CN105897730A - User name and password information encryption and verification method - Google Patents
User name and password information encryption and verification method Download PDFInfo
- Publication number
- CN105897730A CN105897730A CN201610311876.7A CN201610311876A CN105897730A CN 105897730 A CN105897730 A CN 105897730A CN 201610311876 A CN201610311876 A CN 201610311876A CN 105897730 A CN105897730 A CN 105897730A
- Authority
- CN
- China
- Prior art keywords
- user
- user name
- information
- verification method
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000012795 verification Methods 0.000 title claims abstract description 13
- 230000000052 comparative effect Effects 0.000 claims description 7
- 230000004308 accommodation Effects 0.000 claims description 3
- 238000003672 processing method Methods 0.000 claims description 3
- 230000006399 behavior Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a user name and password information encryption and verification method. By encrypting and storing user names and passwords, user names and password information are prevented from being divulged under the condition that a database is attacked and the like. If mismatching appears in the verification process, IP address information is further verified and a relevant measure is taken, so that the security can be further strengthened.
Description
Technical field
The present invention relates to secrecy provision field, in particular it relates to a kind of user name and encrypted message are encrypted and verification method.
Background technology
At present, internet development is rapid, and almost all life and work behaviors of people are all closely bound up with the Internet, and in the Internet, the identification of people's identity is typically by user name and encrypted message, hardly imaginable if there is leaking data then consequence.In fact along with the development of the Internet, it is also increasingly rampant that the swindle of corresponding internet data and data steal behavior, is stored in the user name in each system server data base and encrypted message becomes excessive risk data.
Summary of the invention
It is an object of the invention to, for the problems referred to above, propose a kind of user name and encrypted message encryption and verification method, to realize the advantage that safety stores user profile.
For achieving the above object, the technical solution used in the present invention is:
A kind of user name and encrypted message are encrypted and verification method, comprise the following steps:
A. when user creates, require user name and password are verified according to default user name and password setting, do not meet and when setting requires, remind user's amendment, when meeting the requirements, perform next step B;
B. transmit to database purchase after user name and password being carried out information encryption;
C. when user uses user name and password logs in, using information ciphering method same in step B to produce and add confidential information, and compared by the corresponding informance of storage in this information and date storehouse, comparative result is identical, then allow user to log in.
Further, the cipher processing method used in step B is RSA cryptographic algorithms.
Further, step B also records the physical IP information of equipment used when user creates, and transmits to database purchase.
Further, step C is verified when user name encrypted message occurs repeatedly comparative result difference continuously, checks last beaching accommodation physical IP information, as inconsistent with the IP address of storage in data base, then perform to freeze measure to this user account.
Technical scheme has the advantages that
The user name of various embodiments of the present invention and encrypted message are encrypted and verification method, owing to including that user name and password encryption are stored measure, can effectively prevent leaking data, it is ensured that the safe storage of data.
Below by embodiment, technical scheme is described in further detail.
Detailed description of the invention
Hereinafter the preferred embodiments of the present invention are illustrated, it will be appreciated that preferred embodiment described herein is merely to illustrate and explains the present invention, is not intended to limit the present invention.
A kind of user name and encrypted message are encrypted and verification method, comprise the following steps:
A. when user creates, require user name and password are verified according to default user name and password setting, do not meet and when setting requires, remind user's amendment, when meeting the requirements, perform next step B;
B. transmit to database purchase after user name and password being carried out information encryption;
C. when user uses user name password to log in, using information ciphering method same in step B to produce and add confidential information, and compared by the corresponding informance of storage in this information and date storehouse, comparative result is identical, then allow user to log in.
In above-mentioned steps B, before being transmitted, some individual client's end or network browsing often automatically save information, are now also required to carry out in advance data encryption, or when user exits or closes closed system, are automatically deleted relative recording.
Further, the cipher processing method used in step B is RSA cryptographic algorithms.
Other AES such as DES, MD5 etc. can also be set.
Further, step B also records the physical IP information of equipment used when user creates, and transmits to database purchase.
It is in fact possible to all record IP information when user logs in each time, can confirm that the information such as user's common IP with this.
Further, step C is verified when user name encrypted message occurs three comparative result differences continuously, checks last beaching accommodation physical IP information, as inconsistent with the IP address of storage in data base, then perform to freeze measure to this user account.
Three comparative result differences of the most above-mentioned appearance the most generally people are difficult to repeatedly input mistake 3 times, this number of times also may be set to other numerical value, further the behavior of continuous input error can be set time verifying condition and IP address validation condition, as on the same day or shorter time, and on same non-user common IP address, then perform to freeze measure, what is called freezes measure, i.e. cannot be logged in by user name and encrypted message, authentication can be carried out by other information that user provides when creating account and release this and freeze.
Last it is noted that the foregoing is only the preferred embodiments of the present invention, it is not limited to the present invention, although the present invention being described in detail with reference to previous embodiment, for a person skilled in the art, technical scheme described in foregoing embodiments still can be modified by it, or wherein portion of techniques feature is carried out equivalent.All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
Claims (4)
1. a user name and encrypted message are encrypted and verification method, it is characterised in that comprise the following steps:
A. when user creates, require user name and password are verified according to default user name and password setting, do not meet and when setting requires, remind user's amendment, when meeting the requirements, perform next step B;
B. transmit to database purchase after user name and password being carried out information encryption;
C. when user uses user name and password logs in, using information ciphering method same in step B to produce and add confidential information, and compared by the corresponding informance of storage in this information and date storehouse, comparative result is identical, then allow user to log in.
Encryption the most according to claim 1 and verification method, it is characterised in that the cipher processing method used in step B is RSA cryptographic algorithms.
Encryption the most according to claim 1 and verification method, it is characterised in that also record the physical IP information of equipment used when user creates in step B, and transmit to database purchase.
Encryption the most according to claim 4 and verification method, it is characterized in that, step C is verified when user name encrypted message occurs three comparative result differences continuously, check last beaching accommodation physical IP information, as inconsistent with the IP address of storage in data base, then perform to freeze measure to this user account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610311876.7A CN105897730A (en) | 2016-05-12 | 2016-05-12 | User name and password information encryption and verification method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610311876.7A CN105897730A (en) | 2016-05-12 | 2016-05-12 | User name and password information encryption and verification method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105897730A true CN105897730A (en) | 2016-08-24 |
Family
ID=56702833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610311876.7A Pending CN105897730A (en) | 2016-05-12 | 2016-05-12 | User name and password information encryption and verification method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105897730A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107395344A (en) * | 2017-07-18 | 2017-11-24 | 北京深思数盾科技股份有限公司 | User profile guard method and device |
CN108769046A (en) * | 2018-06-07 | 2018-11-06 | 安徽鼎龙网络传媒有限公司 | The system that login management mostly is combined on a kind of micro- scene management backstage |
CN109361689A (en) * | 2018-11-19 | 2019-02-19 | 郑州云海信息技术有限公司 | A method and device for user creation based on object storage |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5706427A (en) * | 1995-09-08 | 1998-01-06 | Cadix Inc. | Authentication method for networks |
US5841970A (en) * | 1995-09-08 | 1998-11-24 | Cadix, Inc. | Authentication method for networks |
CN1828623A (en) * | 2006-04-11 | 2006-09-06 | 北京飞天诚信科技有限公司 | Method for protecting computer login using disposable password |
CN101616003A (en) * | 2008-06-25 | 2009-12-30 | 鸿富锦精密工业(深圳)有限公司 | Password protection system and method |
CN104734856A (en) * | 2015-03-05 | 2015-06-24 | 中国科学院信息工程研究所 | Password authentication method for preventing server-side information from being leaked |
-
2016
- 2016-05-12 CN CN201610311876.7A patent/CN105897730A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5706427A (en) * | 1995-09-08 | 1998-01-06 | Cadix Inc. | Authentication method for networks |
US5841970A (en) * | 1995-09-08 | 1998-11-24 | Cadix, Inc. | Authentication method for networks |
CN1828623A (en) * | 2006-04-11 | 2006-09-06 | 北京飞天诚信科技有限公司 | Method for protecting computer login using disposable password |
CN101616003A (en) * | 2008-06-25 | 2009-12-30 | 鸿富锦精密工业(深圳)有限公司 | Password protection system and method |
CN104734856A (en) * | 2015-03-05 | 2015-06-24 | 中国科学院信息工程研究所 | Password authentication method for preventing server-side information from being leaked |
Non-Patent Citations (1)
Title |
---|
唐四薪: "身份认证", 《密码学及安全应用》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107395344A (en) * | 2017-07-18 | 2017-11-24 | 北京深思数盾科技股份有限公司 | User profile guard method and device |
CN108769046A (en) * | 2018-06-07 | 2018-11-06 | 安徽鼎龙网络传媒有限公司 | The system that login management mostly is combined on a kind of micro- scene management backstage |
CN109361689A (en) * | 2018-11-19 | 2019-02-19 | 郑州云海信息技术有限公司 | A method and device for user creation based on object storage |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8930700B2 (en) | Remote device secure data file storage system and method | |
US7925023B2 (en) | Method and apparatus for managing cryptographic keys | |
WO2020000786A1 (en) | Voting method and apparatus, and computer device and computer readable storage medium | |
CN105103488A (en) | Policy enforcement with associated data | |
JPH10508438A (en) | System and method for key escrow and data escrow encryption | |
KR20200028880A (en) | Multiple security authentication system and method between blockchain-based mobile terminals and IoT devices | |
CN103560892A (en) | Secret key generation method and secret key generation device | |
WO2022206453A1 (en) | Method and apparatus for providing cross-chain private data | |
CN104333545A (en) | Method for encrypting cloud storage file data | |
JP2008269381A (en) | Authentication server and on-line service system | |
CN107273725B (en) | Data backup method and system for confidential information | |
CN104881595B (en) | The self-help remote unlocking method managed based on PIN code | |
CN105897730A (en) | User name and password information encryption and verification method | |
CN112671735A (en) | Data encryption sharing system and method based on block chain and re-encryption | |
CN104537313A (en) | Data protection method, terminal and server | |
CN112637172A (en) | Novel data security and confidentiality method | |
CN110445804A (en) | A kind of safe handling protection system about outgoing document | |
AU2007251633B2 (en) | Terminal activation method | |
CN111464543B (en) | Teaching information safety protection system based on cloud platform | |
CN110933042B (en) | Data security messenger method and system suitable for alliance chain | |
Rupa et al. | Study and improved data storage in cloud computing using cryptography | |
CN112926065A (en) | Customizable encryption and decryption device, encryption and decryption method and storage equipment | |
CN109660355B (en) | Method, device, storage medium and terminal for preventing POS terminal from being illegally tampered | |
CN114584318A (en) | Access control method of certificate and secret key, electronic equipment and storage medium | |
CN113132109A (en) | Electronic deposit certificate management method and device based on block chain and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160824 |
|
RJ01 | Rejection of invention patent application after publication |