account to access the personal account, but the input password may be input incorrectly. Currently, a user is prompted with a prompt for a password entry error.
However, the method of presenting a password error using presentation information has a problem that presentation of a password error is not accurate.
Disclosure of Invention
In view of the above, the present application provides a data encryption method, apparatus, device and computer readable storage medium, which can improve the accuracy of determining the error bit number of data.
In order to solve the above problems, the technical solution provided by the present application is as follows:
in a first aspect, an embodiment of the present application provides a data encryption method, where the method includes:
in response to the acquisition of account information and to-be-verified data input by a user, acquiring standard data corresponding to the account information;
if the data to be verified are different from the standard data, comparing the data to be verified with the standard data to obtain comparison result data;
encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain encrypted data to be verified;
and responding to a display request triggered by the user, and displaying the encrypted data to be verified to the user.
In a possible implementation manner, the encrypting rule includes a correct character encrypting rule and an incorrect character encrypting rule, and the encrypting the data to be verified according to the comparison result data and a preset encrypting rule to obtain the encrypted data to be verified includes:
determining the same characters and different characters between the data to be verified and the standard data according to the comparison result data;
encrypting the same character according to the correct character encryption rule to obtain the encrypted same character;
encrypting the different characters according to the error character encryption rule to obtain encrypted different characters;
and obtaining encrypted data to be verified according to the encrypted same characters and the encrypted different characters.
In a possible implementation manner, the encrypting the different characters according to the error character encryption rule to obtain encrypted different characters includes:
acquiring the digit of the error character and a target value input by the user;
and encrypting the different characters according to the error characters, the digits of the error characters and the target value to obtain the encrypted different characters.
In one possible implementation, the method further includes:
acquiring the number of times of requests of the user trigger display request and the number of times of errors of the data to be verified, which are input by the user and are different from the standard data;
determining a danger coefficient of the account information according to the request times and the error times;
and if the danger coefficient is determined to be larger than a preset threshold value, sending alarm information to the user.
In one possible implementation, the method further includes:
acquiring updated data to be verified input by the user;
and if the updated data to be verified is the same as the standard data, encrypting the updated data to be verified according to the correct character encryption rule.
In a second aspect, an embodiment of the present application provides a data encryption apparatus, where the apparatus includes:
the first acquisition module is used for responding to the account information and the data to be verified input by the user and acquiring standard data corresponding to the account information;
the comparison module is used for comparing the data to be verified with the standard data to obtain comparison result data if the data to be verified and the standard data are different;
the encryption module is used for encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain encrypted data to be verified;
and the display module is used for responding to a display request triggered by the user and displaying the encrypted data to be verified to the user.
In one possible implementation, the encryption rules include a correct character encryption rule and an incorrect character encryption rule, and the encryption module includes:
the determining submodule is used for determining the same characters and different characters between the data to be verified and the standard data according to the comparison result data;
the first encryption submodule is used for encrypting the same characters according to the correct character encryption rule to obtain the encrypted same characters;
the second encryption submodule is used for encrypting the different characters according to the error character encryption rule to obtain encrypted different characters;
and the obtaining submodule is used for obtaining encrypted data to be verified according to the encrypted same characters and the encrypted different characters.
In a possible implementation manner, the second encryption submodule is specifically configured to obtain the number of bits of the error character and the target value input by the user; and encrypting the different characters according to the error characters, the digits of the error characters and the target value to obtain the encrypted different characters.
In one possible implementation, the apparatus further includes:
the second acquisition module is used for acquiring the number of times of requests of the user trigger display requests and the number of times of errors of the data to be verified, which is input by the user and is different from the standard data;
the determining module is used for determining a danger coefficient of the account information according to the request times and the error times;
and the sending module is used for sending alarm information to the user when the danger coefficient is determined to be larger than a preset threshold value.
In one possible implementation, the apparatus further includes:
the third acquisition module is used for acquiring the updated data to be verified input by the user;
and the updating encryption module is used for encrypting the updated data to be verified according to the correct character encryption rule if the updated data to be verified is the same as the standard data.
In a third aspect, an embodiment of the present application provides a data encryption device, including: a processor, a memory, a system bus;
the processor and the memory are connected through the system bus;
the memory is for storing one or more programs, the one or more programs comprising instructions, which when executed by the processor, cause the processor to perform the data encryption method of the first aspect described above.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium storing instructions that, when executed on a device, cause the device to perform the data encryption method according to the first aspect.
Therefore, the application has the following beneficial effects:
the application provides a data encryption method, a data encryption device and a computer readable storage medium, and firstly, in response to the acquisition of account information and to-be-verified data input by a user, standard data corresponding to the account information is acquired; if the data to be verified are different from the standard data, comparing the data to be verified with the standard data to obtain comparison result data; encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain encrypted data to be verified; and responding to a display request triggered by the user, and displaying the encrypted data to be verified to the user. And then, acquiring the comparison result data of the data to be verified and the standard data, encrypting the data to be verified according to the comparison result data and a preset encryption rule, and displaying the encrypted data to be verified to a user. The updated data to be verified is generated according to the encryption rule, the specific bit of the data dislocation of the user can be prompted, and the accuracy of determining the error bit of the data is improved.
Drawings
Fig. 1 is a schematic flowchart of a data encryption method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a data encryption device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In this application, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
At present, a user needs to input a password corresponding to an account to access an individual account, and for the condition of wrong password input, the user is prompted to have the wrong password input by using a prompt message. However, the method of prompting a password error using the prompt information is a method of prompting the entire string of passwords, and cannot prompt a specific number of error bits, which causes a problem that the prompt of a password data error is not accurate.
The application provides a data encryption method, a data encryption device, data encryption equipment and a computer readable storage medium, wherein standard data corresponding to account information are acquired in response to the acquisition of the account information and the data to be verified input by a user; if the data to be verified are different from the standard data, comparing the data to be verified with the standard data to obtain comparison result data; encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain encrypted data to be verified; and responding to a display request triggered by the user, and displaying the encrypted data to be verified to the user. And then, acquiring the comparison result data of the data to be verified and the standard data, encrypting the data to be verified according to the comparison result data and a preset encryption rule, and displaying the encrypted data to be verified to a user. The updated data to be verified is generated according to the encryption rule, the specific dislocation digit of the password data can be prompted to a user, and the accuracy of determining the error digit of the password data is improved.
In order to facilitate understanding of technical solutions provided in the embodiments of the present application, a data encryption method, an apparatus, a device, and a computer-readable storage medium provided in the embodiments of the present application are described below with reference to the accompanying drawings.
The data encryption method provided in the embodiment of the present application may be applied to a system, and may also be applied to a server, which is not limited to this, and the following description will take the system as an example. Referring to fig. 1, fig. 1 is a schematic flow chart of a data encryption method provided in an embodiment of the present application, where the method specifically includes S101-S104.
S101: and in response to the acquisition of the account information and the data to be verified input by the user, acquiring standard data corresponding to the account information.
The method comprises the steps of obtaining account information and to-be-verified data input by a user, wherein the to-be-verified data are passwords input by the user. And acquiring a standard password corresponding to the account information, wherein the standard password is a preset correct password. And if the data to be verified is the same as the standard password, the data to be verified is verified successfully, and the user can log in the account successfully. The standard password may be stored in the memory, and the standard password corresponding to the account information may be directly searched and acquired from the memory.
S102: and if the data to be verified is different from the standard data, comparing the data to be verified with the standard data to obtain comparison result data.
The data to be verified is compared with the standard password, and the comparison can be performed according to the data character digit sequence. If the data to be verified is the same as the standard password, the data to be verified is determined to be successfully verified, the information that the password is successfully verified can be displayed to the user, and the user enters an account interface. And if the data to be verified is determined to be different from the standard data, obtaining comparison result data of the data to be verified and the standard data. The comparison result data is difference result data between the data to be verified and the standard data, namely the same characters and different characters of the data to be verified and the standard data. For example, if the data to be verified is AQWSZX and the standard data is AQWDSX, the same characters are the first, second, third and sixth characters, and the different characters are the fourth and fifth characters.
S103: and encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain the encrypted data to be verified.
In a possible implementation manner, the encrypting rule includes a correct character encrypting rule and an incorrect character encrypting rule, and the encrypting the data to be verified according to the comparison result data and a preset encrypting rule to obtain the encrypted data to be verified includes: determining the same characters and different characters between the data to be verified and the standard data according to the comparison result data; encrypting the same character according to the correct character encryption rule to obtain the encrypted same character; encrypting the different characters according to the error character encryption rule to obtain encrypted different characters; and obtaining encrypted data to be verified according to the encrypted same characters and the encrypted different characters.
And encrypting the data to be verified by presetting the specified characters with the error conditions, and encrypting different characters when the different characters exist. In one possible implementation, encrypting the non-identical characters may specifically be displaying the designated characters instead of the non-identical characters. The correct character encryption rule may include randomly selecting any one of the numbers 0 to 9 as the encrypted data of the same character displayed to the user, wherein the random numbers corresponding to two adjacent correct characters are not all 9, and the two adjacent correct characters are not incremental numerical values. The error character encryption rule may include two cases, where the first case is that the error character is located in a first character, and the encrypted first character is displayed as a specific symbol. For example, if the data to be verified is UQWDSX and the standard data is AQWDSX, the first bit character is an error character, and the encrypted data to be verified displayed to the user is x 42826. The second case is that the correct character exists before the character bit where the incorrect character is located. For example, if the second digit is a correct digit and the third digit is an incorrect digit, the value of the incorrect digit is determined based on the random number of the correct digit. If the encrypted second digit character is displayed as 4, the encrypted third digit character is displayed as 5, and if the encrypted third digit character is increased progressively, the third digit character corresponding to 5 is indicated as an error character. And if the encrypted second digit character is 9, the encrypted third digit character is 9, and if a continuous numerical value of 9 exists, the third digit character is indicated as an error character. As an example, the data to be authenticated is AQMDSX, the standard data is AQWDSX, and if the random value corresponding to the second bit character is 4, the encrypted data to be authenticated is displayed to the user as 24826. And if the random number value corresponding to the second bit character is 9, the encrypted data to be verified displayed to the user is 299826.
In a possible implementation manner, the encrypting the different characters according to the error character encryption rule to obtain the encrypted different characters includes: acquiring the digit of the error character and a target value input by the user; and encrypting the different characters according to the error characters, the digits of the error characters and the target value to obtain the encrypted different characters.
There is a character bit encryption formula for encrypting characters, which is detailed in formula (1).
Q=(a+b)c (1)
Wherein Q is a character bit encrypted by using an encryption formula, and the numerical value displayed to a user is the unit number of the calculation result Q; a is a target value input by a user, namely data to be verified corresponding to the character bit; b is the bit number of the character bit, namely the b-th character of the character bit; c random number set by user. c can be determined by the number of bits of the character bit, if the number of bits of the character bit is an odd number, c = h; if the number of the character bits is an even number, c = f, and the values of e and h are not limited in the embodiment of the present application and can be selected according to actual situations. It should be noted that the character bit encryption formula is also used to encrypt the correct character.
S104: and responding to a display request triggered by the user, and displaying the encrypted data to be verified to the user.
When the user cannot input correct data to be verified, prompt information can be obtained by triggering a display request. The prompt message is encrypted data to be verified. The system records the times of triggering display requests by the user and records the times of errors of inputting the data to be verified by the user. In one possible implementation, the method further includes: acquiring updated data to be verified input by the user; and if the updated data to be verified is the same as the standard data, encrypting the updated data to be verified according to the correct character encryption rule.
And if the updated data to be verified is judged to be the same as the standard data, the information of successful password verification can be displayed to the user, and the user enters an account interface. And if the updated data to be verified is different from the standard data, executing new encryption operation.
In one possible implementation, the method further includes: acquiring the number of times of requests of the user trigger display request and the number of times of errors of the data to be verified, which are input by the user and are different from the standard data; determining a danger coefficient of the account information according to the request times and the error times; and if the danger coefficient is determined to be larger than a preset threshold value, sending alarm information to the user.
And calculating the risk coefficient of the account information according to a risk coefficient calculation formula (2).
Z=(a+n×1.6)e u+v+p×1.8 (2)
Wherein Z is the risk coefficient; n is the number of times of the user triggering and displaying the request; e is the base number of the natural logarithm; u is the device coefficient, i.e. the coefficient of the device used by the user to input the account information; v is a network environment coefficient, i.e. a coefficient of a network environment address used by the user to input the account information; p is a user coefficient, i.e., a coefficient that determines whether the user is an account information holder. In a possible implementation manner, common equipment corresponding to account information is acquired from a database, and whether equipment used by a user for inputting the account information is the common equipment is determined. If the device used by the user to input the account information is a commonly used device, the coefficient of the device is low. If the device used by the user to input the account information is not a commonly used device, the coefficient of the device is higher. And acquiring a common network environment address corresponding to the account information, and determining the network environment address used by the user for inputting the account information. If the network environment address used by the user for inputting the account information is the common network environment address, the coefficient of the network environment address is lower. If the network environment address used by the user for inputting the account information is not the common network environment address, the coefficient of the network environment address is higher. The coefficient of whether the user is the account information holder can be determined by using the face information obtained by the user, and if the user is not identified as the account information holder, the coefficient is higher. The embodiment of the present application does not limit the manner of obtaining the coefficients. And if the Z is larger than the preset threshold value, sending alarm information to the user and locking the account to be logged in by the user. In the embodiment of the present application, a specific value of the threshold is not limited, and may be selected according to an actual requirement.
Based on the related content of the above S101-S104, in response to acquiring the account information and the data to be verified input by the user, acquiring standard data corresponding to the account information; if the data to be verified are different from the standard data, comparing the data to be verified with the standard data to obtain comparison result data; encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain encrypted data to be verified; and responding to a display request triggered by the user, and displaying the encrypted data to be verified to the user. And then, acquiring the comparison result data of the data to be verified and the standard data, encrypting the data to be verified according to the comparison result data and a preset encryption rule, and displaying the encrypted data to be verified to a user. The updated data to be verified is generated according to the encryption rule, the specific bit of the data dislocation of the user can be prompted, and the accuracy of determining the error bit of the data is improved.
The data encryption method, the data encryption device, the data encryption equipment and the computer-readable storage medium can be used in the financial field or other fields, for example, in an application scenario of prompting a password input by a user in the financial field. Other fields are any fields other than the financial field, for example, the field of data processing technology. The foregoing is merely an example, and does not limit the application fields of the data encryption method, apparatus, device and computer-readable storage medium provided in the present application.
The foregoing embodiments of the present application provide a data encryption method based on the foregoing. Next, a data encryption device provided in an embodiment of the present application, which executes the method shown in fig. 1 and then describes functions of the data encryption device, a schematic structural diagram of the data encryption device is shown in fig. 2, and the data encryption device includes a first obtaining module 201, a comparing module 202, an encrypting module 203 and a displaying module 204.
The first obtaining module 201 is configured to obtain, in response to obtaining account information and to-be-verified data input by a user, standard data corresponding to the account information;
a comparison module 202, configured to compare the to-be-verified data with the standard data to obtain comparison result data if it is determined that the to-be-verified data is different from the standard data;
the encryption module 203 is configured to encrypt the to-be-verified data according to the comparison result data and a preset encryption rule, so as to obtain encrypted to-be-verified data;
a display module 204, configured to display the encrypted to-be-verified data to the user in response to obtaining the display request triggered by the user.
In a possible implementation manner, the encryption rules include a correct character encryption rule and an incorrect character encryption rule, and the encryption module 203 includes:
the determining submodule is used for determining the same characters and different characters between the data to be verified and the standard data according to the comparison result data;
the first encryption submodule is used for encrypting the same characters according to the correct character encryption rule to obtain the encrypted same characters;
the second encryption submodule is used for encrypting the different characters according to the error character encryption rule to obtain encrypted different characters;
and the obtaining submodule is used for obtaining encrypted data to be verified according to the encrypted same characters and the encrypted different characters.
In a possible implementation manner, the second encryption submodule is specifically configured to obtain the number of bits of the error character and the target value input by the user; and encrypting the different characters according to the error characters, the digits of the error characters and the target value to obtain the encrypted different characters.
In one possible implementation, the apparatus further includes:
the second acquisition module is used for acquiring the number of times of requests of the user trigger display requests and the number of times of errors of the data to be verified, which is input by the user and is different from the standard data;
the determining module is used for determining a danger coefficient of the account information according to the request times and the error times;
and the sending module is used for sending alarm information to the user when the danger coefficient is determined to be larger than a preset threshold value.
In one possible implementation, the apparatus further includes:
the third acquisition module is used for acquiring the updated data to be verified input by the user;
and the updating encryption module is used for encrypting the updated data to be verified according to the correct character encryption rule if the updated data to be verified is the same as the standard data.
The embodiment of the application provides a data encryption device, which comprises a first acquisition module, a comparison module, an encryption module and a display module. The first acquisition module is used for responding to account information and data to be verified input by an acquisition user and acquiring standard data corresponding to the account information; the comparison module is used for comparing the data to be verified with the standard data to obtain comparison result data if the data to be verified and the standard data are different; the encryption module is used for encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain encrypted data to be verified; and the display module is used for responding to a display request triggered by the user and displaying the encrypted data to be verified to the user. And then, acquiring the comparison result data of the data to be verified and the standard data, encrypting the data to be verified according to the comparison result data and a preset encryption rule, and displaying the encrypted data to be verified to a user. The updated data to be verified is generated according to the encryption rule, the specific bit number of the password dislocation of the user can be prompted, and the accuracy of determining the error bit number of the password is improved.
Based on the data encryption method provided by the foregoing method embodiment, an embodiment of the present application further provides a data encryption device, including: a processor, a memory, a system bus;
the processor and the memory are connected through the system bus;
the memory is configured to store one or more programs, the one or more programs including instructions, which when executed by the processor, cause the processor to perform the data encryption method of any of the above embodiments.
Based on the data encryption method provided in the foregoing method embodiment, an embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium stores instructions that, when run on a device, cause the device to execute the data encryption method described in any one of the foregoing embodiments.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the system or system embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described system and system embodiments are only illustrative, wherein the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement without inventive effort.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of data encryption, the method comprising:
in response to the acquisition of account information and to-be-verified data input by a user, acquiring standard data corresponding to the account information;
if the data to be verified are different from the standard data, comparing the data to be verified with the standard data to obtain comparison result data;
encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain encrypted data to be verified;
and responding to a display request triggered by the user, and displaying the encrypted data to be verified to the user.
2. The method according to claim 1, wherein the encryption rules include a correct character encryption rule and an incorrect character encryption rule, and the encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain encrypted data to be verified includes:
determining the same characters and different characters between the data to be verified and the standard data according to the comparison result data;
encrypting the same character according to the correct character encryption rule to obtain the encrypted same character;
encrypting the different characters according to the error character encryption rule to obtain encrypted different characters;
and obtaining encrypted data to be verified according to the encrypted same characters and the encrypted different characters.
3. The method of claim 2, wherein encrypting the different characters according to the incorrect character encryption rule to obtain encrypted different characters comprises:
acquiring the digit of the error character and a target value input by the user;
and encrypting the different characters according to the error characters, the digits of the error characters and the target value to obtain the encrypted different characters.
4. The method of claim 1, further comprising:
acquiring the number of times of requests of the user trigger display requests and the number of times of errors of the data to be verified, which are input by the user and are different from the standard data;
determining a danger coefficient of the account information according to the request times and the error times;
and if the danger coefficient is determined to be larger than a preset threshold value, sending alarm information to the user.
5. The method of claim 2, further comprising:
acquiring updated data to be verified input by the user;
and if the updated data to be verified is the same as the standard data, encrypting the updated data to be verified according to the correct character encryption rule.
6. An apparatus for encrypting data, the apparatus comprising:
the first acquisition module is used for responding to the account information and the data to be verified input by the user and acquiring standard data corresponding to the account information;
the comparison module is used for comparing the data to be verified with the standard data to obtain comparison result data if the data to be verified and the standard data are different;
the encryption module is used for encrypting the data to be verified according to the comparison result data and a preset encryption rule to obtain encrypted data to be verified;
and the display module is used for responding to a display request triggered by the user and displaying the encrypted data to be verified to the user.
7. The apparatus of claim 6, wherein the encryption rules comprise correct character encryption rules and incorrect character encryption rules, and wherein the encryption module comprises:
the determining submodule is used for determining the same characters and different characters between the data to be verified and the standard data according to the comparison result data;
the first encryption sub-module is used for encrypting the same characters according to the correct character encryption rule to obtain encrypted same characters;
the second encryption submodule is used for encrypting the different characters according to the error character encryption rule to obtain encrypted different characters;
and the obtaining sub-module is used for obtaining the encrypted data to be verified according to the encrypted same characters and the encrypted different characters.
8. The apparatus according to claim 7, wherein the second encryption sub-module is specifically configured to obtain the number of bits of the erroneous character and the target value input by the user; and encrypting the different characters according to the error characters, the digits of the error characters and the target value to obtain the encrypted different characters.
9. A data encryption device, comprising: a processor, a memory, a system bus;
the processor and the memory are connected through the system bus;
the memory is configured to store one or more programs, the one or more programs including instructions, which when executed by the processor, cause the processor to perform the data encryption method of any of the above 1-5.
10. A computer-readable storage medium storing instructions that, when executed on a device, cause the device to perform a data encryption method as claimed in any one of claims 1 to 5.
CN202211057152.6A 2022-08-30 2022-08-30 Data encryption method, device, equipment and computer readable storage medium Pending CN115426166A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211057152.6A CN115426166A (en) 2022-08-30 2022-08-30 Data encryption method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211057152.6A CN115426166A (en) 2022-08-30 2022-08-30 Data encryption method, device, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN115426166A true CN115426166A (en) 2022-12-02

Family

ID=84201331

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211057152.6A Pending CN115426166A (en) 2022-08-30 2022-08-30 Data encryption method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN115426166A (en)

Similar Documents

Publication Publication Date Title
US8869303B2 (en) Method and system for generation of dynamic password
CN107943949B (en) Method and server for determining web crawler
CN108009435B (en) Data desensitization method, device and storage medium
US9787696B2 (en) Brute force attack prevention system
CN103888254A (en) Network information verification method and apparatus
US8011014B2 (en) System and method for password validation based on password's value and manner of entering the password
CN107438049B (en) Malicious login identification method and device
US20190268326A1 (en) Authentication Based On Visual Memory
EA034474B1 (en) Method and system for abstracted and randomized one-time passwords for transactional authentication
CN104348624B (en) A kind of method and apparatus of Hash authentication trustworthiness
CN108965291B (en) Registration login method and system of hybrid application program and computer equipment
US8484724B2 (en) User permissions in computing systems
CN114741704A (en) Privacy protection method, device, equipment and medium based on marriage and love dating
CN104468561A (en) Method and system for changing password
US10979420B2 (en) Method for authenticating with a password comprising a salt
CN111445250B (en) Block chain key testing method and device
CN116680673B (en) Identity verification method and device for display and computer equipment
CN115426166A (en) Data encryption method, device, equipment and computer readable storage medium
CN112491625A (en) Operation and maintenance alarming method, device and equipment based on instant communication platform
US10284371B2 (en) Brute force attack prevention system
CN115344852A (en) Weak password detection method, device, equipment, storage medium and program product
CN113591071A (en) Login method and device
CN111639322B (en) Application login method and device, electronic equipment and computer storage medium
CN114401117A (en) Account login verification system based on block chain
CN112085469A (en) Data approval method, device, equipment and storage medium based on vector machine model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination