CN113312535B - Engineering survey intelligent management control cloud platform - Google Patents

Engineering survey intelligent management control cloud platform Download PDF

Info

Publication number
CN113312535B
CN113312535B CN202110588790.XA CN202110588790A CN113312535B CN 113312535 B CN113312535 B CN 113312535B CN 202110588790 A CN202110588790 A CN 202110588790A CN 113312535 B CN113312535 B CN 113312535B
Authority
CN
China
Prior art keywords
password
character
account
code
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110588790.XA
Other languages
Chinese (zh)
Other versions
CN113312535A (en
Inventor
徐其学
高兵
吕超武
谢先武
熊军
罗勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway 11th Bureau Group Co Ltd
Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd
Original Assignee
China Railway 11th Bureau Group Co Ltd
Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Railway 11th Bureau Group Co Ltd, Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd filed Critical China Railway 11th Bureau Group Co Ltd
Priority to CN202110588790.XA priority Critical patent/CN113312535B/en
Publication of CN113312535A publication Critical patent/CN113312535A/en
Application granted granted Critical
Publication of CN113312535B publication Critical patent/CN113312535B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides an engineering measurement intelligent management control cloud platform which comprises a data output end of an acquisition module connected with a data input end of a first safety processing module, a data output first end of the first safety processing module connected with a data input end of a second safety processing module, a data output second end of the first safety processing module connected with a data input end of a first generation module, a data output end of the first generation module connected with a data input first end of the second generation module, a data output end of the second safety processing module connected with a data input first end of the second generation module, and a data output end of the second generation module connected with a data input end of a sending module. The method and the system can ensure that the cloud platform is logged in safely, prevent the login account and the login password from being cracked in the transmission process, and ensure the safety of the user.

Description

Engineering survey intelligent management control cloud platform
Technical Field
The invention relates to the technical field of cloud platforms, in particular to an engineering measurement intelligent management control cloud platform.
Background
With the continuous development of the big data era, security becomes a hot topic, and patent application No. 2015110319802, entitled "two-dimensional code scanning authentication login method and related device", discloses that after a second client (mobile client) logs in and authenticates through a target system, a two-dimensional code is scanned, information in the two-dimensional code is extracted to generate binding information, the binding information is sent to the target system through a security platform to perform login processing of a first client, and the first client can be quickly logged in through the interaction. Meanwhile, the security platform is added to serve as a link between the mobile device and the server, interaction between the mobile terminal and the server needs to pass through the security forwarding platform, and interaction between the mobile terminal and the server cannot be carried out directly, so that the server can be prevented from being exposed in an external network environment, and attacks on the server are reduced. Meanwhile, the security platform encrypts the request information for quick scanning login, so that potential safety hazards such as brute force attack and invasion to the verification system after the scanning code is intercepted by an extranet person can be prevented.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides an engineering measurement intelligent management control cloud platform.
In order to achieve the above purpose, the invention provides an engineering measurement intelligent management control cloud platform, which comprises a mobile phone equipment end and a server end capable of achieving wireless communication with the mobile phone equipment end, wherein a user logs in the server end by using the mobile phone equipment end, and the mobile phone equipment end comprises an acquisition module, a first safety processing module, a second safety processing module, a first generation module, a second generation module and a sending module;
the data output end of the acquisition module is connected with the data input end of the first safety processing module, the data output first end of the first safety processing module is connected with the data input end of the second safety processing module, the data output second end of the first safety processing module is connected with the data input first end of the first generation module, the data output first end of the second safety processing module is connected with the data input second end of the first generation module, the data output end of the first generation module is connected with the data input first end of the second generation module, the data output second end of the second safety processing module is connected with the data input second end of the second generation module, the data output third end of the first safety processing module is connected with the data input third end of the second generation module, and the data output end of the second generation module is connected with the data input end of the sending module;
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device terminal;
the first security processing module is used for respectively carrying out security processing on the login account and the login password acquired in the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the first generation module is used for generating an account number QR code for the login safety account number obtained in the first safety processing module and generating a password QR code for the safety password obtained in the second safety processing module;
the second generation module is used for combining the security account obtained in the second security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the login security password obtained in the first security processing module with the password QR code generated in the first generation module to obtain a password combination code;
the sending module sends the account number combination code and the password combination code obtained in the second generating module of the sending module, and the login safety account number corresponding to the account number combination code and the safety password corresponding to the password combination code to the server side for verification;
or the following steps:
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device end;
the first security processing module is used for respectively carrying out security processing on the login account and the login password acquired in the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the first generation module is used for generating an account number QR code for the safety account number obtained from the second safety processing module and a password QR code for the login safety password obtained from the first safety processing module;
the second generation module is used for combining the login security account obtained in the first security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the security password obtained in the second security processing module with the password QR code generated in the first generation module to obtain a password combination code;
and the sending module sends the account number combination code and the password combination code obtained in the second generating module and the login security password corresponding to the security account number and the password combination code corresponding to the account number combination code to the server side for verification of correctness.
In summary, by adopting the technical scheme, the invention can ensure that the cloud platform is logged in safely, prevent the login account and the login password from being cracked in the transmission process and ensure the safety of the user.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the inventive connection.
Fig. 2 is a schematic diagram of a QR code of an account according to the present invention.
Fig. 3 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 4 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 5 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 6 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 7 is a schematic diagram of a QR connection code of an account according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention discloses an engineering measurement intelligent management control cloud platform which comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, wherein a user logs in the server end by using the mobile phone equipment end, and the mobile phone equipment end comprises an acquisition module, a first safety processing module, a second safety processing module, a first generation module, a second generation module and a sending module;
as shown in fig. 1, the data output end of the acquisition module is connected to the data input end of the first security processing module, the data output first end of the first security processing module is connected to the data input end of the second security processing module, the data output second end of the first security processing module is connected to the data input first end of the first generation module, the data output first end of the second security processing module is connected to the data input second end of the first generation module, the data output end of the first generation module is connected to the data input first end of the second generation module, the data output second end of the second security processing module is connected to the data input second end of the second generation module, the data output third end of the first security processing module is connected to the data input third end of the second generation module, and the data output end of the second generation module is connected to the data input end of the transmission module;
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device terminal;
the first security processing module is used for respectively carrying out security processing on the login account and the login password acquired in the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the first generation module is used for generating an account number QR code for the login safety account number obtained in the first safety processing module and generating a password QR code for the safety password obtained in the second safety processing module;
the second generation module is used for combining the security account obtained in the second security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the login security password obtained in the first security processing module with the password QR code generated in the first generation module to obtain a password combination code;
the sending module sends the account number combination code and the password combination code obtained in the second generating module of the sending module, and the login security account number corresponding to the account number combination code and the security password corresponding to the password combination code to the server side for verification;
or the following steps:
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device terminal;
the first security processing module is used for respectively performing security processing on the login account and the login password acquired by the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the first generation module is used for generating an account number QR code for the safety account number obtained from the second safety processing module and a password QR code for the login safety password obtained from the first safety processing module;
the second generation module is used for combining the login security account obtained in the first security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the security password obtained in the second security processing module with the password QR code generated in the first generation module to obtain a password combination code;
and the sending module sends the account number combination code and the password combination code obtained in the second generating module and the login security password corresponding to the security account number and the password combination code corresponding to the account number combination code to the server side for verification.
In a preferred embodiment of the present invention, in the first security processing module, the method for performing security processing on the login account to obtain the login security account includes:
Loginsecuritynumber=sha[[securitynumber]],
wherein sha [ ] ] represents a security algorithm;
securitynumber represents a login account;
logins securitynumber represents a login secured account number;
the method for carrying out login password security processing on the obtained login password to obtain the login security password comprises the following steps:
Loginsafetynumber=sha[[safetynumber]],
security number represents a login password;
loginsafetynumber indicates a login security password.
In a preferred embodiment of the present invention, in the second security processing module, the login security account is subjected to security processing, and the method for obtaining the security account includes:
Loginsecuritynumber′=sha[[Loginsecuritynumber]],
wherein sha [ ] ] represents a security algorithm;
logins securitynumber represents a login secured account number;
loginstecurynymber' represents a secured account number;
the method for performing login security password security processing on the obtained login security password to obtain the security password comprises the following steps:
Loginsafetynumber′=sha[[Loginsafetynumber]],
loginsafetynumber represents a login security password;
loginsafetynumber' denotes a security password.
In a preferred embodiment of the present invention, in the second generation module, the method for combining the obtained secured account with the generated account QR code to obtain the account combination code thereof includes the following steps:
s151, converting the safety account number into a safety account number binary system;
s152, judging the relationship between the total number of binary digits of the safety account and the total number of black units in the QR code of the account:
Figure BDA0003088639720000041
wherein x represents the total number of binary digits of the safety account number;
y represents the total number of black units in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z represents the total number of the QR codes of the account;
s153, if z is larger than or equal to 2, sequentially connecting the QR codes of the z accounts from left to right to obtain QR connecting codes of the accounts; if z =1, only one account QR code is available, and the account QR code is an account QR connection code; for account number QR evenThe black unit and the white unit in the code receiving are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, \ 8230 \ 8230;, an A-th unit, A = z × α 2 Wherein, alpha represents the size of the QR code of the account;
s154, encoding characters in a binary system of the safety account number from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, and the y character of the account number respectively; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the account, wherein the characters are 8230, and the y-th character of the account are sequentially mapped to a y arrangement code;
s155, extracting the arrangement code mapped by the character corresponding to the y character of the account number to obtain a stop code; mapping characters 0 or 1 to other units of the unmapped characters before the cut-off codes;
s156, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, the cut-off code into lines to obtain a binary character string;
and S157, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
In a preferred embodiment of the present invention, the method for combining the obtained login security password with the generated password QR code in the second generation module to obtain the password combination code thereof includes the following steps:
s151, converting the login security password into a login security password binary system;
s152, judging the relation between the total digits of the login security password binary system and the total number of black units in the password QR code:
Figure BDA0003088639720000042
wherein,' x represents the total digits of the binary system of the login security password;
' y represents the total number of black units in the password QR code;
if represents the condition if;
z represents a set of all integers;
int [ ] represents the rounding function;
"z represents the total number of the password QR codes;
s153, if the 'z is more than or equal to 2, sequentially connecting the' z password QR codes from left to right to obtain password QR connecting codes thereof; if' z =1, only one password QR code is available, and the password QR code is a password QR connecting code; the black unit and the white unit in the QR code are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, \8230; "A unit," = A = ' zx × "' alpha ' unit 2 Wherein,' alpha represents the size of the password QR code;
s154, encoding characters in the login security password binary system from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, and the Y character of the password respectively; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the first Y password permutation codes to obtain the Y password permutation codes; the 1 st character, the 2 nd character and the 3 rd character of the password, 8230, and mapping characters corresponding to the Y-th password character to Y-th password permutation codes in sequence;
s155, extracting the password arrangement code mapped by the character corresponding to the Y-th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s156, writing a line according to characters mapped by the unit 1, the unit 2, the unit 3, \8230; \ 8230;, the password cut-off code respectively to obtain a binary character string;
and S157, converting the binary character string into a hexadecimal character string to obtain the password combination code.
In a preferred embodiment of the present invention, a method for a server to verify correctness of an account number binding code includes the following steps:
s151, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code by using the received login security account;
s152, judging the relation between the total digits of the binary account number combination code and the total number of black units and white units in the QR code of the server-side account number:
Figure BDA0003088639720000051
wherein K represents the total digit of the binary account number combination code;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
j represents the total number of QR codes of the server side account;
s153, if J is larger than or equal to 2, sequentially connecting the J server-side account numbers (QR) from left to right to obtain server-side account number (QR) connection codes; if J =1, only one server-side account number QR code is available, and the server-side account number QR code is a server-side account number QR connection code; sequentially encoding black units and white units in a QR (quick response) connection code of a server-side account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, \8230; \ 8230;, a V th unit and V = J × δ 2 Wherein, δ represents the size of the QR code of the server-side account;
s154, encoding characters in the binary account binding code according to a left-to-right sequence, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, and the Kth character of the account; the method comprises the steps of mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of an account, wherein the characters are (8230); and the characters corresponding to the Kth character of the account are mapped to the 1 st unit, the 2 nd unit, the 3 rd unit, the (8230); and (K) unit in sequence;
s155, extracting 1 st unit, 2 nd unit, 3 rd unit, \8230 \ 8230;, the K unit is the code of the black unit;
s156, arranging the extracted codes of the black units in a sequence from small to large, and writing characters mapped by the arranged codes of the black units into lines to obtain a binary character string at the server;
s157, converting the binary character string of the server terminal into the binary character string which is the same as the security account number in the step S13 to obtain the server terminal account number;
s158, determining whether the server account number is consistent with a preset account number preset in the server:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server-side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
In a preferred embodiment of the present invention, the method for calculating the server-side password comprises the following steps:
s581, the server end converts the received password combination code into a binary password combination code; generating a server-side password (QR) code from the received security password;
s582, judging the relation between the total digits of the binary password combination code and the total number of black units and white units in the server-side password QR code:
Figure BDA0003088639720000061
wherein,' K represents the total number of bits of the binary cipher-code combination code;
the' L represents the total number of black units and white units in the QR code at the server side;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
' J represents the total number of the server-side password QR codes;
s583, if the ' J ' is larger than or equal to 2, sequentially connecting the ' J server-side password QR codes from left to right to obtain server-side password QR connecting codes; if' J =1, only one server-side password QR code is available, and the server-side password QR code is a server-side password QR connecting code; the black unit and the white unit in the password QR connecting code at the server end are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, 8230a ' \ 8230a '/V unit, a '/V ' = J x '/delta 2 Wherein,' delta represents the size of the server-side password QR code;
s584, coding the characters in the binary password combination code from left to right, wherein the characters are respectively the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the K character of the password; sequentially mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the password, the password of 8230, the password of 82308230, and the password of K to the 1 st unit, the 2 nd unit, the 3 rd unit, the password of 82308230, the password of K and the K unit;
s585, extracting the code of black unit in the 1 st unit, the 2 nd unit, the 3 rd unit, \8230 `, ` K `;
s586, arranging the extracted codes of the black units in a sequence from small to large, writing characters mapped by the codes of the arranged black units into lines, and obtaining a binary character string at the server;
s587, the server side binary string is converted to be the same as the login security password system in the step S2, and the server side password is obtained. In the present embodiment, the present invention further includes:
the following operations are performed on the server-side password:
`Loginsafetynumber=sha[[``safetynumber]],
wherein sha [ ] ] represents a security algorithm;
"security number represents a server-side password;
"Loginsafetynumber represents a password security value;
judging whether the password security value' Locinafetyumber is consistent with the received security password:
if the password security value' Loginsafetynumber is consistent with the received security password, executing to judge whether the password of the server side is consistent with a preset password associated with a preset account number preset at the server side;
if the password security value' logins afetynumber is inconsistent with the received security password, returning to the step S1581, and if the number of times of returning reaches the password returning set number threshold, failing to log in.
For example, in the first step, the login account input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.com.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account;
Figure BDA0003088639720000071
in the present embodiment, the safety algorithm sha [, ]]]The MD5 algorithm is adopted to obtain a 32-bit lower-case 16-system numerical value.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088639720000072
fourthly, an account QR code is generated for the obtained login safe account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
<xnotran> , 188f3647551830c11fbd2d43563f1867 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111. </xnotran>
<xnotran> , 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 QR : </xnotran>
Due to the fact that
Figure BDA0003088639720000073
Thus, the device
Figure BDA0003088639720000074
Seventhly, because z =1, the account QR code is an account QR connection code, as shown in fig. 2; if z =2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 3; if z =4, sequentially connecting the 4 account QR codes from left to right to obtain account QR connecting codes; as shown in fig. 4.
Eighthly, coding the black unit and the white unit in the account QR connection code shown in fig. 2 from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, the unit 8230the unit 8230, the unit 841, and the account QR code has the size of 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 9 th, 12 th, 16 th, 19 th, 20 th, 21 st, 23 rd, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1. (here, since only the first action example is taken in the ninth step, 1 to 20 bits of the binary system of the secured account number, that is, 11000100011110011011, the corresponding hexadecimal system thereof is c479b, and c479b is taken as the preset account number stored in the server side).
Step ten, mapping characters 0 on the 8 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 14 th unit, the 15 th unit, the 17 th unit, the 18 th unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 th cell is 1, the character mapped on the 1 st cell is 0, the 24 th cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the cell is 1, the character mapped on the cell is 0, the character mapped on the 1 th cell is 24 th cell is 0, the character mapped on the cell is 24.
In the tenth step, characters mapped by the units 1, 2, 3, 8230, 8230and the stop codes are written into lines to obtain binary character strings 11000100000000010011100011011.
And step ten, converting the binary character string 11000100000000010011100011011 into a hexadecimal character string 1880271b to obtain the account number combination code.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088639720000081
in the present embodiment, the safety algorithm sha [, ]]]The MD5 algorithm is adopted to obtain 32-bit lower case 16-system numerical values.
Fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088639720000082
in the fifteenth step, a password QR code is generated for the obtained security password 188f3647551830c11fbd2d43563f1867, as shown in fig. 5.
<xnotran> , 315be36db8ad7b3e3a7bb0839d6fa839 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001. </xnotran>
<xnotran> , 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 QR : </xnotran>
Due to the fact that
Figure BDA0003088639720000083
Thus, it is possible to provide
Figure BDA0003088639720000084
Eighteenth, since "z =1, the password QR code is a password QR connection code, as shown in fig. 5; if' z =2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes thereof; as shown in fig. 6; if' z =4, sequentially connecting 4 password QR codes from left to right to obtain password QR connecting codes thereof; as shown in fig. 7.
Nineteenth step, coding the black unit and the white unit in the password QR connecting code shown in figure 5 from left to right and from top to bottom in sequence, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, the unit 8230the unit 82841, and the size of the password QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher code; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the initial example is taken in the twentieth step, 1 to 18 bits of the binary system of the secure password, i.e., 110001010110111110, the corresponding hexadecimal is 315be, and 315be is taken as the preset password stored at the server side).
Twenty-first, mapping character 0 to the 8 th, 9 th, 10 th, 11 th, 13 th, 15 th, 16 th, 17 th, 20 th, 21 st and 22 nd units; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 nd cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, the character mapped on the 22 th cell is 0, the character mapped on the 23 th cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
In the twentieth step, the characters mapped by the units 1, 2, 3, 8230, 8230and the end codes are written into lines to obtain binary character strings 11000100000100000110000111110.
The twenty-third step, the binary character string 11000100000100000110000111110 is converted into hexadecimal character string 18820c3e, and the password combination code is obtained.
The twenty-fourth step, the account combination code 1880271b and the login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as well as the password combination code 18820c3e and the secure password 188f3647551830c11fbd2d43563f1867 are sent to the server side.
The twenty-fifth step, the account number combination code received by the server is 1880271b, and the login secure account number received by the server is 315be36db8ad7b3e3a7bb0839d6fa839;
twenty-sixth step, the server side converts the received account number combination code 1880271b into a binary account number combination code of 11000100000000010011100011011; and generating a server-side account QR code from the received login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Twenty-seventh step, because
Figure BDA0003088639720000091
Thus, it is possible to provide
Figure BDA0003088639720000092
Twenty-eighth, because J =1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 2; if J =2, sequentially connecting the QR codes of the 2 server-side account numbers from left to right to obtain a QR connecting code of the server-side account number; as shown in fig. 3; if J =4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 4.
Twenty-ninth step, coding the black unit and the white unit in the server-side account number QR connection code from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230and the unit 841, and the size of the server-side account number QR code is 29.
Thirty-third step, encoding characters in the binary account number combination code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 0, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, and the character corresponding to the 15 th character is 0, the character corresponding to the 16 th character of the account is 1, the character corresponding to the 17 th character of the account is 0, the character corresponding to the 18 th character of the account is 0, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 1, the character corresponding to the 21 st character of the account is 1, the character corresponding to the 22 nd character of the account is 0, the character corresponding to the 23 th character of the account is 0, the character corresponding to the 24 th character of the account is 0, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 0, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 1.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, 8230, 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, 8230, 29 th unit; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 th cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 1.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain a binary character string of 11000100011110011011 at the server end.
And thirty-third step, converting the binary character string 11000100011110011011 at the server end into a hexadecimal system to obtain the account number c479b at the server end.
And thirty-fourth step, judging whether the server side account number c479b is consistent with a preset account number preset at the server side:
calculating a server-side password because the server-side account number c479b is consistent with a preset account number c479b preset at the server side;
thirty-fifth step, the server side converts the received password combination code 18820c3e into binary password combination code 11000100000100000110000111110; and generating a server-side password QR code from the received secure password 188f3647551830c11fbd2d43563f1867, as shown in FIG. 5.
Thirty-sixth step, because
Figure BDA0003088639720000101
Thus, it is possible to provide
Figure BDA0003088639720000102
Thirty-seventh step, since "J =1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 5; if' J =2, sequentially connecting the 2 server-side password QR codes from left to right to obtain a server-side password QR connecting code; as shown in fig. 6; if' J =4, sequentially connecting the 4 server-side password QR codes from left to right to obtain the server-side password QR connecting codes; as shown in fig. 7.
And thirty-eighth step, sequentially coding black units and white units in the server-side password QR connecting code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit 8230, a unit 8230and a unit 841, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding characters in binary password combination code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the password respectively; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 1, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, and the character corresponding to the 15 th character of the password is 0, the 16 th character of the password corresponds to the character 0, the 17 th character of the password corresponds to the character 0, the 18 th character of the password corresponds to the character 1, the 19 th character of the password corresponds to the character 1, the 20 th character of the password corresponds to the character 0, the 21 st character of the password corresponds to the character 0, the 22 nd character of the password corresponds to the character 0, the 23 rd character of the password corresponds to the character 0, the 24 th character of the password corresponds to the character 1, the 25 th character of the password corresponds to the character 1, the 26 th character of the password corresponds to the character 1, the 27 th character of the password corresponds to the character 1, the 28 th character of the password corresponds to the character 1, and the 29 th character of the password corresponds to the character 0.
Forty step, mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the password, 8230, 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, 8230, 29 th unit; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And forty step, writing the characters mapped by the codes of the arranged black units into lines to obtain a binary character string of 110001010110111110 at the server end.
In the fortieth step, the binary string 110001010110111110 at the server end is converted into hexadecimal, and the password at the server end is 315be.
Step forty, determining whether the server-side password 315be is consistent with a preset password preset at the server side:
the login is passed because the server password 315be is consistent with the preset password 315be associated with the preset account preset at the server.
In a preferred embodiment of the present invention, in the second generating module, the method for combining the obtained login security account with the generated account QR code to obtain the account combination code thereof includes the following steps:
s51, converting the login safety account number into a login safety account number binary system;
s52, judging the relationship between the total number of digits of the binary system of the login safety account and the total number of black units in the QR code of the account:
Figure BDA0003088639720000111
wherein,' x represents the total number of digits of the binary system of the login safety account;
y represents the total number of black units in the QR code of the account;
if represents the condition if;
z represents a set of all integers;
int [ ] represents a rounding function;
"z represents the total number of account number QR codes;
s53, if 'z is larger than or equal to 2, sequentially connecting' z account QR codes from left to right to obtain account QR connecting codes; if' z =1, only one account QR code is available, and the account QR code is an account QR connection code; the method comprises the steps of sequentially coding a black unit and a white unit in a QR (quick response) link code of an account from left to right and from top to bottom, wherein the black unit and the white unit are respectively a unit 1, a unit 2, a unit 3, a unit 8230a 8230, a unit A ' = ' Z x ' alpha 2 Wherein,' alpha represents the size of the account QR code;
s54, encoding characters in a binary system of the login safety account according to a sequence from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, and the y-th character of the account; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the' y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the ' y ' character of the account to a ' y arrangement code in sequence;
s55, extracting the arrangement code mapped by the character corresponding to the 'y' th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of the unmapped characters before the cut-off codes;
s56, writing a line according to characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, the cut-off code respectively to obtain a binary character string;
and S57, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
In a preferred embodiment of the present invention, in the second generation module, the method for combining the obtained security password with the generated password QR code to obtain the password combination code thereof includes the following steps:
s151, converting the security password into a security password binary system;
s152, judging the relation between the total number of the binary digits of the security password and the total number of the black units in the password QR code:
Figure BDA0003088639720000121
wherein x' represents the total number of bits of the secure password binary;
y' represents the total number of black cells in the password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z' represents the total number of the password QR codes;
s153, if z 'is not less than 2, connecting the z' password QR codes in sequence from left to right to obtain the password QR connecting codes; if z' =1, only one password QR code exists, and the password QR code is a password QR connecting code; the black units and the white units in the QR code connecting code are sequentially coded from left to right and from top to bottom, namely the 1 st unit, the 2 nd unit, the 3 rd unit, \8230 \ 8230;, the A 'th unit, A' = z '× alpha' 2 Wherein α' represents the size of the password QR code;
s154, encoding the characters in the binary system of the security password from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the y' th character of the password respectively; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the first y 'of the password arrangement codes to obtain the y' password arrangement codes; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the password, \8230;, and the y 'th character of the password to a y' password arrangement code in sequence;
s155, extracting a password permutation code mapped by the character corresponding to the y' th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s156, writing a line according to characters mapped by the unit 1, the unit 2, the unit 3, \8230; \ 8230;, the password cut-off code respectively to obtain a binary character string;
and S157, converting the binary character string into a hexadecimal character string to obtain the password combination code.
In a preferred embodiment of the present invention, a method for a server to verify correctness of an account number binding code includes the following steps:
s51, the server side converts the received account number combination codes into binary account number combination codes; generating a QR code of the server-side account by using the received safe account;
s52, judging the relation between the total digits of the binary account number combination code and the total number of black units and white units in the QR code of the server-side account number:
Figure BDA0003088639720000131
wherein, the' K represents the total digits of the binary account number combination code;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
the number of server-side account number QR codes is represented as 'J';
s53, if 'J is larger than or equal to 2, sequentially connecting the QR codes of the' J server-side accounts from left to right to obtain the QR connecting codes of the server-side accounts; if' J =1, only one server-side account QR code is available, and the server-side account QR code is a server-side account QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of a server side account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, a 8230a V unit and a V unit, and V = ' J × ' delta ' unit 2 The method comprises the following steps that a 'delta' represents the size of a QR code of a server-side account;
s54, encoding characters in the binary account number binding code from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the K-th character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the account, wherein the characters are 8230, and the characters corresponding to the K th character of the account are sequentially mapped to the 1 st unit, the 2 nd unit, the 3 rd unit, the 8230, the 8230and the K th unit;
s55, extracting 1 st unit, 2 nd unit, 3 rd unit, \8230 \ 8230 `, and encoding of black unit in K unit;
s56, arranging the extracted codes of the black units in a sequence from small to large, and writing characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s57, converting the binary character string of the server side into a binary system which is the same as the binary system of the login safety account in the step S2 to obtain the server side account of the server side; in the present embodiment, the present invention further includes:
executing the following operations on the server account:
`Loginsecuritynumber=sha[[``Loginsecuritynumber]],
wherein sha [ ] ] represents a security algorithm;
' Loginsecuritynumber represents a server side account;
"loginstecurynyumber represents an account security value;
judging whether the account security value' Locinecuritynumber is consistent with the received security account or not:
if the account security value' logins is consistent with the received secured account, step S158 is executed;
if the account security value' logins is inconsistent with the received security account, the process returns to step S151, and if the number of returns reaches the threshold value of the number of returns of the account, the login is not passed.
S58, judging whether the account number of the server side is consistent with a preset account number preset at the server side:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server-side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
if the server side account number is inconsistent with a preset account number preset at the server side, the login is not passed.
In a preferred embodiment of the present invention, the method for calculating the server-side password comprises the following steps:
s1581, the server side converts the received password combination code into a binary password combination code; generating a server-side password (QR) code by using the received login security password;
s1582, judging the relationship between the total digits of the binary password combination code and the total number of the black units and the white units in the QR code at the server side:
Figure BDA0003088639720000141
wherein K' represents the total number of bits of the binary cipher code;
l' represents the total number of black units and white units in the QR code of the server;
if represents the condition if;
z represents a set of all integers;
int [ ] represents the rounding function;
j' represents the total number of the QR codes of the server-side password;
s1583, if J 'is not less than 2, sequentially connecting the J' server-side password QR codes from left to right to obtain server-side password QR connecting codes; if J' =1, only one server-side password QR code exists, and the server-side password QR code is the server-side password QR connecting code; the black units and the white units in the server-side password QR connecting code are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, \8230 \ 8230' 2 Wherein δ' represents the size of the server-side password QR code;
s1584, coding the characters in the binary password combination code from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, 8230, 8230and the K' th character of the password respectively; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the password, \8230;, and the K 'th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, and the K' th unit in sequence;
s1585, extracting codes of black units in a unit 1, a unit 2, a unit 3, \8230; and a unit K';
s1586, arranging the extracted codes of the black units in a descending order, writing characters mapped by the arranged codes of the black units into lines, and obtaining a server-side binary character string;
s1587, the server side binary character string is converted into the server side binary character string which is the same as the security password system in the step S13, and the server side password is obtained.
For example, in the first step, the login account input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.com.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account;
Figure BDA0003088639720000142
in the present embodiment, the safety algorithm sha [, ]]]The MD5 algorithm is adopted to obtain a 32-bit lower-case 16-system numerical value.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088639720000151
fourthly, an account QR code is generated for the obtained secured account 188f3647551830c11fbd2d43563f1867, as shown in fig. 2.
<xnotran> , 315be36db8ad7b3e3a7bb0839d6fa839 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001. </xnotran>
<xnotran> , 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 QR : </xnotran>
Due to the fact that
Figure BDA0003088639720000152
Thus, the device
Figure BDA0003088639720000153
Seventhly, because' z =1, the account QR code is an account QR connection code, as shown in fig. 2; if' z =2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 3; if' z =4, sequentially connecting the QR codes of the 4 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 4.
Eighthly, coding the black unit and the white unit in the account QR connection code shown in fig. 2 from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, the unit 8230the unit 8230, the unit 841, and the account QR code has the size of 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 12 th, 14 th, 18 th, 19 th, 23 th, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the first behavior example is taken in the ninth step, 1 to 18 bits of the binary system of the secured account number, that is, 110001010110111110, the corresponding hexadecimal system thereof is 315be, and 315be is taken as the preset account number stored in the server side).
Tenth, mapping the 8 th unit, the 9 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 15 th unit, the 16 th unit, the 17 th unit, the 20 th unit, the 21 st unit and the 22 nd unit with a character 0; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, the character mapped on the 22 th cell is 0, the character mapped on the 23 th cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
In the tenth step, the characters mapped by the units 1, 2, 3, 8230, 8230and the end codes are written into lines to obtain binary character strings of 11000100000100000110000111110.
The twelfth step, the binary character string 11000100000100000110000111110 is converted into the hexadecimal character string 18820c3e, and the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088639720000161
fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088639720000162
the preset account 188f3647551830c11fbd2d43563f1867 is set at the server side, and the preset password associated with the preset account 188f3647551830c11fbd2d43563f1867 is 188f3647551830c11fbd2d43563f1867 at the server side.
In the fifteenth step, a password QR code is generated for the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 5.
<xnotran> , 188f3647551830c11fbd2d43563f1867 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111. </xnotran>
<xnotran> , 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 QR : </xnotran>
Due to the fact that
Figure BDA0003088639720000163
Thus, the device
Figure BDA0003088639720000164
Eighteenth, since z' =1, the password QR code is a password QR connection code, as shown in fig. 5; if z' =2, sequentially connecting the 2 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 6; if z' =4, sequentially connecting the 4 password QR codes from left to right to obtain the password QR connecting codes; as shown in fig. 7.
Nineteenth step, coding the black unit and the white unit in the code QR connecting code shown in fig. 5 from left to right and from top to bottom in sequence, wherein the coding is respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230;, and the unit 841, and the size of the code QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1. (here, since only the first action example is taken in the twentieth step, 1 to 20 bits of the binary system of the security password, that is, 11000100011110011011, the corresponding hexadecimal system thereof is c479b, and c479b is taken as the preset password associated with the preset account number c479b stored in the server side).
Twenty-first, mapping character 0 to the 8 th, 10 th, 11 th, 13 th, 14 th, 15 th, 17 th, 18 th and 22 th units; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 th cell is 1, the character mapped on the 1 st cell is 0, the 24 th cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the cell is 1, the character mapped on the cell is 0, the character mapped on the 1 th cell is 24 th cell is 0, the character mapped on the cell is 24.
In the twentieth step, the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, \8230 \8230andthe password cut-off code are written into lines to obtain binary character strings of 11000100000000010011100011011.
And the twentieth step, the binary character string 11000100000000010011100011011 is converted into a hexadecimal character string 1880271b, and the password combination code is obtained.
The twenty-fourth step is to send the account combination code 18820c3e, the secured account 188f3647551830c11fbd2d43563f1867, the password combination code 18820c3e and the login secured password 188f3647551830c11fbd2d43563f1867 to the server.
Twenty-fifth step, the account combination code received by the server end is 18820c3e, and the secured account number received by the server end is 188f3647551830c11fbd2d43563f1867;
twenty-sixth step, the server side converts the received account number combination code 18820c3e into binary account number combination code 11000100000100000110000111110; and generating a server-side account QR code from the received secured account 188f3647551830c11fbd2d43563f1867, as shown in fig. 2.
Twenty-seventh step, because
Figure BDA0003088639720000171
Thus, it is possible to provide
Figure BDA0003088639720000172
Twenty-eighth step, because' J =1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 2; if' J =2, sequentially connecting the QR codes of the 2 server-side accounts from left to right to obtain a QR connecting code of the server-side account; as shown in fig. 3; if' J =4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 4.
Twenty-ninth step, coding the black unit and the white unit in the server-side account number QR connection code from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230and the unit 841, and the size of the server-side account number QR code is 29.
Thirty-third step, encoding characters in binary account number combination code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, 8230, 8230and 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 1, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, and the character corresponding to the 15 th character is 0, the 16 th character of the account corresponds to a character 0, the 17 th character of the account corresponds to a character 0, the 18 th character of the account corresponds to a character 1, the 19 th character of the account corresponds to a character 1, the 20 th character of the account corresponds to a character 0, the 21 st character of the account corresponds to a character 0, the 22 nd character of the account corresponds to a character 0, the 23 th character of the account corresponds to a character 0, the 24 th character of the account corresponds to a character 1, the 25 th character of the account corresponds to a character 1, the 26 th character of the account corresponds to a character 1, the 27 th character of the account corresponds to a character 1, the 28 th character of the account corresponds to a character 1, and the 29 th character of the account corresponds to a character 0.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, 8230, 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, 8230, 29 th unit; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain a binary character string of 110001010110111110 at the server end.
And thirty-third step, converting the binary character string 110001010110111110 at the server end into hexadecimal, and obtaining the account number 315be at the server end.
And thirty-fourth step, judging whether the server side account 315be is consistent with a preset account preset at the server side:
calculating a server side password because the server side account 315be is consistent with a preset account 315be preset at the server side;
thirty-fifth step, the server side converts the received password combination code 1880271b into a binary password combination code of 11000100000000010011100011011; and generating a server-side password QR code from the received login security password 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 5.
Thirty-sixth step, because
Figure BDA0003088639720000181
Thus, it is possible to provide
Figure BDA0003088639720000182
Thirty-seventh step, since J' =1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 5; if J' =2, sequentially connecting 2 server-side password QR codes from left to right to obtain server-side password QR connecting codes; as shown in fig. 6; if J' =4, sequentially connecting the 4 server-side password QR codes from left to right to obtain a server-side password QR connection code; as shown in fig. 7.
Thirty-eighth step, coding the black unit and the white unit in the server-side password QR connection code from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230;, and the unit 841, and the size of the server-side password QR code is 29.
Thirty-ninth step, coding characters in binary password combination code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, 8230, 8230and 29 th characters of the password respectively; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 0, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the 16 th character of the password corresponds to a character of 1, the 17 th character of the password corresponds to a character of 0, the 18 th character of the password corresponds to a character of 0, the 19 th character of the password corresponds to a character of 1, the 20 th character of the password corresponds to a character of 1, the 21 st character of the password corresponds to a character of 1, the 22 nd character of the password corresponds to a character of 0, the 23 rd character of the password corresponds to a character of 0, the 24 th character of the password corresponds to a character of 0, the 25 th character of the password corresponds to a character of 1, the 26 th character of the password corresponds to a character of 1, the 27 th character of the password corresponds to a character of 0, the 28 th character of the password corresponds to a character of 1, and the 29 th character of the password corresponds to a character of 1.
Forty steps, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, the 8230, the 8230and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 th cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 1.
Forty-step, writing the characters mapped by the codes of the arranged black units into lines to obtain a binary character string at the server end, namely 11000100011110011011.
Forty-second step, the binary string 11000100011110011011 at the server end is converted into hexadecimal, and the password at the server end is c479b.
And a fortieth step, judging whether the server-side password c479b is consistent with a preset password preset at the server side:
and if the server-side password c479b is consistent with the preset password c479b associated with the preset account preset at the server side, the login is passed.
In a preferred embodiment of the present invention, after the user successfully logs in the server using the mobile phone device, the default display information of the server is displayed on the mobile phone device. The server-side default display information comprises one or any combination of an approval module, a project management module, a personnel management module, an equipment management module, a learning module, an examination module, a data management module, a task information module and a small tool module.
In a preferred embodiment of the present invention, the project management module includes one or any combination of a help module, a project list module, a route calculation module, a new project module, and a project profile module;
the help module is used for providing an operation description of the software system; the item list module is used for displaying all items related to the current user; the line calculation module is used for calculating and displaying input data; the new project module is used for allowing a legal user to add a new project; the item profile module is used for displaying and providing basic information for modifying the selected items in the item list module. When a mobile phone equipment end receives a project management module trigger signal, a help module, a project list module, a line calculation module, a newly-built project module and one, two, three, four or five of project overview modules are displayed on a touch display screen; in the interface state, if the mobile phone equipment end receives a help module trigger signal, displaying an operation instruction of the software system on the touch display screen; if the mobile phone equipment end receives the item list module trigger signal, displaying all items related to the current user on the touch display screen, and sequencing according to the time sequence; when receiving a trigger signal of receiving a certain item, the mobile phone device end displays basic information of the item on the touch display screen, wherein the basic information comprises one or any combination of time when the new item is added, place where the new item is added, title, user ID of adding the new item, item progress and item description. If the mobile phone equipment end receives a line calculation module trigger signal, displaying a calculation result of input data on a touch display screen; if the mobile phone equipment receives a trigger signal of a newly-built project module, judging whether the user has the permission to add a new project, if so, displaying the added new project on a touch display screen, wherein the added new project comprises one or any combination of time for adding the new project, a place where the new project is added, a title and a user ID for adding the new project, and if not, prompting the user, and giving the administrator the permission to add the new project; and if the mobile phone equipment end receives the item profile module trigger signal, displaying and providing basic information for modifying the selected item in the item list module on the touch display screen.
In a preferred embodiment of the present invention, the line calculation module includes one or any combination of a data entry module, a data approval module, a parameter setting module, and a calculation result module;
the data output end of the data input module is connected with the data input end of the data approval module, the data output end of the data approval module is connected with the data input end of the parameter setting module, and the data output end of the parameter setting module is connected with the data input end of the calculation result module;
the data entry module is used for the entry of users with different authorities to the data; the data approval module is used for approving the input data; the parameter setting module is used for setting a recording data format; and the calculation result module is used for displaying the calculation result of the approval process data. Firstly, a parameter setting user sets various parameter information used by the project at a parameter setting module; then, inputting bridge information into a data input module, storing the bridge information on a server, and submitting the bridge information to a data approval personnel through a data approval module; and the data approval personnel check the data uploaded by the parameter setting user in the data approval module, if the data is qualified, the data is submitted to the upper-level data approval personnel through the data approval module, if the data is unqualified, and the corresponding data approval personnel is returned after modification opinions are added.
In a preferred embodiment of the present invention, the personnel management module includes one or any combination of a personnel information module, a user authority module, a personnel allocation module, a project allocation module and a role module;
the personnel information module is used for storing personal information of personnel, and the personal information comprises one or any combination of name, identification card number, contact telephone, age, native place, colleges and universities, academic degrees and working experiences;
the user authority module is used for giving the user the authority to use the corresponding functional module; the personnel allocation module is used for recording personnel allocation process; the project allocation module is used for allocating personnel to each project name; and the role module is used for defining the authority of the user. After the personnel information perfecting user perfects the personal information in the personnel information module, submitting the personnel information perfecting user to review by a personnel information approval user; the personnel information approval user has the administrator authority granted by the role module, and after the personnel information module approves and passes the new personnel information, the information is stored in the server; the personnel transfer user provides a personnel demand plan at the personnel transfer module, the personnel demand examination and approval user examines and approves the demand plan, the examination and approval is given to other personnel transfer users through the initiating personnel transfer plan, after the other personnel transfer users agree, a transfer list is returned to the personnel demand examination and approval user, and finally the initiating plan personnel transfer user reports the actual personnel to the post; the role module is essentially a set of permissions, which facilitates rapid assignment of permissions to users, and administrators can change the roles of other users at the module.
In a preferred embodiment of the present invention, the device management module includes one or any combination of a device management method module, a device information module, and a device allocation module;
the equipment management method module is used for displaying the use and maintenance method of each equipment; the equipment information module is used for displaying various attributes of the item equipment, including one or any combination of type, starting date, checked date and maintenance record; the equipment transferring module is used for transferring the flow of the equipment. An equipment management user uploads a PDF file of 'a total station system item error checking method' in an equipment management method module, measures a method checked by the user in the module, and checks and corrects the total station according to an instruction; the equipment information user inputs new equipment information in the equipment information module, if the equipment information needs to be updated, an equipment information updating approval process needs to be initiated, after the user agrees through the upper-level equipment information, the equipment information is changed, and the system prompts the user to scrap or send for inspection instrument equipment within 3 months in the future according to the latest inspected time and the evaluation age; and initiating equipment requirements in the equipment transferring module by the equipment transferring user, and transferring the required equipment to a requirement plan initiating project after the approval is passed.
In a preferred embodiment of the invention, the learning module comprises a learning material module or/and a rapid self-test module;
the learning materials are used for displaying various learning materials; the quick self-testing module is used for testing knowledge points by a user. The learning material user uploads training materials on the learning material module, the online learning user browses the learning materials online through the module, and after learning is finished, the online learning user can enter the rapid self-testing module to test knowledge proficiency according to the sections selected by the current learning material module.
In a preferred embodiment of the invention, the examination module comprises a question bank module, a test paper module, an examination module and a result analysis module; the question bank module is used for inputting an examination question bank and a self-testing question bank, and the test paper combining module and the rapid self-testing module respectively select test questions from the examination question bank and the self-testing question bank; the examination paper composing module is used for customizing examination range, examination time and reference personnel by a user to perform examination paper drawing and composing; the examination module is used for a reference person to take an examination; and the result analysis module checks the examination result and obtains various analysis results. The question bank input user inputs the test questions in the question bank module singly or in batches and performs necessary editing; the volume user selects 100 items from the level measurement item bank in the volume module, and the examination statement of 18/2021.1.5 comprises users to be tested; the user to be tested timely takes an examination on 18.00 at 2021.1.5, and the result of the examination including total points, correct rate, wrong questions, answering time and the like is checked through the result analysis module; the examination paper user can check examination success rate, average score, error-prone questions and the like through the result analysis module.
In a preferred embodiment of the invention, the task information module comprises one or any combination of a project management approval module, a study task module, an examination task module and an equipment management approval module;
the project management approval module is used for prompting a user about a process to be approved in project management and providing a quick entrance for approval; the learning task module is used for prompting a user to learn a task and providing a learning shortcut entrance; the examination task module is used for prompting the examination task of the user and providing a quick entrance for taking the examination; the equipment management approval module is used for prompting the user equipment management aspect to-be-approved process and providing a quick entrance for approval. The project management user sees that 12 platform data of the Beijing bridge project need to be examined and approved in the project management examination and approval module, the data are examined and approved through a quick entrance, if the data are not wrong, all the users are authorized to use the data, and if the data are wrong, the opinion is returned to the examination and approval initiator; a user to be learned sees the first chapter of leveling needing to be learned in the current month in a learning task, and online learning can be carried out through a quick entrance; the user to be tested sees that the user needs to take a leveling test immediately in the assessment task and can take the test through a quick entrance; and the equipment management user checks the equipment transfer approval process in the equipment management approval module and approves the data through a quick entrance.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (3)

1. An engineering measurement intelligent management control cloud platform comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, and is characterized in that a user logs in the server end by using the mobile phone equipment end, and the mobile phone equipment end comprises an acquisition module, a first safety processing module, a second safety processing module, a first generation module, a second generation module and a sending module;
the data output end of the acquisition module is connected with the data input end of the first safety processing module, the data output first end of the first safety processing module is connected with the data input end of the second safety processing module, the data output second end of the first safety processing module is connected with the data input first end of the first generation module, the data output first end of the second safety processing module is connected with the data input second end of the first generation module, the data output end of the first generation module is connected with the data input first end of the second generation module, the data output second end of the second safety processing module is connected with the data input second end of the second generation module, the data output third end of the first safety processing module is connected with the data input third end of the second generation module, and the data output end of the second generation module is connected with the data input end of the sending module;
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device terminal;
the first security processing module is used for respectively carrying out security processing on the login account and the login password acquired in the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing login security account security processing and login security password security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the method for performing login safety account safety processing on the obtained login safety account to obtain the safety account comprises the following steps:
Figure FDA0004004438550000011
wherein, the first and the second end of the pipe are connected with each other,
Figure FDA0004004438550000012
representing a security algorithm;
loginstecurynyber represents a login security account number;
loginstecurynymber' represents a secured account number;
the method for obtaining the login security password comprises the following steps of performing login security password security processing on the obtained login security password:
Figure FDA0004004438550000021
loginsafetynumber represents a login security password;
loginsafetynumber' represents a security password;
the first generation module is used for generating an account number QR code for the login security account number obtained in the first security processing module and generating a password QR code for the security password obtained in the second security processing module;
the second generation module is used for combining the security account obtained in the second security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the login security password obtained in the first security processing module with the password QR code generated in the first generation module to obtain a password combination code;
the method for obtaining the account number combination code comprises the following steps:
s151, converting the safety account number into a safety account number binary system;
s152, judging the relation between the total binary digit of the safety account number and the total number of black units in the QR code of the account number:
Figure FDA0004004438550000022
wherein x represents the total number of binary digits of the safety account number;
y represents the total number of black units in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z represents the total number of the QR codes of the account;
s153, if z is larger than or equal to 2, sequentially connecting the QR codes of the z accounts from left to right to obtain QR connecting codes of the accounts; if z =1, only one account QR code is available, and the account QR code is an account QR connection code; sequentially encoding black units and white units in the QR connecting code of the account from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, \8230 \ 8230;, an A th unit, A = z × alpha 2 Wherein, alpha represents the size of the QR code of the account;
s154, encoding characters in a binary system of the safety account number from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, and the y character of the account number respectively; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the account, wherein the characters are 8230, and the y-th character of the account are sequentially mapped to a y arrangement code;
s155, extracting the arrangement code mapped by the character corresponding to the y-th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of unmapped characters before the cut-off codes;
s156, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, the cut-off code into lines to obtain a binary character string;
s157, converting the binary character string into a hexadecimal character string to obtain the account number combination code;
the sending module sends the account number combination code and the password combination code obtained in the second generating module of the sending module, and the login safety account number corresponding to the account number combination code and the safety password corresponding to the password combination code to the server side for verification;
or the following steps:
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device end;
the first security processing module is used for respectively performing security processing on the login account and the login password acquired by the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing login security account security processing and login security password security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the method for performing login safety account safety processing on the obtained login safety account comprises the following steps:
Figure FDA0004004438550000031
wherein the content of the first and second substances,
Figure FDA0004004438550000041
representing a security algorithm;
logins securitynumber represents a login secured account number;
loginstecurynyumber' represents a secured account number;
the method for performing login security password security processing on the obtained login security password to obtain the security password comprises the following steps:
Figure FDA0004004438550000042
loginsafetynumber represents a login security password;
loginsafetynumber' represents a security password;
the first generation module is used for generating an account number QR code for the safety account number obtained from the second safety processing module and a password QR code for the login safety password obtained from the first safety processing module;
the second generation module is used for combining the login security account obtained in the first security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the security password obtained in the second security processing module with the password QR code generated in the first generation module to obtain a password combination code;
the method for obtaining the account number combination code comprises the following steps:
s51, converting the login safety account number into a login safety account number binary system;
s52, judging the relationship between the total number of binary digits of the login safety account number and the total number of black units in the QR code of the account number:
Figure FDA0004004438550000043
wherein,' x represents the total number of digits of the binary system of the login safety account;
"y represents the total number of black cells in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z represents the total number of the account number QR codes;
s53, if 'z is larger than or equal to 2, sequentially connecting' z account QR codes from left to right to obtain account QR connecting codes; if' z =1, only one account QR code is available, and the account QR code is an account QR connection code; to account number QRThe black unit and the white unit in the connection code are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, \8230 \ 8230; ' A-th unit, ' A = ' z × ' alpha ' unit 2 The method comprises the following steps that a 'alpha' represents the size of a QR code of an account;
s54, encoding characters in a binary system of the login safety account according to the sequence from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the y th character of the account respectively; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the' y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the ' y ' character of the account to a ' y arrangement code in sequence;
s55, extracting the arrangement code mapped by the character corresponding to the' y th character of the account to obtain a stop code; mapping characters 0 or 1 to other units of the unmapped characters before the cut-off codes;
s56, writing a line according to characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, the cut-off code respectively to obtain a binary character string;
s57, converting the binary character string into a hexadecimal character string to obtain the account number combination code;
and the sending module sends the account number combination code and the password combination code obtained in the second generating module and the login security password corresponding to the security account number and the password combination code corresponding to the account number combination code to the server side for verification of correctness.
2. The cloud platform for engineering measurement intelligent management control as claimed in claim 1, wherein the first security processing module performs security processing on the obtained login account to obtain a login security account according to a method comprising:
Figure FDA0004004438550000051
wherein Locinecuritynumber represents a login security account;
the method for carrying out login password security processing on the obtained login password to obtain the login security password comprises the following steps:
Figure FDA0004004438550000061
security number represents a login password;
loginsafetynumber represents a login security password;
Figure FDA0004004438550000062
representing a security algorithm;
securitynumber denotes a login account.
3. The cloud platform for engineering measurement intelligent management control as claimed in claim 1, wherein the second generation module combines the obtained login security password with the generated password QR code to obtain the password combination code thereof, and the method comprises the following steps:
s-151, converting the login security password into a login security password binary system;
s-152, judging the relation between the total digit of the binary system of the login security password and the total number of black units in the password QR code:
Figure FDA0004004438550000063
wherein,' x represents the total number of digits of the login security password binary system;
' y represents the total number of black units in the password QR code;
if represents the condition if;
z represents a set of all integers;
int [ ] represents a rounding function;
"z represents the total number of the cryptographic QR code;
s-153, if the 'z is more than or equal to 2, sequentially connecting the' z password QR codes from left to right to obtain password QR connecting codes thereof; if' z =1, only one password QR code is available, and the password QR code is a password QR connecting code; the black unit and the white unit in the QR code are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, \8230; "A unit," = A = ' zx × "' alpha ' unit 2 Wherein,' α represents the size of the password QR code;
s-154, coding the characters in the login security password binary system according to the sequence from left to right, wherein the characters are respectively the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the Y-th character of the password; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the front Y password permutation codes to obtain the Y password permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the password, \8230; ' y ' character of the password to the ' y password arrangement code in sequence;
s-155, extracting the password arrangement code mapped by the character corresponding to the Y-th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s-156, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, the password cut-off code into lines to obtain a binary character string;
and S-157, converting the binary character string into a hexadecimal character string to obtain the password combination code.
CN202110588790.XA 2021-05-28 2021-05-28 Engineering survey intelligent management control cloud platform Active CN113312535B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110588790.XA CN113312535B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110588790.XA CN113312535B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control cloud platform

Publications (2)

Publication Number Publication Date
CN113312535A CN113312535A (en) 2021-08-27
CN113312535B true CN113312535B (en) 2023-02-24

Family

ID=77375651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110588790.XA Active CN113312535B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control cloud platform

Country Status (1)

Country Link
CN (1) CN113312535B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023918A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for uniformly providing login for multiple network services
CN103605950A (en) * 2013-11-25 2014-02-26 广西大学 Method and system for hiding signature in credible two-dimensional code
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login
CN106936803A (en) * 2015-12-31 2017-07-07 亿阳安全技术有限公司 Two-dimensional code scanning certification login method and relevant apparatus
CN109214161A (en) * 2018-05-31 2019-01-15 中国地质大学(武汉) A kind of two-dimension code safe label login system
CN110428036A (en) * 2019-07-11 2019-11-08 深圳市优博讯科技股份有限公司 A kind of generation method of dynamic two-dimension code, system and terminal device
CN110611685A (en) * 2019-10-30 2019-12-24 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition
CN110688644A (en) * 2019-10-09 2020-01-14 重庆市筑智建信息技术有限公司 Method and system for realizing login of BIM system through graphic code

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9438575B2 (en) * 2011-12-22 2016-09-06 Paypal, Inc. Smart phone login using QR code
CN104092542B (en) * 2013-09-11 2016-08-10 腾讯科技(深圳)有限公司 A kind of account login method, Apparatus and system
CN108848057A (en) * 2018-05-04 2018-11-20 浙江大华技术股份有限公司 A kind of method and device of remote secure access
US10764752B1 (en) * 2018-08-21 2020-09-01 HYPR Corp. Secure mobile initiated authentication
CN111026798B (en) * 2019-12-05 2023-07-14 江苏中车城市发展有限公司 Electromechanical equipment database system and control method thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023918A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for uniformly providing login for multiple network services
CN103605950A (en) * 2013-11-25 2014-02-26 广西大学 Method and system for hiding signature in credible two-dimensional code
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login
CN106936803A (en) * 2015-12-31 2017-07-07 亿阳安全技术有限公司 Two-dimensional code scanning certification login method and relevant apparatus
CN109214161A (en) * 2018-05-31 2019-01-15 中国地质大学(武汉) A kind of two-dimension code safe label login system
CN110428036A (en) * 2019-07-11 2019-11-08 深圳市优博讯科技股份有限公司 A kind of generation method of dynamic two-dimension code, system and terminal device
CN110688644A (en) * 2019-10-09 2020-01-14 重庆市筑智建信息技术有限公司 Method and system for realizing login of BIM system through graphic code
CN110611685A (en) * 2019-10-30 2019-12-24 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Review on quick response codes in the field of information security (Analysis of various imperceptibility characteristics on grayscale and binary QR code;V. Ramya 等;《2014 International Conference on Advances in Engineering and Technology (ICAET)》;20150511;1-5 *
基于云技术的QR码安全应用体系研究及系统设计;王俊杰;《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》;20190715(第07期);I138-66 *

Also Published As

Publication number Publication date
CN113312535A (en) 2021-08-27

Similar Documents

Publication Publication Date Title
US9412281B2 (en) Learning system self-optimization
CN113434485B (en) Data quality health degree analysis method and system based on multidimensional analysis technology
CN107959568A (en) A kind of measurement verification calibration digital certificates intelligent generation method and system
US10481970B2 (en) Dynamic cloud deployment and calibration tool
CN106485261A (en) A kind of method and apparatus of image recognition
US20190272764A1 (en) Multidimensional assessment scoring using machine learning
CN107170313A (en) A kind of wechat online simulation examination device and its method
CN112948823A (en) Data leakage risk assessment method
CN112906361A (en) Text data labeling method and device, electronic equipment and storage medium
CN113312535B (en) Engineering survey intelligent management control cloud platform
CN105931093A (en) Product design internet platform
CN109543409B (en) Method, device and equipment for detecting malicious application and training detection model
CN115081016A (en) Log desensitization method and device, electronic equipment and storage medium
CN110060071A (en) Information of real estate verification method, device, equipment and computer readable storage medium
CN110674493B (en) BIM system login verification method and system
CN112486957B (en) Database migration detection method, device, equipment and storage medium
CN113312536B (en) Engineering survey intelligent management control platform
CN113312534B (en) Engineering survey intelligent management platform
CN110717315B (en) System data batch modification method and device, storage medium and electronic equipment
CN104717227B (en) A kind of method and apparatus logging in control update log-on message
CN112085469B (en) Data approval method, device, equipment and storage medium based on vector machine model
CN107944507A (en) Packaging products in boxes error-reporting method and its system
CN111858386A (en) Data testing method and device, computer equipment and storage medium
CN114998070B (en) Immersive digital learning method and system for enterprise digital learning platform
CN112799956B (en) Asset identification capability test method, device and system device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant