CN115622794A - Encryption and decryption method, device, equipment and storage medium - Google Patents

Encryption and decryption method, device, equipment and storage medium Download PDF

Info

Publication number
CN115622794A
CN115622794A CN202211420374.XA CN202211420374A CN115622794A CN 115622794 A CN115622794 A CN 115622794A CN 202211420374 A CN202211420374 A CN 202211420374A CN 115622794 A CN115622794 A CN 115622794A
Authority
CN
China
Prior art keywords
target
login
decryption
encryption
algorithms
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211420374.XA
Other languages
Chinese (zh)
Other versions
CN115622794B (en
Inventor
盖雪峰
刘瑞
庞博
成煜娟
孙马秋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Password Cloud Core Technology Co ltd
Original Assignee
Beijing Password Cloud Core Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Password Cloud Core Technology Co ltd filed Critical Beijing Password Cloud Core Technology Co ltd
Priority to CN202211420374.XA priority Critical patent/CN115622794B/en
Publication of CN115622794A publication Critical patent/CN115622794A/en
Application granted granted Critical
Publication of CN115622794B publication Critical patent/CN115622794B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses an encryption and decryption method, device, equipment and storage medium. The encryption method comprises the following steps: responding to the login operation, and generating a session request; sending a session request to a server and receiving a target random number fed back by the server; selecting at least two target encryption algorithms from the at least two candidate encryption algorithms according to the login account and the target random number; encrypting a login password plaintext of the login account according to each target encryption algorithm to generate a login password ciphertext; and sending a login password ciphertext and a login account to the server. According to the technical scheme, the complexity of the target encryption algorithm determining process and the randomness of the determining result are increased, so that the cracking difficulty of a login password ciphertext obtained by encrypting the login password plaintext of the login account based on each target encryption algorithm is improved, and the account safety of the login account corresponding to the session request is improved. Meanwhile, the atomicity of the encryption process is improved.

Description

Encryption and decryption method, device, equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of data security, in particular to an encryption and decryption method, device, equipment and storage medium.
Background
With the popularization and commercialization of the internet, the types of value-added services on the internet are also becoming abundant, so that the security of data becomes increasingly important, particularly in the aspect of data security in the account login process. At present, the most common method for improving the security of the account login process is to encrypt the login password.
However, the way of encrypting the login password in the prior art is very easy to crack, and the security of the account login process is reduced.
Disclosure of Invention
The application provides an encryption and decryption method, device, equipment and storage medium, which are used for improving the account security of a login account and improving the atomicity of an encryption process.
In a first aspect, an embodiment of the present application provides an encryption method, which is applied to a user side, and includes:
responding to the login operation, and generating a session request;
sending a session request to a server and receiving a target random number fed back by the server;
selecting at least two target encryption algorithms from the at least two candidate encryption algorithms according to the login account and the target random number;
encrypting a login password plaintext of the login account according to each target encryption algorithm to generate a login password ciphertext;
and sending a login password ciphertext and a login account to the server.
In a second aspect, an embodiment of the present application further provides a decryption method, applied to a server, including:
acquiring a login password ciphertext and a login account sent by the user terminal in the current login session;
determining a target random number according to the session identification of the login session;
selecting at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target random number and the login account;
decrypting the login password ciphertext according to each target decryption algorithm to generate a login password plaintext;
and feeding back a login page to the user side according to the consistency of the plaintext of the login password and the login password registered by the login account.
In a third aspect, an embodiment of the present application further provides an encryption apparatus configured at a user end, including:
the session request generating module is used for responding to the login operation and generating a session request;
the random number receiving module is used for sending a session request to the server and receiving a target random number fed back by the server;
the encryption algorithm selection module is used for selecting at least two target encryption algorithms from at least two candidate encryption algorithms according to the login account and the target random number;
the password ciphertext generating module is used for encrypting the login password plaintext of the login account according to each target encryption algorithm to generate a login password ciphertext;
and the data sending module is used for sending the login password ciphertext and the login account number to the server.
In a fourth aspect, an embodiment of the present application further provides a decryption apparatus, configured at a server, and including:
the data acquisition module is used for acquiring a login password ciphertext and a login account sent by the current login session of the user side;
the random number determining module is used for determining a target random number according to the session identification of the login session;
the decryption algorithm selection module is used for selecting at least two target decryption algorithms from at least two candidate decryption algorithms according to the target random number and the login account;
the password plaintext generation module is used for decrypting the login password ciphertext according to each target decryption algorithm to generate a login password plaintext;
and the login page feedback module is used for feeding back the login page to the user side according to the consistency of the login password plaintext and the login password registered by the login account.
In a fifth aspect, an embodiment of the present application further provides an electronic device, including:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement an encryption method as provided by an embodiment of the first aspect or a decryption method as provided by an embodiment of the second aspect.
In a sixth aspect, this embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements an encryption method as provided in the embodiment of the first aspect or a decryption method as provided in the embodiment of the second aspect.
The embodiment of the application responds to the login operation and generates a session request; sending a session request to a server and receiving a target random number fed back by the server; selecting at least two target encryption algorithms from the at least two candidate encryption algorithms according to the login account and the target random number; encrypting a login password plaintext of the login account according to each target encryption algorithm to generate a login password ciphertext; and sending a login password ciphertext and a login account to the server. According to the technical scheme, at least two target encryption algorithms are selected from at least two candidate encryption algorithms according to the login account and the target random number issued by the session request, the complexity of the target encryption algorithm determining process and the randomness of the determining result are increased, the cracking difficulty of the login password ciphertext obtained by encrypting the login password plaintext of the login account based on each target encryption algorithm is improved, and the account security corresponding to the session request is improved. Meanwhile, the target encryption algorithm is strongly related to the login account number, so that when the login password ciphertext of the login account number corresponding to the session request is cracked, the account number safety of the login account numbers of other session requests cannot be influenced, and the atomicity of the encryption process is improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present application, nor do they limit the scope of the present application. Other features of the present application will become apparent from the following description.
Drawings
Fig. 1 is a flowchart of an encryption method according to an embodiment of the present application;
fig. 2 is a flowchart of a decryption method according to a second embodiment of the present application;
fig. 3 is a flowchart of an encryption and decryption method according to a third embodiment of the present application;
fig. 4 is a structural diagram of an encryption device according to a fourth embodiment of the present application;
fig. 5 is a block diagram of a decryption apparatus according to a fifth embodiment of the present application;
fig. 6 is a block diagram of an electronic device implementing an encryption method and/or a decryption method according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of an encryption method provided in an embodiment of the present application, where the embodiment is suitable for encrypting a login password of a login account, and the method is executed by an encryption device, where the encryption device is implemented by software and/or hardware and is specifically configured in a user side. The user side may be a desktop computer or a mobile phone.
An encryption method as shown in fig. 1, comprising:
s101, responding to the login operation, and generating a session request.
The session request may include a session identifier, session content, and the like.
S102, sending a session request to the server and receiving a target random number fed back by the server.
The target random number may be a random number allocated to the session request.
Specifically, the user side sends a session request to the server side; the server receives the session request, distributes a target random number for the session request according to a preset random algorithm, and feeds the target random number back to the client; the user end receives the target random number for subsequent use.
S103, selecting at least two target encryption algorithms from the at least two candidate encryption algorithms according to the login account and the target random number.
The login account is used for uniquely identifying the user. In the process of one session, one login account corresponds to one target random number. The candidate encryption algorithms can be preset according to business needs, and fixed number of encryption algorithms are set to serve as a selection basis of the target encryption algorithm. The target encryption algorithm may be a candidate encryption algorithm selected according to the login account and the target random number, and is used for encrypting the login password of the login account.
Illustratively, the target hash may be generated according to the login account number and the target random number; and selecting at least two target encryption algorithms from the at least two candidate encryption algorithms according to the target hash.
The target hash may be a character code with a fixed length generated according to the login account and the target random number.
Specifically, based on a preset hash algorithm, generating a target hash according to a login account and a target random number; and selecting at least two target encryption algorithms from the at least two candidate encryption algorithms according to the target hash. The preset hash algorithm is not limited in any way, and can be set by technical staff according to requirements or experience.
In the above example, a method for selecting a target encryption algorithm from candidate encryption algorithms is provided, where a target hash is generated according to a login account and a target random number; and selecting at least two target encryption algorithms from the at least two candidate encryption algorithms according to the target hash. The random generation of the target random number enables the target hash generated according to the login account number and the target random number to have certain regularity, and the situation that the target encryption algorithm cannot be positioned corresponding to the target decryption algorithm in the subsequent data decryption process is avoided.
As an optional manner of the embodiment of the present application, the selecting, according to the target hash, at least two target encryption algorithms from the at least two candidate encryption algorithms may be: determining the target number of a target encryption algorithm according to the byte number of the target hash; and selecting a target number of candidate encryption algorithms from at least two candidate encryption algorithms as target encryption algorithms according to a preset selection sequence.
The number of bytes may refer to the number of bytes of the target hash. The target number may refer to the number of target encryption algorithms. The target number of target encryption algorithms may be equal to the number of bytes of the target hash. The preset selection sequence may be selected according to a certain rule according to the arrangement sequence of the candidate encryption algorithms, for example, according to the arrangement sequence of the candidate encryption algorithms, from front to back, at a fixed interval.
Specifically, the target number of the target encryption algorithm is determined according to the byte number of the target hash; and if the target number of the target encryption algorithms is less than or equal to the number of the candidate encryption algorithms, selecting the target number of the candidate encryption algorithms as the target encryption algorithms from at least two candidate encryption algorithms according to a preset selection sequence. For example, if the number of bytes of the target hash is 5, the target number of the target encryption algorithm is 5; if the number of the candidate encryption algorithms is 6, selecting 5 candidate encryption algorithms from the 6 candidate encryption algorithms as target encryption algorithms according to a preset selection sequence. And if the target number of the target encryption algorithms is larger than the number of the candidate encryption algorithms, circularly selecting the target number of the candidate encryption algorithms as the target encryption algorithms according to a preset selection sequence. For example, if the number of bytes of the target hash is 4, the target number of the target encryption algorithm is 4; if the number of the candidate encryption algorithms is 3; the preset selection sequence is the arrangement sequence of the candidate encryption algorithms, and the arrangement sequence of the candidate encryption algorithms is an encryption algorithm A, an encryption algorithm B and an encryption algorithm C; according to a preset selection sequence, circularly selecting 4 candidate encryption algorithms as a target encryption algorithm, wherein the target encryption algorithm is arranged according to the selection sequence: encryption algorithm A, encryption algorithm B, encryption algorithm C and encryption algorithm A.
According to the technical scheme, the method for selecting the target encryption algorithm from the candidate encryption algorithms is further refined, and the target number of the target encryption algorithm is determined according to the byte number of the target hash; and selecting a target number of candidate encryption algorithms from at least two candidate encryption algorithms as target encryption algorithms according to a preset selection sequence. The number of target encryption algorithms is determined, and the situations of quantity confusion and uncontrollable occurrence are avoided.
In an optional embodiment, the target encryption algorithm corresponding to each byte may be selected from the candidate encryption algorithms according to the hash value of each byte in the target hash. For example, if the hash value is 5, the 5 th candidate encryption algorithm is selected as the target encryption algorithm. If the total number of the candidate encryption algorithms is smaller than the hash value, 1 can be added to the remainder result of the hash value on the total number of the candidate encryption algorithms to obtain a selection serial number, and a target encryption algorithm is selected from the candidate encryption algorithms according to the selection serial number.
And S104, encrypting the login password plaintext of the login account according to each target encryption algorithm to generate a login password ciphertext.
The login password plaintext may refer to a login password corresponding to the login account. The login password ciphertext may be a character code obtained by encrypting a login password corresponding to the login account.
Specifically, according to the preset sequence of each target encryption algorithm, the login password plaintext of the login account is encrypted in a cascade mode to generate a login password ciphertext.
For example, the initial letters of the target encryption algorithms may be arranged in an ascending order, and the login password plaintext of the login account may be encrypted in a cascade manner according to the obtained arrangement order of the target encryption algorithms to generate a login password ciphertext.
For example, according to the selection sequence of the target encryption algorithm, the unused target encryption algorithms may be sequentially selected to encrypt the data to be encrypted, and the encryption result of the target encryption algorithm that is used last time is used as the login password ciphertext. The data to be encrypted of the first target encryption algorithm is a login password plaintext, and the data to be encrypted of other target encryption algorithms is an encryption result of the previous target encryption algorithm.
Specifically, if the selection sequence of the target encryption algorithm is an encryption algorithm C, an encryption algorithm A and an encryption algorithm B, firstly, encrypting a login password plaintext of a login account by using the encryption algorithm C according to the selection sequence of the target encryption algorithm to obtain an encryption result a1; then, encrypting the encryption result a1 by using an encryption algorithm A to obtain an encryption result a2; and finally, encrypting the encryption result a2 by using an encryption algorithm B to obtain a login password ciphertext of the login account.
The operation provides a specific method for encrypting the login password plaintext by using the target encryption algorithm to generate the login password ciphertext, so that the detailed encryption sequence for encrypting the login password plaintext is definitely given, the dynamic encryption of the login password plaintext is realized, and the decryption sequence positioning is conveniently carried out when the login password ciphertext is decrypted subsequently.
As an optional mode of the embodiment of the application, the number of encryption layers of each target encryption algorithm may also be determined, so as to increase the difficulty of cracking the login password ciphertext of the login account.
For example, the number of encryption layers of each candidate encryption algorithm may be set in advance. For example, if the number of encryption layers of each candidate encryption algorithm is preset to be 2 times; candidate encryption algorithms include: encryption algorithm a, encryption algorithm B, and encryption algorithm C. When all candidate encryption algorithms are sequentially used as target encryption algorithms, firstly, encrypting a login password plaintext of a login account for 2 times by using an encryption algorithm A to obtain an encryption result a1; then, encrypting the encryption result a1 for 2 times by using an encryption algorithm B to obtain an encryption result a2; and finally, encrypting the encryption result a2 for 2 times by using an encryption algorithm C to obtain a login password ciphertext of the login account. It should be noted that, the number of encryption layers corresponding to different candidate encryption algorithms may be the same or different.
For example, the number of encryption layers of each target encryption algorithm may be set according to the selection sequence of each target encryption algorithm. For example, if the selection sequence of the target encryption algorithm is an encryption algorithm a, an encryption algorithm B and an encryption algorithm C, the encryption algorithm a is used to encrypt the login password plaintext of the login account for 1 time to obtain an encryption result a1; then, encrypting the encryption result a1 for 2 times by using an encryption algorithm B to obtain an encryption result a2; and finally, encrypting the encryption result a2 for 3 times by using an encryption algorithm C to obtain a login password ciphertext of the login account.
In an optional embodiment, for any target encryption algorithm, the number of encryption layers of the target encryption algorithm may also be determined according to the hash value of the corresponding byte of the target hash when the target encryption algorithm is selected. For example, when the first target encryption algorithm is selected, if the hash value of the first byte in the target hash is 5, the number of encryption layers when the target encryption algorithm is used for encryption is 5. In order to avoid the increase of the calculation amount caused by the overlarge numerical value of the encryption layer number, the maximum encryption layer number can be set, and the numerical value of the encryption layer number determination result is reduced by a mode of taking the balance of the maximum encryption layer number.
And S105, sending a login password ciphertext and a login account to the server.
Specifically, the user side sends a login password ciphertext and a login account of the user to the server side, so that the subsequent server side provides data service for the corresponding user.
The embodiment of the application responds to the login operation and generates a session request; sending a session request to a server and receiving a target random number fed back by the server; selecting at least two target encryption algorithms from the at least two candidate encryption algorithms according to the login account and the target random number; encrypting a login password plaintext of the login account according to each target encryption algorithm to generate a login password ciphertext; and sending a login password ciphertext and a login account to the server. According to the technical scheme, at least two target encryption algorithms are selected from at least two candidate encryption algorithms according to the login account and the target random number issued by the session request, the complexity of the target encryption algorithm determining process and the randomness of the determining result are increased, the cracking difficulty of the login password ciphertext obtained by encrypting the login password plaintext of the login account based on each target encryption algorithm is improved, and the account security corresponding to the session request is improved. Meanwhile, the target encryption algorithm is strongly related to the login account, so that when the login password ciphertext of the login account corresponding to the session request is cracked, the account safety of the login account of other session requests cannot be influenced, and the atomicity of the encryption process is improved.
Example two
Fig. 2 is a flowchart of a decryption method provided in the second embodiment of the present application, where the second embodiment is applicable to a case where a login password of a login account is decrypted, and the method is executed by a decryption device, where the decryption device is implemented by software and/or hardware, and is specifically configured in a server.
A decryption method as shown in fig. 2, comprising:
s201, obtaining a login password ciphertext and a login account number sent by the current login session of the user side.
The login session may include a login account, a login password ciphertext, a session identifier, and the like of the user.
S202, determining a target random number according to the session identification of the login session.
Wherein, the session identification is used for uniquely identifying the one-time login session. One session identification corresponds to one target random number.
Specifically, according to the session identifier of the login session, the target random number corresponding to the login session is extracted from the server.
S203, selecting at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target random number and the login account.
The login account is used for uniquely identifying the user. In the process of one login session, one login account corresponds to one target random number. The candidate decryption algorithms may be determined according to the candidate encryption algorithms, and a fixed number of decryption algorithms may be set as a basis for selection of the target decryption algorithm. For example, if the candidate encryption algorithm has encryption algorithm a and encryption algorithm B, then the candidate decryption algorithm has decryption algorithm a 'and decryption algorithm B'. The target decryption algorithm may be a candidate decryption algorithm selected according to the login account and the target random number, and is used for decrypting the login password ciphertext of the login account.
It should be noted that, each candidate decryption algorithm corresponds to the candidate encryption algorithm used in the encryption process, and the number of the candidate decryption algorithms is the same.
Further, a target hash can be generated according to the login account and the target random number; and selecting at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target hash.
The target hash may be a character code with a fixed length generated according to the login account and the target random number.
Specifically, based on a preset hash algorithm, generating a target hash according to a login account and a target random number; and selecting at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target hash. The preset hash algorithm is not limited at all, and can be set by technical staff according to requirements or experience.
According to the technical scheme, the method for selecting the target decryption algorithm from the candidate decryption algorithms is provided, and the target hash is generated according to the login account and the target random number; and selecting at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target hash. According to the session identification of the login session, the target random number is determined, so that the target hash generated according to the login account and the target random number has certain regularity, and the target decryption algorithm is convenient to position the decryption position in the subsequent data decryption process.
Further, the selecting at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target hash may be: determining the target number of a target decryption algorithm according to the byte number of the target hash; and selecting a target number of candidate decryption algorithms from at least two candidate decryption algorithms as target decryption algorithms according to a preset selection sequence.
The number of bytes may refer to the number of bytes included in the target hash. The target number may refer to the number of target decryption algorithms. The target number of target decryption algorithms may be equal to the number of bytes of the target hash. The preset selection sequence may be selected according to a certain rule according to the arrangement sequence of the candidate decryption algorithms, for example, according to the arrangement sequence of the candidate decryption algorithms, from front to back.
Specifically, the target number of the target decryption algorithm is determined according to the byte number of the target hash; and if the target number of the target decryption algorithms is less than or equal to the number of the candidate decryption algorithms, selecting the target number of the candidate decryption algorithms as the target decryption algorithms from at least two candidate decryption algorithms according to a preset selection sequence. For example, if the number of bytes of the target hash is 5, the target number of the target decryption algorithm is 5; if the number of the candidate decryption algorithms is 6, selecting 5 candidate decryption algorithms from the 6 candidate decryption algorithms as the target decryption algorithm according to a preset selection sequence. And if the target number of the target decryption algorithms is larger than the number of the candidate decryption algorithms, circularly selecting the target number of the candidate decryption algorithms as the target decryption algorithms according to a preset selection sequence. For example, if the number of bytes of the target hash is 4, the target number of the target decryption algorithm is 4; if the number of the candidate decryption algorithms is 3; the preset selection sequence is a candidate decryption algorithm arrangement sequence, and the candidate decryption algorithm arrangement sequence is a decryption algorithm A ', a decryption algorithm B ' and a decryption algorithm C '; according to a preset selection sequence, circularly selecting 4 candidate decryption algorithms as target decryption algorithms, and arranging the target decryption algorithms according to the selection sequence: decryption algorithm a ', decryption algorithm B', decryption algorithm C 'and decryption algorithm a'.
According to the technical scheme, the method for selecting the target decryption algorithm from the candidate decryption algorithms is further refined, and the target number of the target decryption algorithm is determined according to the byte number of the target hash; and selecting a target number of candidate decryption algorithms from at least two candidate decryption algorithms as target decryption algorithms according to a preset selection sequence. The number of the target decryption algorithms is determined, and the situations that the number of the target decryption algorithms is mixed up and uncontrollable in the data decryption process are avoided.
In an optional embodiment, the target decryption algorithm corresponding to each byte may be selected from the candidate decryption algorithms according to the hash value of each byte in the target hash. For example, if the hash value is 5, the 5 th candidate decryption algorithm is selected as the target decryption algorithm. If the total number of the candidate decryption algorithms is smaller than the hash value, 1 can be added to the remainder of the total number of the candidate decryption algorithms by the hash value to obtain a selection serial number, and a target decryption algorithm can be selected from the candidate decryption algorithms according to the selection serial number.
And S204, decrypting the login password ciphertext according to each target decryption algorithm to generate a login password plaintext.
The login password ciphertext may be a character code obtained by encrypting a login password corresponding to a login account. The login password plaintext may be a character code obtained by decrypting a login password corresponding to the login account.
Specifically, according to the preset sequence of each target decryption algorithm, the login password ciphertext is subjected to cascade decryption to generate a login password plaintext.
Illustratively, each target decryption algorithm performs cascade decryption on the login password ciphertext according to the ascending order of the initials to generate a login password plaintext.
Illustratively, according to the sequence opposite to the selection sequence of the target decryption algorithm, the unused target decryption algorithm is sequentially selected to decrypt the data to be decrypted, and the decryption result of the last used target decryption algorithm is used as the plaintext of the login password; the data to be decrypted of the first target decryption algorithm is a login password ciphertext, and the data to be decrypted of the other target decryption algorithms are decryption results of the previous target decryption algorithm.
Specifically, if the selection sequence of the target decryption algorithm is decryption algorithm C ', decryption algorithm A ' and decryption algorithm B '; according to the sequence opposite to the selection sequence of the target decryption algorithm, firstly, the login password ciphertext is decrypted by using an encryption algorithm B' to obtain a decryption result B1; then, decrypting the decryption result b1 by using a decryption algorithm A' to obtain a decryption result b2; and finally, decrypting the decryption result b2 by using a decryption algorithm C' to obtain a login password plaintext.
The operation provides a specific method for decrypting the login password ciphertext by using the target decryption algorithm to generate the login password plaintext, so that the detailed decryption sequence for decrypting the login password ciphertext is definitely given, the decryption positioning of each target decryption algorithm is definitely determined, and the dynamic decryption of the login password ciphertext is realized.
As an optional manner of the embodiment of the present application, the number of decryption layers of each target decryption algorithm may also be determined, so as to increase the difficulty of cracking the login password ciphertext of the login account.
For example, the number of decryption layers for each candidate decryption algorithm may be preset. For example, if the number of decryption layers of each candidate decryption algorithm is preset to be 2; the candidate decryption algorithms include: decryption algorithm a ', decryption algorithm B ', and decryption algorithm C '. When all candidate decryption algorithms are sequentially used as target decryption algorithms, firstly, decrypting a login password ciphertext of a login account for 2 times by using a decryption algorithm A' to obtain a decryption result b1; then, decrypting the decryption result B1 for 2 times by using a decryption algorithm B' to obtain a decryption result B2; and finally, decrypting the decryption result b2 for 2 times by using a decryption algorithm C' to obtain a login password plaintext of the login account. It should be noted that, the number of decryption layers corresponding to different candidate decryption algorithms may be the same or different.
For example, the number of decryption layers of each target decryption algorithm may be set according to an order opposite to the selection order of each target decryption algorithm. For example, if the selection sequence of the target decryption algorithm is decryption algorithm a ', decryption algorithm B' and decryption algorithm C ', the decryption algorithm C' is first used to decrypt the login password plaintext of the login account for 3 times, so as to obtain a decryption result a1; then, decrypting the decryption result a1 for 2 times by using a decryption algorithm B' to obtain a decryption result a2; and finally, decrypting the decryption result a2 for 1 time by using a decryption algorithm A' to obtain a login password ciphertext of the login account.
In an optional embodiment, for any target decryption algorithm, the number of decryption layers of the target decryption algorithm may also be determined according to the hash value of the corresponding byte of the target hash when the target decryption algorithm is selected. For example, when the first target decryption algorithm is selected, if the hash value of the first byte in the target hash is 5, the number of decryption layers when decryption is performed by using the target decryption algorithm is 5. In order to avoid the increase of the calculation amount caused by the overlarge numerical value of the decryption layer number, the maximum decryption layer number can be set, and the numerical value of the decryption layer number determination result is reduced by a mode of taking the balance of the maximum decryption layer number.
And S205, feeding back a login page to the user side according to the consistency of the login password plaintext and the login password registered by the login account.
The consistency may mean that the plaintext of the login password is completely consistent with the login password registered in the login account. The login page is used for logging in a certain webpage.
Specifically, comparing a login password plaintext with a login password registered by a login account; if the two are completely consistent, a login page is fed back to the user side; if the login password is not completely consistent with the login password, prompt information is fed back to the user side to prompt the user that the login account or the login password registered by the login account is wrong.
The embodiment of the application acquires the login password ciphertext and the login account number sent by the current login session of the user side; determining a target random number according to the session identification of the login session; selecting at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target random number and the login account; decrypting the login password ciphertext according to each target decryption algorithm to generate a login password plaintext; and feeding back a login page to the user side according to the consistency of the login password plaintext and the login password registered by the login account. According to the technical scheme, based on the login password ciphertext sent by the login session, the login account and the target random number corresponding to the session identifier of the login session, at least two target decryption algorithms are selected from the at least two candidate decryption algorithms to decrypt the login password ciphertext, and therefore the login password plaintext is obtained. The complexity of the target decryption algorithm determination process and the regularity of the determination result are increased, so that the difficulty of decrypting the login password ciphertext based on each target decryption algorithm is improved, and the account safety of the login account corresponding to the login session is improved. Meanwhile, the target decryption algorithm is strongly related to the login account, so that when the login password ciphertext of the login account corresponding to the login session is cracked, the account safety of the login account corresponding to other login sessions is not influenced, and the atomicity of the decryption process is improved.
EXAMPLE III
Fig. 3 is a flowchart of an encryption and decryption method provided in the third embodiment of the present application, and the third embodiment of the present application provides a preferred implementation manner based on the technical solutions of the foregoing embodiments. As shown in fig. 3, the method specifically includes:
s301, the user side responds to the login operation of the user and generates a session request.
S302, the user side sends a session request to the server side.
And S303, the server feeds back the target random number to the user side according to the session request.
S304, the user side selects at least two target encryption algorithms from the at least two candidate encryption algorithms according to the login account and the target random number.
S305, the user side sequentially carries out cascade encryption on the login password plaintext of the login account according to the selection sequence of the target encryption algorithms and the number of encryption layers preset by the target encryption algorithms to generate a login password ciphertext.
S306, the user side sends a login password ciphertext and a login account number to the server side.
S307, the server side obtains the login password ciphertext and the login account sent by the user side.
S308, the server side determines a target random number according to the session identification of the login session.
Wherein, the session identification is used for uniquely identifying the one-time login session. One session identification corresponds to one target random number.
S309, the server side selects at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target random number and the login account.
And S310, the server side sequentially carries out cascade decryption on the login password ciphertext according to the sequence opposite to the selection sequence of the target decryption algorithms and the number of decryption layers preset by the target decryption algorithms to generate a login password plaintext.
S311, the server side detects whether the login password plaintext is consistent with the login password registered by the login account. If so, S312 is performed. If not, S313 is performed.
S312, the server side feeds back the page data of the login page to the user side for display.
S313, the server side feeds back prompt information to the user side to prompt the user that the login account or the login password of the login account is wrong.
The embodiment of the application realizes the encryption and decryption of the login password corresponding to the login account, and selects at least two target encryption algorithms from at least two candidate encryption algorithms according to the login account and the target random number issued by the session request, so that the complexity of the target encryption algorithm determining process and the randomness of the determining result are increased; based on the login password ciphertext sent by the login session, the login account and the target random number corresponding to the session identifier of the login session, at least two target decryption algorithms are selected from at least two candidate decryption algorithms to decrypt the login password ciphertext, so that a login password plaintext is obtained, the complexity of the determination process of the target decryption algorithms and the regularity of determination results are increased, and the decryption difficulty of the login password ciphertext obtained by encrypting the login password plaintext of the login account based on each target encryption algorithm is improved; the account security of the login account corresponding to the login session is improved. Meanwhile, the target encryption algorithm is strongly related to the login account, and the target decryption algorithm is strongly related to the login account, so that when the login password ciphertext of the login account corresponding to the login session is cracked, the account safety of the login accounts corresponding to other login sessions is not influenced, and the atomicity of the encryption and decryption process is improved.
Example four
Fig. 4 is a structural diagram of an encryption apparatus according to a fourth embodiment of the present application, where the encryption apparatus is suitable for encrypting a login password of a login account, and the encryption apparatus is implemented by software and/or hardware and is specifically configured in a user side.
An encryption apparatus as shown in fig. 4, comprising:
a session request generation module 401, configured to generate a session request in response to a login operation;
a random number receiving module 402, configured to send a session request to a server, and receive a target random number fed back by the server;
an encryption algorithm selecting module 403, configured to select at least two target encryption algorithms from the at least two candidate encryption algorithms according to the login account and the target random number;
a password ciphertext generating module 404, configured to encrypt a login password plaintext of the login account according to each target encryption algorithm, and generate a login password ciphertext;
and the data sending module 405 is configured to send the login password ciphertext and the login account to the server.
The embodiment of the application generates a session request through a session request generating module; sending a session request to a server through a random number receiving module, and receiving a target random number fed back by the server; selecting at least two target encryption algorithms through an encryption algorithm selection module; generating a login password ciphertext through a password ciphertext generating module; and sending a login password ciphertext and a login account to the server through the data sending module. According to the technical scheme, at least two target encryption algorithms are selected from at least two candidate encryption algorithms according to the login account and the target random number issued by the session request, so that the complexity of the target encryption algorithm determining process and the randomness of the determining result are increased, the cracking difficulty of the login password ciphertext obtained by encrypting the login password plaintext of the login account based on each target encryption algorithm is improved, and the account security of the login account corresponding to the session request is improved. Meanwhile, the target encryption algorithm is strongly related to the login account, so that when the login password ciphertext of the login account corresponding to the session request is cracked, the account safety of the login account of other session requests cannot be influenced, and the atomicity of the encryption process is improved.
Further, the encryption algorithm selecting module 403 includes:
the target hash generation unit is used for generating a target hash according to the login account and the target random number;
and the encryption algorithm selecting unit is used for selecting at least two target encryption algorithms from at least two candidate encryption algorithms according to the target hash.
Further, the encryption algorithm selecting unit is specifically configured to:
determining the target number of a target encryption algorithm according to the byte number of the target hash;
and selecting a target number of candidate encryption algorithms from at least two candidate encryption algorithms as target encryption algorithms according to a preset selection sequence.
Further, the cipher text generating module 404 includes;
the password ciphertext acquisition unit is used for sequentially selecting unused target encryption algorithms to encrypt data to be encrypted according to the selection sequence of the target encryption algorithms and taking the encryption result of the last used target encryption algorithm as a login password ciphertext; the data to be encrypted of the first target encryption algorithm is a login password plaintext, and the data to be encrypted of the other target encryption algorithms is an encryption result of the previous target encryption algorithm.
The encryption device can execute the encryption method provided by any embodiment of the application, and has the corresponding functional modules and beneficial effects of executing each encryption method.
EXAMPLE five
Fig. 5 is a structural diagram of a decryption apparatus according to a fifth embodiment of the present application, where the decryption apparatus is suitable for decrypting a login password of a login account, and the decryption apparatus is implemented by software and/or hardware and is specifically configured in a server.
A decryption apparatus as shown in fig. 5, comprising:
a data obtaining module 501, configured to obtain a login password ciphertext and a login account sent by the user terminal in the current login session;
a random number determining module 502, configured to determine a target random number according to the session identifier of the login session;
a decryption algorithm selecting module 503, configured to select at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target random number and the login account;
a password plaintext generation module 504, configured to decrypt the login password ciphertext according to each target decryption algorithm to generate a login password plaintext;
and a login page feedback module 505, configured to feed back a login page to the user terminal according to consistency between a login password plaintext and a login password registered in the login account.
In the embodiment of the application, a login password ciphertext and a login account number sent by the current login session of the user side are obtained through a data obtaining module; determining a target random number through a random number determination module; selecting at least two target decryption algorithms through a decryption algorithm selection module; generating a login password plaintext through a password plaintext generating module; and feeding back the login page to the user side through a login page feedback module. According to the technical scheme, based on the login password ciphertext sent by the login session, the login account and the target random number corresponding to the session identifier of the login session, at least two target decryption algorithms are selected from the at least two candidate decryption algorithms to decrypt the login password ciphertext, and therefore the login password plaintext is obtained. The complexity of the target decryption algorithm determining process and the regularity of the determining result are increased, so that the difficulty of decrypting the login password ciphertext based on each target decryption algorithm is improved, and the account security of the login account corresponding to the login session is improved. Meanwhile, the target decryption algorithm is strongly related to the login account number, so that when the login password ciphertext of the login account number corresponding to the login session is cracked, the account number safety of the login account numbers corresponding to other login sessions cannot be influenced, and the atomicity of the decryption process is improved.
Further, the decryption algorithm selecting module 503 includes:
the target hash generation unit is used for generating a target hash according to the login account and the target random number;
and the decryption algorithm selecting unit is used for selecting at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target hash.
Further, the decryption algorithm selecting unit is specifically configured to:
determining the target number of a target decryption algorithm according to the byte number of the target hash; and selecting a target number of candidate decryption algorithms as a target decryption algorithm from at least two candidate decryption algorithms according to a preset selection sequence.
Further, the cryptographic plaintext generating module 504 includes:
the password plaintext acquisition unit is used for sequentially selecting unused target decryption algorithms to decrypt data to be decrypted according to the sequence opposite to the selection sequence of the target decryption algorithms, and taking the decryption result of the last used target decryption algorithm as a login password plaintext; the data to be decrypted of the first target decryption algorithm is a login password ciphertext, and the data to be decrypted of other target decryption algorithms is a decryption result of the previous target decryption algorithm.
The decryption device can execute the decryption method provided by any embodiment of the application, and has the corresponding functional modules and beneficial effects of executing each decryption method.
EXAMPLE six
FIG. 6 illustrates a block diagram of an electronic device 600, which can be used to implement embodiments of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 6, the electronic device 600 includes at least one processor 601, and a memory communicatively connected to the at least one processor 601, such as a Read Only Memory (ROM) 602, a Random Access Memory (RAM) 603, and the like, wherein the memory stores computer programs executable by the at least one processor, and the processor 601 may perform various suitable actions and processes according to the computer programs stored in the Read Only Memory (ROM) 602 or the computer programs loaded from a storage unit 608 into the Random Access Memory (RAM) 603. In the RAM603, various programs and data necessary for the operation of the electronic apparatus 600 can also be stored. The processor 601, the ROM602, and the RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Various components in the electronic device 600 are connected to the I/O interface 605, including: an input unit 606 such as a keyboard, a mouse, or the like; an output unit 607 such as various types of displays, speakers, and the like; a storage unit 608, such as a magnetic disk, optical disk, or the like; and a communication unit 609 such as a network card, modem, wireless communication transceiver, etc. The communication unit 609 allows the electronic device 600 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
Processor 601 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of processor 601 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and the like. The processor 601 performs the various methods and processes described above, such as encryption methods and/or decryption methods.
In some embodiments, the encryption method and/or the decryption method may be implemented as a computer program tangibly embodied in a computer-readable storage medium, such as storage unit 608. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 600 via the ROM602 and/or the communication unit 609. When loaded into RAM603 and executed by processor 601, the computer programs may perform one or more steps of the encryption methods and/or decryption methods described above. Alternatively, in other embodiments, the processor 601 may be configured to perform the encryption method and/or the decryption method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for implementing the methods of the present application may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. A computer program can execute entirely on a machine, partly on a machine, as a stand-alone software package partly on a machine and partly on a remote machine or entirely on a remote machine or server.
In the context of this application, a computer readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user may provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user can be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above, reordering, adding or deleting steps, may be used. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solution of the present application can be achieved, and the present invention is not limited thereto.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (12)

1. An encryption method applied to a user side includes:
responding to the login operation, and generating a session request;
sending the session request to a server and receiving a target random number fed back by the server;
selecting at least two target encryption algorithms from at least two candidate encryption algorithms according to the login account and the target random number;
encrypting a login password plaintext of the login account according to each target encryption algorithm to generate a login password ciphertext;
and sending the login password ciphertext and the login account to the server.
2. The method of claim 1, wherein the selecting at least two target encryption algorithms from at least two candidate encryption algorithms based on the login account number and the target random number comprises:
generating a target hash according to the login account and the target random number;
and selecting at least two target encryption algorithms from the at least two candidate encryption algorithms according to the target hash.
3. The method of claim 2, wherein the selecting at least two target encryption algorithms from the at least two candidate encryption algorithms based on the target hash comprises:
determining the target number of the target encryption algorithm according to the byte number of the target hash;
and selecting the target number of candidate encryption algorithms from the at least two candidate encryption algorithms as the target encryption algorithm according to a preset selection sequence.
4. The method according to any one of claims 1 to 3, wherein the encrypting the login password plaintext of the login account according to each of the target encryption algorithms to generate a login password ciphertext comprises:
according to the selection sequence of the target encryption algorithm, sequentially selecting an unused target encryption algorithm to encrypt data to be encrypted, and taking an encryption result of a target encryption algorithm used for the last time as the login password ciphertext;
the data to be encrypted of the first target encryption algorithm is the login password plaintext, and the data to be encrypted of other target encryption algorithms is the encryption result of the previous target encryption algorithm.
5. A decryption method, applied to a server, includes:
acquiring a login password ciphertext and a login account sent by the user side in the current login session;
determining a target random number according to the session identification of the login session;
selecting at least two target decryption algorithms from at least two candidate decryption algorithms according to the target random number and the login account;
decrypting the login password ciphertext according to each target decryption algorithm to generate a login password plaintext;
and feeding back a login page to the user side according to the consistency of the login password plaintext and the login password registered by the login account.
6. The method of claim 5, wherein selecting at least two target decryption algorithms from at least two candidate encryption algorithms based on the target random number and the login account number comprises:
generating a target hash according to the login account and the target random number;
and selecting at least two target decryption algorithms from the at least two candidate decryption algorithms according to the target hash.
7. The method according to claim 6, wherein said selecting at least two target decryption algorithms from said at least two candidate decryption algorithms based on said target hash comprises:
determining the target number of the target decryption algorithm according to the byte number of the target hash;
and selecting the target number of candidate decryption algorithms from the at least two candidate decryption algorithms as the target decryption algorithm according to a preset selection sequence.
8. The method according to any one of claims 5-7, wherein said decrypting said login password ciphertext according to each said target decryption algorithm to generate a login password plaintext, comprises:
sequentially selecting unused target decryption algorithms to decrypt the data to be decrypted according to the sequence opposite to the selection sequence of the target decryption algorithms, and taking the decryption result of the last used target decryption algorithm as the plaintext of the login password;
and the data to be decrypted of the first target decryption algorithm is the login password ciphertext, and the data to be decrypted of other target decryption algorithms is the decryption result of the previous target decryption algorithm.
9. An encryption apparatus, configured at a user side, comprising:
the session request generating module is used for responding to the login operation and generating a session request;
the random number receiving module is used for sending the session request to a server and receiving a target random number fed back by the server;
the encryption algorithm selection module is used for selecting at least two target encryption algorithms from at least two candidate encryption algorithms according to the login account and the target random number;
the password ciphertext generating module is used for encrypting the login password plaintext of the login account according to each target encryption algorithm to generate a login password ciphertext;
and the data sending module is used for sending the login password ciphertext and the login account to the server.
10. A decryption apparatus, configured at a server, comprising:
the data acquisition module is used for acquiring a login password ciphertext and a login account sent by the current login session of the user side;
the random number determining module is used for determining a target random number according to the session identification of the login session;
the decryption algorithm selection module is used for selecting at least two target decryption algorithms from at least two candidate decryption algorithms according to the target random number and the login account;
the password plaintext generation module is used for decrypting the login password ciphertext according to each target decryption algorithm to generate a login password plaintext;
and the login page feedback module is used for feeding back a login page to the user side according to the consistency of the login password plaintext and the login password registered by the login account.
11. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement an encryption method as claimed in any one of claims 1 to 4 and/or a decryption method as claimed in any one of claims 5 to 8.
12. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out an encryption method as claimed in any one of claims 1 to 4 and/or a decryption method as claimed in any one of claims 5 to 8.
CN202211420374.XA 2022-11-15 2022-11-15 Encryption and decryption method, device, equipment and storage medium Active CN115622794B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211420374.XA CN115622794B (en) 2022-11-15 2022-11-15 Encryption and decryption method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211420374.XA CN115622794B (en) 2022-11-15 2022-11-15 Encryption and decryption method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115622794A true CN115622794A (en) 2023-01-17
CN115622794B CN115622794B (en) 2023-04-07

Family

ID=84879093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211420374.XA Active CN115622794B (en) 2022-11-15 2022-11-15 Encryption and decryption method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115622794B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107295011A (en) * 2017-08-04 2017-10-24 杭州安恒信息技术有限公司 The safety certifying method and device of webpage
CN107733933A (en) * 2017-11-30 2018-02-23 中国电力科学研究院有限公司 A kind of double factor identity authentication method and system based on biological identification technology
CN107819723A (en) * 2016-09-12 2018-03-20 中兴通讯股份有限公司 Login authentication and login password modification authentication method, terminal and server
CN109005155A (en) * 2018-07-04 2018-12-14 北京奇安信科技有限公司 Identity identifying method and device
CN109347835A (en) * 2018-10-24 2019-02-15 苏州科达科技股份有限公司 Information transferring method, client, server and computer readable storage medium
WO2021012552A1 (en) * 2019-07-25 2021-01-28 深圳壹账通智能科技有限公司 Login processing method and related device
CN112637109A (en) * 2019-09-24 2021-04-09 北京京东尚科信息技术有限公司 Data transmission method, system, electronic device and computer readable medium
CN115276978A (en) * 2022-07-27 2022-11-01 中银金融科技有限公司 Data processing method and related device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819723A (en) * 2016-09-12 2018-03-20 中兴通讯股份有限公司 Login authentication and login password modification authentication method, terminal and server
CN107295011A (en) * 2017-08-04 2017-10-24 杭州安恒信息技术有限公司 The safety certifying method and device of webpage
CN107733933A (en) * 2017-11-30 2018-02-23 中国电力科学研究院有限公司 A kind of double factor identity authentication method and system based on biological identification technology
CN109005155A (en) * 2018-07-04 2018-12-14 北京奇安信科技有限公司 Identity identifying method and device
CN109347835A (en) * 2018-10-24 2019-02-15 苏州科达科技股份有限公司 Information transferring method, client, server and computer readable storage medium
WO2021012552A1 (en) * 2019-07-25 2021-01-28 深圳壹账通智能科技有限公司 Login processing method and related device
CN112637109A (en) * 2019-09-24 2021-04-09 北京京东尚科信息技术有限公司 Data transmission method, system, electronic device and computer readable medium
CN115276978A (en) * 2022-07-27 2022-11-01 中银金融科技有限公司 Data processing method and related device

Also Published As

Publication number Publication date
CN115622794B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN111934872B (en) Key processing method, device, electronic equipment and storage medium
CN107688733B (en) Service interface calling method, device, user terminal and readable storage medium
CN114595481A (en) Method, device, equipment and storage medium for processing response data
US20230164131A1 (en) Accessing cloud data providers with user-impersonation
CN114513350A (en) Identity verification method, system and storage medium
CN116781425B (en) Service data acquisition method, device, equipment and storage medium
CN113946816A (en) Cloud service-based authentication method and device, electronic equipment and storage medium
EP4149053B1 (en) Authorization processing method and apparatus, and storage medium
CN115622794B (en) Encryption and decryption method, device, equipment and storage medium
US11133926B2 (en) Attribute-based key management system
CN110751467A (en) Digital currency generation method and system
CN115858914A (en) Method, device and system for inquiring hiding trace, terminal equipment and storage medium
CN113992345B (en) Webpage sensitive data encryption and decryption method and device, electronic equipment and storage medium
CN115529186A (en) SSL certificate unloading method, device and system based on soft load balancing
CN115391805A (en) Encrypted data migration method, device, equipment and storage medium
CN114461912A (en) Information processing method and device, electronic equipment and storage medium
CN112968876A (en) Content sharing method and device, electronic equipment and storage medium
CN115801237A (en) Information encryption/decryption device, information encryption method, and information decryption method
CN115643002A (en) Service processing method, device and storage medium
CN112615712B (en) Data processing method, related device and computer program product
CN115981859A (en) Data processing method
CN115238310A (en) Data encryption and decryption method, device, equipment and storage medium
CN117421752A (en) Laboratory data processing method, device, system, equipment and medium
CN117077125A (en) Secure installation starting method, device, equipment and medium for mobile application program
CN117375846A (en) Resource access method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant