Movatterモバイル変換


[0]ホーム

URL:


CN103763097A - Security encryption method for password or secret key - Google Patents

Security encryption method for password or secret key
Download PDF

Info

Publication number
CN103763097A
CN103763097ACN201410031519.6ACN201410031519ACN103763097ACN 103763097 ACN103763097 ACN 103763097ACN 201410031519 ACN201410031519 ACN 201410031519ACN 103763097 ACN103763097 ACN 103763097A
Authority
CN
China
Prior art keywords
password
key
computer
buffer
encryption method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410031519.6A
Other languages
Chinese (zh)
Inventor
楼微然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Net End Technology (hangzhou) Co Ltd
Original Assignee
Net End Technology (hangzhou) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Net End Technology (hangzhou) Co LtdfiledCriticalNet End Technology (hangzhou) Co Ltd
Priority to CN201410031519.6ApriorityCriticalpatent/CN103763097A/en
Publication of CN103763097ApublicationCriticalpatent/CN103763097A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Landscapes

Abstract

The invention discloses a security encryption method for a password or a secret key. According to the security encryption method for the password or the secret key, the password or the secret key is recombined with network card MAC addresses, CPU information and application software information of one or more computers so that a new password or a new secret key can be generated, the security performance of the password or the secret key can be improved, and the uniqueness of the password or the secret key can be ensured. The security encryption method has the advantages of being high in encryption security performance, not prone to cracking, and capable of being widely applied to security encryption of passwords or secret keys of various types of data, various types of application software and the like.

Description

The safe encryption method of password or key
Technical field
The invention belongs to maintaining secrecy or safe transmission technical field of digital information, relate to the safe encryption method of a kind of password or key.
Background technology
The encryption technology of digital information is the main secrecy provision that ecommerce is taked, the most frequently used safe and secret means, utilize technological means that important data encryption is transmitted, arrive object and by certain mode, decipher again, in order to reach the secret effect of digital information.Existing encryption technology generally comprises password encryption and secret key encryption, although password encryption and secret key encryption have guaranteed the fail safe that digital information is certain, once but password and key loss just can be decoded digital information completely, in addition, modernization along with hacking technique, the fail safe of password encryption and secret key encryption is more and more challenged, and how to ensure that the uniqueness of password encryption and secret key encryption and difficult cracking have become one of modern society's problem demanding prompt solution.
Summary of the invention
Technical problem to be solved by this invention is for the problem that existing password is encrypted and secret key encryption exists that encryption safe performance is low, password and key are easily stolen, provide a kind of encryption safe performance high, there is the password of uniqueness or the safe encryption method of key after being difficult for cracking, encrypting.
For addressing the above problem, technical scheme of the present invention is:
A safe encryption method for password or key, comprises the steps:
Step a: obtain the content of password or the key that need to be encrypted computing, the content of password and key is write in the first buffer;
Step b: obtain the MAC Address of Network Card of computer, write in the second buffer the content in computer network interface card MAC Address is all or part of;
Step c: read respectively the content in the first buffer and the second buffer, the content reading is encrypted to computing and produces new password or key, described new password or key need the checking of user's MAC Address of Network Card after deciphering.
Preferably, in described step b, also comprise the CPU information of obtaining computer, and generate computer CPU information can execution character string, can write in the second buffer by all or part of of execution character string; Corresponding, password or key new in step c also need the checking of computer CPU information after deciphering.The CPU information of computer has uniqueness as hardware sequence number etc., can be used as multiple digital verification, further ensure the security performance of new password or key, even password or key from stealing or leakage, stolen party can only just can complete decryption work on user's computer, has increased the difficulty of divulging a secret.
Preferably, in described step b, also comprise and obtain computer application software information, and generate the identification strings of application software information, all or part of of identification strings write in the second buffer; Password or key new in corresponding step c also need the checking of application software information after deciphering.In the encryption or decrypting process of computer application software and digital information, the software information that can utilize computer application software to produce, the identification strings of generation is as multiple digital verification, the password that multi-faceted raising is new or the security performance of key.
Preferably, described computer is a kind of of data receiver, data receiver, data receiver and data receiver.When computer is data receiver or data receiver or data receiver and data receiver, can obtain respectively MAC Address in data receiver and data receiver or computer CPU information or computer application software information writes in the second buffer, be conducive to like this improve the password of the inner important numbers information of computer the machine or the security performance of key, also improved digital information transmission both sides' password or the security performance of key.
Be compared to prior art, the safe encryption method of password of the present invention or key is combined password or key with computer network interface card MAC Address, content all or part of in computer network interface card MAC Address and password or key are encrypted to computing and form new password or key, the password that this is new or key need the checking of content all or part of in original computer network interface card MAC Address after deciphering, could ensure the validity of password or key, guarantee that password or the key after encrypting has uniqueness; The present invention has the advantages that encryption safe performance is high, be difficult for cracking, and can be widely used in the password of various data, application software etc. or the safety encipher of key.
Accompanying drawing explanation
Fig. 1 is the inventive method flow chart.
Embodiment
Below in conjunction with drawings and Examples, further describe the present invention, but protection scope of the present invention is not limited to this.
With reference to Fig. 1, the safe encryption method of password of the present invention or key reconfigures one group of new password or key of rear production by password or key and one or more computer network interface card MAC Address, computer CPU information and computer application software information, in order to improve the security performance of password or key, ensure the uniqueness of password or key.
The safe encryption method of password of the present invention or key comprises the steps:
Step a: obtain the content of password or the key that need to be encrypted computing, the content of password and key is write in the first buffer.
Step b: when the content of password and key successfully writes the first buffer, obtain the MAC Address of Network Card of one or more computer, in computer network interface card MAC Address, 48bit is that each network site is exclusive, there is uniqueness, now write in the second buffer the content in computer network interface card MAC Address is all or part of.The number that 48bit writes figure place can, according to the needs of password and key complexity or importance, can arrange with user voluntarily.
Successfully writing after MAC Address, obtain the CPU information of one or more computer, and generate computer CPU information can execution character string, can write in the second buffer by all or part of of execution character string, wherein computer CPU information comprises computer hardware sequence or other.After can execution character conspiring to create merit and writing, obtain computer application software information, and generate the identification strings of application software information, all or part of of identification strings write in the second buffer.After above-mentioned steps completes, enter step c.
Step c: read respectively the content in the first buffer and the second buffer, the content reading is encrypted to computing and generates new password or key.Wherein cryptographic calculation can be MD5 algorithm, the symmetry algorithm based on DES or various simple logics high in the clouds, as " displacement ", " position negate computing " and " position XOR " etc., object is to make computer network interface card MAC Address, computer CPU information or computer application software information combination in new password or key, increases its complexity.The above-mentioned MD5 algorithm of mentioning, the symmetry algorithm based on DES and various simple logical operation, as " displacement ", " position negate computing " and " position XOR " etc. belong to prior art, have this to repeat no more.
Wherein, described password or key can be password or the keys of computer-internal digital information, can be also password or the keys that needs transfer files, have the place that relates to password or key can adopt method of the present invention to be encrypted in computer.Described computer can be a kind of in data receiver, data receiver, data receiver and data receiver.When computer is data receiver or data receiver or data receiver and data receiver, can obtain respectively MAC Address in data receiver and data receiver or computer CPU information or computer application software information writes in the second buffer and stores, make new password or cipher key application in one or more computer, be conducive to improve the password of the inner important numbers information of computer the machine or the security performance of key, also improved digital information transmission both sides' password or the security performance of key.
After new password or key generate, in use, user need to be decrypted with multiple check after can enable.After the inverse operation deciphering by respective encrypted algorithm of new password or key, need the checking of the corresponding MAC Address of Network Card of user, computer CPU information or computer application software information, only have new password or key to be proved to be successful in subscriber computer, while determining new password or key safety, password or key just can play corresponding effect, could ensure the validity of password or key, otherwise, new password or key verification failure, cannot read digital information.
It should be noted that; embodiment of the present invention is illustrative; rather than determinate; therefore the invention is not restricted to the embodiment described in embodiment; every other execution modes that drawn by those skilled in the art's technical scheme according to the present invention, belong to protection scope of the present invention equally.

Claims (4)

CN201410031519.6A2014-01-232014-01-23Security encryption method for password or secret keyPendingCN103763097A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201410031519.6ACN103763097A (en)2014-01-232014-01-23Security encryption method for password or secret key

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201410031519.6ACN103763097A (en)2014-01-232014-01-23Security encryption method for password or secret key

Publications (1)

Publication NumberPublication Date
CN103763097Atrue CN103763097A (en)2014-04-30

Family

ID=50530262

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201410031519.6APendingCN103763097A (en)2014-01-232014-01-23Security encryption method for password or secret key

Country Status (1)

CountryLink
CN (1)CN103763097A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105790932B (en)*2016-02-252018-08-14四川长虹电器股份有限公司A kind of encryption method by using based on machine code
CN109409099A (en)*2018-09-032019-03-01中国平安人寿保险股份有限公司Cookie data processing method, device, computer equipment and storage medium
CN110909343A (en)*2019-11-252020-03-24安徽兮克电子科技有限公司NAS password recovery method based on MD5 encryption
CN113795023A (en)*2021-09-262021-12-14深圳市芯中芯科技有限公司Bluetooth data transmission encryption method based on chaotic sequence and block encryption

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105790932B (en)*2016-02-252018-08-14四川长虹电器股份有限公司A kind of encryption method by using based on machine code
CN109409099A (en)*2018-09-032019-03-01中国平安人寿保险股份有限公司Cookie data processing method, device, computer equipment and storage medium
CN110909343A (en)*2019-11-252020-03-24安徽兮克电子科技有限公司NAS password recovery method based on MD5 encryption
CN113795023A (en)*2021-09-262021-12-14深圳市芯中芯科技有限公司Bluetooth data transmission encryption method based on chaotic sequence and block encryption
CN113795023B (en)*2021-09-262024-03-19深圳市芯中芯科技有限公司Bluetooth data transmission encryption method based on chaotic sequence and packet encryption

Similar Documents

PublicationPublication DateTitle
US10142107B2 (en)Token binding using trust module protected keys
US10320765B2 (en)Method and system for securing communication
CN102138300B (en) Application of message authentication code precomputation in secure memory
CN102355352B (en) A data confidentiality and integrity protection method
CN107908574B (en)Safety protection method for solid-state disk data storage
CN102355350B (en)A kind of file encrypting method for mobile intelligent terminal and system
CN104270242B (en)A kind of ciphering and deciphering device for network data encryption transmission
CN102567688B (en)File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN105306194A (en)Multiple encryption method and system for encrypting files and/or communication protocols
CN104281815B (en)The method and system of file encryption-decryption
WO2018170963A1 (en)File encryption and decryption method and apparatus
CN101447870A (en)Safe storage method of private key based on technology of distributed password
JP2024511236A (en) Computer file security encryption method, decryption method and readable storage medium
CN204180095U (en)A kind of ciphering and deciphering device for network data encryption transmission
CN104618096A (en)Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center
CN107911221B (en)Key management method for secure storage of solid-state disk data
CN105468940A (en)Software protection method and apparatus
CN113722741A (en)Data encryption method and device and data decryption method and device
TWI476629B (en) Data security and security systems and methods
CN101651538A (en)Method for safe transmission of data based on creditable password module
CN103763097A (en)Security encryption method for password or secret key
CN102270182B (en)Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN105933117A (en)Data encryption and decryption device and method based on TPM (Trusted Platform Module) key security storage
CN210955077U (en) A bus encryption and decryption device based on national secret algorithm and PUF
CN107483187A (en) A data protection method and device based on a trusted cryptographic module

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20140430

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp