CN105141631A - Terminal, server and account security login method, device and system - Google Patents

Terminal, server and account security login method, device and system Download PDF

Info

Publication number
CN105141631A
CN105141631A CN201510603097.XA CN201510603097A CN105141631A CN 105141631 A CN105141631 A CN 105141631A CN 201510603097 A CN201510603097 A CN 201510603097A CN 105141631 A CN105141631 A CN 105141631A
Authority
CN
China
Prior art keywords
password
user
cipher
server
user inputs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510603097.XA
Other languages
Chinese (zh)
Other versions
CN105141631B (en
Inventor
任锴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen yingmu Technology Co.,Ltd.
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510603097.XA priority Critical patent/CN105141631B/en
Publication of CN105141631A publication Critical patent/CN105141631A/en
Application granted granted Critical
Publication of CN105141631B publication Critical patent/CN105141631B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides an account security login method. The method comprises the steps of obtaining a cipher inputted by a user; utilizing an encryption algorithm to encrypt the cipher inputted by the user to form the ciphertext information; taking the ciphertext information as the current cipher of the user to send to a server; receiving the feedback information of the server; according to the feedback information, executing a login operation. During the sending process, when other users capture a weblog to obtain the account and the cipher of the user with the help of tools, the obtained cipher is just the encrypted cipher, and the cipher inputted by the user is not obtained, thereby effectively avoiding a phenomenon that the user information is stolen, and guaranteeing the security of the user information.

Description

The methods, devices and systems that a kind of terminal, server and account safety log in
Technical field
The application relates to account safety logon domain, the methods, devices and systems of particularly a kind of terminal, server and account safety login.
Background technology
Along with the development of technology, people more and more pay attention to the secure log of account.
In existing mobile terminal device when logging in online application, when the password of user's input transmits in a network, be not encrypted, like this, major part user can obtain account and the password of user by instrument, as captured network log by wireshark instrument, can be clearly seen that the username and password of user from daily record, causing the fail safe that cannot ensure user profile.
Therefore, how effectively to ensure the fail safe of user profile, the secure log realizing account is the current technical issues that need to address of those skilled in the art.
Summary of the invention
Technical problems to be solved in this application are to provide the methods, devices and systems that a kind of terminal, server and account safety log in, when the password solving the input of user in prior art transmits in a network, be not encrypted, like this, major part user can obtain account and the password of user by instrument, as captured network log by wireshark instrument, can be clearly seen that the username and password of user from daily record, cause the problem of the fail safe that cannot ensure user profile.
Its concrete scheme is as follows:
The method that account safety logs in, for terminal, the method comprises:
Obtain the password of user's input;
Utilize cryptographic algorithm to be encrypted operation to the password that described user inputs, form cipher-text information;
Described cipher-text information is sent to server as the current password of user;
Receive the feedback information of described server;
Register is performed according to described feedback information.
Above-mentioned method, optionally, describedly utilizes before cryptographic algorithm is encrypted operation to the password that described user inputs, also comprises:
Judge that password that described user inputs is the need of being encrypted operation, if so, then utilize cryptographic algorithm to be encrypted operation to the password that described user inputs, if not, then the direct password described user inputted is sent to server as the current password of user.
Above-mentioned method, optionally, the described cryptographic algorithm that utilizes is encrypted operation to the password that described user inputs, and forms cipher-text information, comprising:
Utilize RSA cryptographic algorithms to be encrypted operation to the password that described user inputs, form described cipher-text information.
The method that account safety logs in, for server, the method comprises:
User's current password that receiving terminal sends;
Decipher described current password, obtain decodement;
Judge whether described decodement expressly matches with the user cipher preset;
If coupling, then the mark that feedback cipher is correct is to described terminal.
The device that account safety logs in, for terminal, this device comprises:
Acquiring unit, for obtaining the password of user's input;
Ciphering unit, for utilizing cryptographic algorithm to be encrypted operation to the password that described user inputs, forms cipher-text information;
Transmitting element, for being sent to server using described cipher-text information as the current password of user;
Receiving element, for receiving the feedback information of described server;
Log in unit, for performing register according to described feedback information.
Above-mentioned device, optionally, also comprises:
Judging unit, for judging that password that described user inputs is the need of being encrypted operation, if, then triggering described ciphering unit utilizes cryptographic algorithm to be encrypted operation to the password that described user inputs, if not, then trigger password that described user inputs by described transmitting element and be sent to server as the current password of user.
Above-mentioned device, optionally, in described ciphering unit, the described cryptographic algorithm that utilizes is encrypted operation to the password that described user inputs, and forms cipher-text information, comprising:
Utilize RSA cryptographic algorithms to be encrypted operation to the password that described user inputs, form described cipher-text information.
The device that account safety logs in, for server, this device comprises:
Receiving element, for user's current password that receiving terminal sends;
Decryption unit, for deciphering described current password, obtains decodement;
Judging unit, for judging whether described decodement expressly matches with the user cipher preset;
Feedback unit, if for coupling, then the mark that feedback cipher is correct is to described terminal.
A kind of terminal, comprises the device that the above-mentioned account safety for terminal logs in.
A kind of server, comprises the device that the above-mentioned account safety for server logs in.
The system that account safety logs in, comprises above-mentioned terminal and above-mentioned server.
In the method that a kind of account safety that the application provides logs in, obtain the password of user's input; Utilize cryptographic algorithm to be encrypted operation to the password that described user inputs, form cipher-text information; Described cipher-text information is sent to server as the current password of user; Receive the feedback information of described server; Register is performed according to described feedback information.Sending in the process of information to server, when there being other users to capture network log to obtain account and the password of user by instrument, password after the just encryption got, do not get the password of user's input, effectively avoid the phenomenon that user profile is stolen, just ensure that the fail safe of user profile, achieve the secure log of account.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present application, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the application, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart of the embodiment of the method 1 that a kind of account safety of the application logs in;
Fig. 2 is the flow chart of the embodiment of the method 2 that a kind of account safety of the application logs in;
Fig. 3 is the schematic diagram of the device that a kind of account safety for terminal of the application logs in;
Fig. 4 is the schematic diagram of the device that a kind of account safety for server of the application logs in;
Fig. 5 is the structural representation of the system embodiment that a kind of account safety of the application logs in.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, be clearly and completely described the technical scheme in the embodiment of the present application, obviously, described embodiment is only some embodiments of the present application, instead of whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of the application's protection.
With reference to figure 1, show the flow chart of the embodiment of the method 1 that a kind of account safety of the application logs in, can comprise the following steps:
Step S101: the password obtaining user's input.
When user need on the terminal device login account time, need to input account and corresponding password, after user inputs password, terminal equipment has got encrypted message corresponding to the current account of active user.
Step S102: utilize cryptographic algorithm to be encrypted operation to the password that described user inputs, forms cipher-text information.
When user is from terminal landing to network application, terminal, after the username and password getting user's input, inputs account information to prevent user and is stolen, and is encrypted, using the password after encryption as cipher-text information the password of user's input.
The application can utilize conventional cryptographic algorithm to be encrypted the password that user inputs, as RSA cryptographic algorithms, described RSA cryptographic algorithms is first fairly perfect public key algorithm, and it can be used for encryption, also can be used for digital signature, become most popular public key algorithm at present.
Before the password inputted user is encrypted, first each value of the password of user's input is converted to corresponding ASCII character, then utilizes RSA cryptographic algorithms to be encrypted each described ASCII character.
The PKI of RSA, the composition of private key, and encryption, deciphering formula as shown in table 1:
PKI, private key, the encryption and decryption formula of table 1RSA
For the ease of calculating.Only choose prime number p, q and e of fractional value in the following example, suppose that user A needs by plaintext " key " by passing to user B after rsa encryption, process is as follows:
Design public and private key (e, n) and (d, n):
Make p=3, q=11, draw n=p × q=3 × 11=33; F (n)=(p-1) (q-1)=2 × 10=20; Get e=3, (3 and 20 is relatively prime) then e × d ≡ 1modf (n), i.e. 3 × d ≡ 1mod20.
D can find by the way of tentative calculation.The trial result sees the following form:
By tentative calculation, we find, and as d=7, e × d ≡ 1modf (n) congruence equation is set up.Therefore, d=7 can be made.
Thus we can design a pair public and private key, encryption key (PKI) is: KU=(e, n)=(3,33), and decruption key (private key) is: KR=(d, n)=(7,33).
By cleartext information digitlization, and by every block two digital packet.Assuming that plaintext alphabet code table is for arranging in alphabetical order numerical value, that is:
Letter a b c d e f g h i j k l m
Code value 01 02 03 04 05 06 07 08 09 10 11 12 13
Letter n o p q r s t u v w x y z
Code value 14 15 16 17 18 19 20 21 22 23 24 25 26
The cleartext information then obtaining the key after dividing into groups is: 11,05,25.
The information encryption of digitlization clear packets is become ciphertext by user encryption key (3,33).
Obtained by C ≡ Me (modn):
M1≡(C1) d(modn)=11 7(mod33)=11
M2≡(C2) d(modn)=31 7(mod33)=05
M3≡(C3) d(modn)=16 7(mod33)=25
Therefore, obtaining corresponding cipher-text information is: 11,31,16.
Suppose that in the present invention, decodement is rk, wherein the integer value of r is 114, and ASCII character is 72; The integer value of k is 107, and ASCII character is 6B.
We can use algorithm by r that is 114, be encrypted to C1, that is k 107 is encrypted to C2.After such process, the password that we see from wireshark is exactly C1C2, instead of rk, thus ensures the safety of account, avoids account information to be stolen.
Step S103: described cipher-text information is sent to server as the current password of user.
Terminal is using the current password of the cipher-text information after encryption as user, password after encryption is sent to server, make other users when intercepting user profile, obtain be encryption after password, and the true password of user's input can not be obtained, solve terminal in prior art and operation is not encrypted to password, cause using some instruments can obtain the account of user and the problem of password.
Step S104: the feedback information receiving described server.
Server is decrypted the password received and verifies, if the password received is consistent with the password that user inputs, then to the correct feedback information of terminal transmission information after receiving the user account and password that terminal sends.
Step S105: perform register according to described feedback information.
Terminal proves the account that user inputs and code matches after receiving the feedback information that server sends over, and allows to perform register.
In the method that a kind of account safety that the application provides logs in, password after encryption is sent to server, sending in the process of information to server, when there being other users to capture network log to obtain account and the password of user by instrument, password after the just encryption got, does not get the password of user's input, effectively avoids the phenomenon that user profile is stolen, just ensure that the fail safe of user profile, achieve the secure log of account.
In the application, describedly utilize before cryptographic algorithm is encrypted operation to the password that described user inputs, also comprise:
Judging that password that described user inputs is the need of being encrypted operation, if so, then utilizes cryptographic algorithm to be encrypted operation to the password that described user inputs, if not, then direct the password that described user inputs being sent to server.
The password of user's input can be controlled the need of encryption by writing code.
Also can the instruction needing to be encrypted operation be set in network application, when user logs in this network application, after user inputs password, can corresponding cryptographic operation be carried out.
With reference to figure 2, show the flow chart of the embodiment of the method 2 that a kind of account safety of the application logs in, can comprise the following steps:
Step S201: user's current password that receiving terminal sends.
Step S202: decipher described current password, obtain decodement.
Described server is decrypted described current password, obtains decodement.
The decodement information that terminal above-mentioned in the application inputs user: 11,05,25 be encrypted after, formed cipher-text information: 11,31,16, and described cipher-text information is sent to server, the cipher-text information that server is receiving described terminal and sends over: 11,31, after 16, operation is decrypted to it, to obtain the decodement of user's input.
Server receives cipher-text information: 11,31,16, is decrypted operation to it, only needs to calculate M ≡ C d(modn), that is:
M1≡(C1) d(modn)=11 7(mod33)=11
M2≡(C2) d(modn)=31 7(mod33)=05
M3≡(C3) d(modn)=16 7(mod33)=25
After deciphering, server obtains cleartext information and is: 11,05,25.
According to coding schedule above by 11,05,25 are converted to English, obtain the decodement after deciphering " key ".
Step S203: described decodement and the user cipher preset expressly are checked, when described decodement and described default user cipher expressly match, then performs step S204, otherwise performs step S205.
When user starts to arrange username and password, the password corresponding with described user name has been saved in server, after server deciphering obtains decodement, the password arranged when the decodement obtained and user are arranged account compares, when two code matches, prove that the password that user inputs is correct.
Step S204: the mark extremely described terminal that feedback cipher is correct.
After judging that password that user inputs is correct, correct being identified in terminal of password of server feedback can be shown as OK mark, and prompt terminal can complete the login of account.
Step S205: feedback cipher mistake, login failure information is to user terminal.
When judging the code error that user inputs, server feedback code error, the information of login failure is to user terminal.
Corresponding with the method that a kind of account safety of above-mentioned the application login method embodiment 1 provides, see Fig. 3, present invention also provides a kind of account safety entering device embodiment, in the present embodiment, this device comprises:
Acquiring unit 301, for obtaining the password of user's input.
Ciphering unit 302, for utilizing cryptographic algorithm to be encrypted operation to the password that described user inputs, forms cipher-text information.
Transmitting element 303, for being sent to server using described cipher-text information as the current password of user.
Receiving element 304, for receiving the feedback information of described server.
Log in unit 305, for performing register according to described feedback information.
Above-mentioned device, also comprises:
Judging unit, for judging that password that described user inputs is the need of being encrypted operation, if, then triggering described ciphering unit utilizes cryptographic algorithm to be encrypted operation to the password that described user inputs, if not, then trigger password that described user inputs by described transmitting element and be sent to server as the current password of user.
In described ciphering unit, the described cryptographic algorithm that utilizes is encrypted operation to the password that described user inputs, and forms cipher-text information, comprising:
Utilize RSA cryptographic algorithms to be encrypted operation to the password that described user inputs, form described cipher-text information.
Present invention also provides a kind of terminal, comprise the device that the above-mentioned account safety for terminal logs in, like this, when user carries out the login of account in the terminal including the device that account safety logs in, terminal is encrypted operation to the encrypted message that user inputs, and ensures the secure log of account.
Corresponding with the method that a kind of account safety of above-mentioned the application login method embodiment 2 provides, see Fig. 4, present invention also provides a kind of account safety entering device embodiment, in the present embodiment, this device comprises:
Receiving element 401, for user's current password that receiving terminal sends.
Decryption unit 402, for deciphering described current password, obtains decodement.
Judging unit 403, for judging whether described decodement expressly matches with the user cipher preset.
Feedback unit 404, if judge that decodement expressly mates with the user cipher preset for judging unit, then the mark that feedback cipher is correct is to described terminal, if do not mate, then feedback cipher mistake, the information of login failure is to described terminal.
Present invention also provides a kind of server, comprise the device that the above-mentioned account safety for server logs in, like this, the server included for the account safety entering device of server can be decrypted the encrypted message of terminal encryption, judge whether the password after deciphering mates with the password that user is arranged, if, then illustrate that the password of user's input is correct, now, server sends feedback information to terminal, terminal completes register according to the feedback information received, and ensures the secure log of account.
With reference to figure 5, present invention also provides the system that a kind of account safety logs in, comprise above-mentioned terminal and server.
In the system with above-mentioned terminal and server, during logon account, terminal is encrypted operation to the password that user inputs, then the encrypted message after encryption is sent to server, sending in the process of information to server, when there being other users to capture network log to obtain account and the password of user by instrument, password after the just encryption got, do not get the password of user's input, effectively avoid the phenomenon that user profile is stolen, just ensure that the fail safe of user profile, achieve the secure log of account.
It should be noted that, each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.For device class embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
Finally, also it should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operating space, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
For convenience of description, various unit is divided into describe respectively with function when describing above device.Certainly, the function of each unit can be realized in same or multiple software and/or hardware when implementing the application.
As seen through the above description of the embodiments, those skilled in the art can be well understood to the mode that the application can add required general hardware platform by software and realizes.Based on such understanding, the technical scheme of the application can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform the method described in some part of each embodiment of the application or embodiment.
The methods, devices and systems that a kind of terminal, server and the account safety that provide the application above log in are described in detail, apply specific case herein to set forth the principle of the application and execution mode, the explanation of above embodiment is just for helping method and the core concept thereof of understanding the application; Meanwhile, for one of ordinary skill in the art, according to the thought of the application, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application.

Claims (11)

1. a method for account safety login, it is characterized in that, for terminal, the method comprises:
Obtain the password of user's input;
Utilize cryptographic algorithm to be encrypted operation to the password that described user inputs, form cipher-text information;
Described cipher-text information is sent to server as the current password of user;
Receive the feedback information of described server;
Register is performed according to described feedback information.
2. method according to claim 1, is characterized in that, describedly utilizes before cryptographic algorithm is encrypted operation to the password that described user inputs, and also comprises:
Judge that password that described user inputs is the need of being encrypted operation, if so, then utilize cryptographic algorithm to be encrypted operation to the password that described user inputs, if not, then the direct password described user inputted is sent to server as the current password of user.
3. the method according to any one of claim 1 or 2, is characterized in that, the described cryptographic algorithm that utilizes is encrypted operation to the password that described user inputs, and forms cipher-text information, comprising:
Utilize RSA cryptographic algorithms to be encrypted operation to the password that described user inputs, form described cipher-text information.
4. a method for account safety login, it is characterized in that, for server, the method comprises:
User's current password that receiving terminal sends;
Decipher described current password, obtain decodement;
Judge whether described decodement expressly matches with the user cipher preset;
If coupling, then the mark that feedback cipher is correct is to described terminal.
5. a device for account safety login, it is characterized in that, for terminal, this device comprises:
Acquiring unit, for obtaining the password of user's input;
Ciphering unit, for utilizing cryptographic algorithm to be encrypted operation to the password that described user inputs, forms cipher-text information;
Transmitting element, for being sent to server using described cipher-text information as the current password of user;
Receiving element, for receiving the feedback information of described server;
Log in unit, for performing register according to described feedback information.
6. device according to claim 5, is characterized in that, also comprises:
Judging unit, for judging that password that described user inputs is the need of being encrypted operation, if, then triggering described ciphering unit utilizes cryptographic algorithm to be encrypted operation to the password that described user inputs, if not, then trigger password that described user inputs by described transmitting element and be sent to server as the current password of user.
7. the device according to any one of claim 5 or 6, is characterized in that, in described ciphering unit, the described cryptographic algorithm that utilizes is encrypted operation to the password that described user inputs, and forms cipher-text information, comprising:
Utilize RSA cryptographic algorithms to be encrypted operation to the password that described user inputs, form described cipher-text information.
8. a device for account safety login, it is characterized in that, for server, this device comprises:
Receiving element, for user's current password that receiving terminal sends;
Decryption unit, for deciphering described current password, obtains decodement;
Judging unit, for judging whether described decodement expressly matches with the user cipher preset;
Feedback unit, if for coupling, then the mark that feedback cipher is correct is to described terminal.
9. a terminal, is characterized in that, comprises the device described in any one of claim 5 to 7.
10. a server, is characterized in that, comprises device according to claim 8.
The system that 11. 1 kinds of account safeties log in, is characterized in that, comprise terminal according to claim 9 and server according to claim 10.
CN201510603097.XA 2015-09-21 2015-09-21 The methods, devices and systems that a kind of terminal, server and account safety log in Active CN105141631B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510603097.XA CN105141631B (en) 2015-09-21 2015-09-21 The methods, devices and systems that a kind of terminal, server and account safety log in

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510603097.XA CN105141631B (en) 2015-09-21 2015-09-21 The methods, devices and systems that a kind of terminal, server and account safety log in

Publications (2)

Publication Number Publication Date
CN105141631A true CN105141631A (en) 2015-12-09
CN105141631B CN105141631B (en) 2019-06-11

Family

ID=54726838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510603097.XA Active CN105141631B (en) 2015-09-21 2015-09-21 The methods, devices and systems that a kind of terminal, server and account safety log in

Country Status (1)

Country Link
CN (1) CN105141631B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330437A (en) * 2016-10-20 2017-01-11 武汉斗鱼网络科技有限公司 Password resetting method and device
CN107612915A (en) * 2017-09-21 2018-01-19 杭州安恒信息技术有限公司 The method and apparatus of the anti-password cracking of double secure forms based on checking code conversion
CN110401944A (en) * 2019-05-22 2019-11-01 腾讯科技(深圳)有限公司 A kind of method for connecting network, server and mobile terminal
CN111600882A (en) * 2020-05-15 2020-08-28 杭州溪塔科技有限公司 Block chain-based account password management method and device and electronic equipment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040059951A1 (en) * 2002-04-25 2004-03-25 Intertrust Technologies Corporation Secure authentication systems and methods
CN1988441A (en) * 2005-12-21 2007-06-27 ***股份有限公司 Data safety transmission method
CN101226705A (en) * 2008-01-28 2008-07-23 和舰科技(苏州)有限公司 Circle scattering migration code-transfer ciphering method
CN101567034A (en) * 2009-05-21 2009-10-28 上海交通大学 System for preventing code inputting action of user from being eavesdropped
CN101894244A (en) * 2009-05-20 2010-11-24 鸿富锦精密工业(深圳)有限公司 System and method for enciphering electronic data
CN102147662A (en) * 2011-03-14 2011-08-10 张龙其 Input terminal with keyboard and encryption module
CN202120203U (en) * 2011-03-14 2012-01-18 张龙其 Input terminal provided with keyboard and encryption module
CN103076988A (en) * 2012-12-28 2013-05-01 银联商务有限公司 Password input method and device
CN103577835A (en) * 2013-08-02 2014-02-12 中国科学技术大学苏州研究院 Method using multi-dimensional feature vectors to detect IP ID covert channel
CN104113410A (en) * 2014-07-04 2014-10-22 北京思特奇信息技术股份有限公司 Method and device for data encryption transmission based on multi-table encryption method
CN104283879A (en) * 2014-10-09 2015-01-14 广州杰赛科技股份有限公司 Virtual machine remote connection method and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040059951A1 (en) * 2002-04-25 2004-03-25 Intertrust Technologies Corporation Secure authentication systems and methods
CN1988441A (en) * 2005-12-21 2007-06-27 ***股份有限公司 Data safety transmission method
CN101226705A (en) * 2008-01-28 2008-07-23 和舰科技(苏州)有限公司 Circle scattering migration code-transfer ciphering method
CN101894244A (en) * 2009-05-20 2010-11-24 鸿富锦精密工业(深圳)有限公司 System and method for enciphering electronic data
CN101567034A (en) * 2009-05-21 2009-10-28 上海交通大学 System for preventing code inputting action of user from being eavesdropped
CN102147662A (en) * 2011-03-14 2011-08-10 张龙其 Input terminal with keyboard and encryption module
CN202120203U (en) * 2011-03-14 2012-01-18 张龙其 Input terminal provided with keyboard and encryption module
CN103076988A (en) * 2012-12-28 2013-05-01 银联商务有限公司 Password input method and device
CN103577835A (en) * 2013-08-02 2014-02-12 中国科学技术大学苏州研究院 Method using multi-dimensional feature vectors to detect IP ID covert channel
CN104113410A (en) * 2014-07-04 2014-10-22 北京思特奇信息技术股份有限公司 Method and device for data encryption transmission based on multi-table encryption method
CN104283879A (en) * 2014-10-09 2015-01-14 广州杰赛科技股份有限公司 Virtual machine remote connection method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330437A (en) * 2016-10-20 2017-01-11 武汉斗鱼网络科技有限公司 Password resetting method and device
CN107612915A (en) * 2017-09-21 2018-01-19 杭州安恒信息技术有限公司 The method and apparatus of the anti-password cracking of double secure forms based on checking code conversion
CN110401944A (en) * 2019-05-22 2019-11-01 腾讯科技(深圳)有限公司 A kind of method for connecting network, server and mobile terminal
CN110401944B (en) * 2019-05-22 2022-01-14 腾讯科技(深圳)有限公司 Network connection method, server and mobile terminal
CN111600882A (en) * 2020-05-15 2020-08-28 杭州溪塔科技有限公司 Block chain-based account password management method and device and electronic equipment

Also Published As

Publication number Publication date
CN105141631B (en) 2019-06-11

Similar Documents

Publication Publication Date Title
CN108768607B (en) Voting method, device, equipment and medium based on block chain
CN106603246B (en) A kind of SM2 digital signature segmentation generation method and system
CN107078899B (en) Method of obfuscating data
CN113132099B (en) Method and device for encrypting and decrypting transmission file based on hardware password equipment
US20150326392A1 (en) Matrix-based cryptosystem
CN109245903B (en) Signature method and device for cooperatively generating SM2 algorithm by two parties and storage medium
CN106850229B (en) SM2 digital signature generation method and system based on product secret division
CN105337736A (en) Fully-homomorphic message authentication method, device and system
CN107948152A (en) Information storage means, acquisition methods, device and equipment
EP3378190A1 (en) Method of performing keyed-hash message authentication code (hmac) using multi-party computation without boolean gates
CN104126284A (en) Generating digital signatures
CN105337737A (en) Public key encryption communication method and public key encryption communication device
CN107707562B (en) Method and device for encrypting and decrypting algorithm of asymmetric dynamic token
CN105141631A (en) Terminal, server and account security login method, device and system
CN105162585B (en) A kind of session cipher negotiating method of secret protection
CN114443718A (en) Data query method and system
CN105530089B (en) Attribute-based encryption method and device
CN105306212A (en) Signcryption method with hidden identity and strong security
EP3709561A1 (en) Method for generating a digital signature of an input message
CN110166235A (en) The SM9 digital signature collaboration generation method and system of enhancing safety
CN106850584A (en) Anonymous authentication method facing client/server network
CN106453253A (en) Efficient identity-based concealed signcryption method
Bayat et al. A secure and efficient chaotic maps based authenticated key-exchange protocol for smart grid
CN114362912A (en) Identification password generation method based on distributed key center, electronic device and medium
Juniawan RSA implementation for data transmission security in BEM chairman E-voting Android based application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210525

Address after: 518052 a605, building G4, TCL International e city, Shuguang community, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Patentee after: Shenzhen yingmu Technology Co.,Ltd.

Address before: 518057 Guangdong Province Nanshan High-tech Industrial Park North District Kupai Information Port, 2 Buildings, 2 Floors

Patentee before: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd.