CN113312536A - Engineering survey intelligent management control platform - Google Patents

Engineering survey intelligent management control platform Download PDF

Info

Publication number
CN113312536A
CN113312536A CN202110588807.1A CN202110588807A CN113312536A CN 113312536 A CN113312536 A CN 113312536A CN 202110588807 A CN202110588807 A CN 202110588807A CN 113312536 A CN113312536 A CN 113312536A
Authority
CN
China
Prior art keywords
character
account
password
module
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110588807.1A
Other languages
Chinese (zh)
Other versions
CN113312536B (en
Inventor
高兵
徐其学
王玨
王元清
谢先武
吕超武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway 11th Bureau Group Co Ltd
Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd
Original Assignee
China Railway 11th Bureau Group Co Ltd
Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Railway 11th Bureau Group Co Ltd, Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd filed Critical China Railway 11th Bureau Group Co Ltd
Priority to CN202110588807.1A priority Critical patent/CN113312536B/en
Publication of CN113312536A publication Critical patent/CN113312536A/en
Application granted granted Critical
Publication of CN113312536B publication Critical patent/CN113312536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Mining & Analysis (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an engineering measurement intelligent management control platform which comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, wherein when a user successfully logs in the server end by using the mobile phone equipment end, default display information of the server end is displayed on the mobile phone equipment end. The invention can safely log in the intelligent platform and inquire the data on the platform.

Description

Engineering survey intelligent management control platform
Technical Field
The invention relates to the technical field of engineering, in particular to an engineering measurement intelligent management control platform.
Background
With the rapid development of national railway infrastructure, urban rail transit, river-crossing tunnels and the like, a series of tunnel engineering construction of urban tunnels, underground railways, underwater tunnels and the like also comes to the high tide. Patent application No. 2020110515724 entitled "a method, apparatus and system for device login", discloses a method comprising sending a token request to a security device, the token request carrying a user name and authentication information for logging in the security device; receiving a login token sent by the security device, wherein the login token is sent by the security device after the security device successfully verifies the security cloud platform based on the user name and verification information; and sending a login request to the security equipment, wherein the login request carries the login token, so that the security equipment logs in a management interface of the security equipment by using the user name and a login password corresponding to the user name after the received login token is verified by the security equipment. Therefore, even if the security device modifies the login password, the cloud security platform can accurately log in the management interface.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides an engineering measurement intelligent management control platform.
In order to achieve the above object, the invention provides an engineering measurement intelligent management control platform, which comprises a mobile phone device end and a server end capable of realizing wireless communication with the mobile phone device end, wherein when a user successfully logs in the server end by using the mobile phone device end, default display information of the server end is displayed on the mobile phone device end.
The invention also discloses a working method of the engineering measurement intelligent management control platform, which comprises the following steps:
s1, the user logs in the server by the mobile phone device;
and S2, after the user successfully logs in the server by using the mobile phone device, inquiring and displaying the data of the server.
In conclusion, by adopting the technical scheme, the intelligent platform can safely log in the intelligent platform and inquire data on the intelligent platform.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic diagram of the connection of the present invention.
Fig. 2 is a schematic diagram of a QR code of an account according to the present invention.
Fig. 3 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 4 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 5 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 6 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 7 is a schematic diagram of a QR connection code of an account according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention discloses an engineering measurement intelligent management control platform, which comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, wherein when a user successfully logs in the server end by using the mobile phone equipment end, default display information of the server end is displayed on the mobile phone equipment end, as shown in figure 1.
In a preferred embodiment of the present invention, the server-side default display information includes one or any combination of an approval module, a project management module, a personnel management module, an equipment management module, a learning module, an assessment module, a data management module, a task information module, and a gadget module.
In a preferred embodiment of the present invention, the project management module includes one or any combination of a help module, a project list module, a route calculation module, a new project module, and a project profile module;
the help module is used for providing an operation description of the software system; the item list module is used for displaying all items related to the current user; the line calculation module is used for calculating and displaying input data; the new project module is used for allowing a legal user to add a new project; the item profile module is used for displaying and providing basic information for modifying the selected items in the item list module. When the mobile phone equipment end receives a trigger signal of the project management module, displaying a help module, a project list module, a route calculation module, a newly-built project module and one, two, three, four or five of project profile modules on a touch display screen; in the interface state, if the mobile phone equipment end receives a help module trigger signal, displaying an operation instruction of the software system on the touch display screen; if the mobile phone equipment end receives the item list module trigger signal, displaying all items related to the current user on the touch display screen, and sequencing according to the time sequence; when the mobile phone equipment end receives a trigger signal of receiving a certain item, basic information of the item is displayed on the touch display screen, and the basic information comprises one or any combination of time for adding a new item, a place where the new item is added, a title, a user ID for adding the new item, an item progress and an item description. If the mobile phone equipment end receives a line calculation module trigger signal, displaying a calculation result of input data on the touch display screen; if the mobile phone equipment receives a new project module trigger signal, judging whether the user has the permission to add a new project, if so, displaying the added new project on a touch display screen, wherein the added new project comprises one or any combination of time for adding the new project, a place where the new project is added, a title and a user ID for adding the new project, and if not, prompting the user, and giving the administrator the permission to add the new project; and if the mobile phone equipment end receives the item profile module trigger signal, displaying and providing basic information for modifying the selected item in the item list module on the touch display screen.
In a preferred embodiment of the present invention, the line calculation module includes one or any combination of a data entry module, a data approval module, a parameter setting module, and a calculation result module;
the data output end of the data input module is connected with the data input end of the data approval module, the data output end of the data approval module is connected with the data input end of the parameter setting module, and the data output end of the parameter setting module is connected with the data input end of the calculation result module;
the data entry module is used for the entry of users with different authorities to the data; the data approval module is used for approving the input data; the parameter setting module is used for setting the format of the input data; and the calculation result module is used for displaying the calculation result of the approval process data. Firstly, a parameter setting user sets various parameter information used by the project at a parameter setting module; then, the bridge information is input into the data input module, stored on the server and submitted to a data approval person through the data approval module; and the data approval personnel check the data uploaded by the parameter setting user in the data approval module, if the data is qualified, the data is submitted to the upper-level data approval personnel through the data approval module, if the data is unqualified, and the corresponding data approval personnel is returned after modification opinions are added.
In a preferred embodiment of the present invention, the personnel management module includes one or any combination of a personnel information module, a user authority module, a personnel allocation module, a project allocation module and a role module;
the personnel information module is used for storing personal information of personnel, and comprises one or any combination of name, identification card number, contact telephone, age, native place, college and university, academic degree and work experience;
the user authority module is used for giving the user the authority to use the corresponding functional module; the personnel allocation module is used for recording personnel allocation process; the project allocation module is used for allocating personnel to each project name; and the role module is used for defining the authority of the user. After the personnel information perfecting user perfects the personal information in the personnel information module, submitting the personal information to the personnel information examination and approval user for examination and approval; the personnel information approval user has the administrator authority granted by the role module, and after the personnel information module approves and passes the new personnel information, the information is stored in the server; the personnel transfer user provides a personnel demand plan at the personnel transfer module, the personnel demand examination and approval user examines and approves the demand plan, the examination and approval is given to other personnel transfer users through the initiating personnel transfer plan, after the other personnel transfer users agree, a transfer list is returned to the personnel demand examination and approval user, and finally the initiating plan personnel transfer user reports the actual personnel to the post; the role module is essentially a set of permissions, which facilitates rapid assignment of permissions to users, and administrators can change the roles of other users at the module.
In a preferred embodiment of the present invention, the device management module includes one or any combination of a device management method module, a device information module, and a device allocation module;
the equipment management method module is used for displaying the use and maintenance method of each equipment; the equipment information module is used for displaying various attributes of the item equipment, including one or any combination of type, starting date, checked date and maintenance record; the equipment transferring module is used for transferring the flow of the equipment. An equipment management user uploads a PDF file of 'a total station system item error checking method' in an equipment management method module, measures a method checked by the user in the module, and checks and corrects the total station according to an instruction; the equipment information user inputs new equipment information in the equipment information module, if the equipment information needs to be updated, an equipment information updating approval process needs to be initiated, after the approval of the upper-level equipment information user, the equipment information is changed, and the system prompts the user to scrap or send for inspection instrument equipment within 3 months in the future according to the latest inspected time and the appraisal age; and initiating equipment requirements in the equipment transferring module by the equipment transferring user, and transferring the required equipment to a requirement plan initiating project after the approval is passed.
In a preferred embodiment of the invention, the learning module comprises a learning material module or/and a quick self-test module;
the learning materials are used for displaying various learning materials; the quick self-testing module is used for testing the knowledge points by the user. The learning material user uploads training materials on the learning material module, the online learning user browses the learning materials online through the module, and after learning is finished, the online learning user can enter the rapid self-testing module to test knowledge proficiency according to the sections selected by the current learning material module.
In a preferred embodiment of the invention, the examination module comprises an question bank module, a test paper module, an examination module and a result analysis module; the question bank module is used for inputting an examination question bank and a self-testing question bank, and the test paper combining module and the rapid self-testing module respectively select test questions from the examination question bank and the self-testing question bank; the examination paper combining module is used for customizing examination ranges, examination time and reference personnel by a user to extract questions and combine papers; the examination module is used for a reference person to take an examination; and the result analysis module checks the examination result and obtains various analysis results. The question bank input user inputs the test questions in the question bank module singly or in batches and performs necessary editing; the group volume user selects 100 questions from the level measurement question bank in the group volume module, and the 18:00 assessment statement at 2021.1.5 shows that the users to be tested exist; a user to be tested takes an examination at 2021.1.5 days 18:00 on time, and the result of the examination including total score, correct rate, wrong question, answer time and the like is checked through the result analysis module; the examination paper user can check examination success rate, average score, error-prone questions and the like through the result analysis module.
In a preferred embodiment of the invention, the task information module comprises one or any combination of a project management approval module, a learning task module, an assessment task module and an equipment management approval module;
the project management approval module is used for prompting a user about a process to be approved in project management and providing a quick entrance for approval; the learning task module is used for prompting a user to learn a task and providing a learning shortcut entrance; the examination task module is used for prompting the examination task of the user and providing a quick entrance for taking an examination; the equipment management approval module is used for prompting the user equipment management aspect to-be-approved process and providing a quick entrance for approval. The project management user sees that 12 platform data of the Beijing bridge project need to be examined and approved in the project management examination and approval module, the data are examined and approved through a quick entrance, if the data are not wrong, all the users are authorized to use the data, and if the data are wrong, the opinion is returned to the examination and approval initiator; a user to be learned sees the first chapter of leveling needing to be learned in the current month in a learning task, and online learning can be carried out through a quick entrance; the user to be tested can immediately take a leveling test after seeing the examination task and can take the test through a quick entrance; and the equipment management user checks the equipment transfer approval process in the equipment management approval module and approves the data through a quick entrance.
The invention also discloses a working method of the engineering measurement intelligent management control platform, which comprises the following steps:
s1, the user logs in the server by the mobile phone device;
and S2, after the user successfully logs in the server by using the mobile phone device, inquiring and displaying the data of the server.
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, acquiring the input login account and login password at the mobile phone device end;
s12, respectively carrying out security processing on the login account or/and the login password acquired in the step S11 to obtain a login security account or/and a login security password;
s13, respectively carrying out security processing on the login security account or/and the login security password obtained in the step S12 to obtain the security account or/and the security password;
s14, respectively generating an account number QR code or/and a password QR code for the login security account number or/and the login security password obtained in the step S12;
s15, combining the secured account obtained in the step S13 with the QR code of the account generated in the step S14 to obtain an account combination code; or/and combining the security password obtained in the step S13 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the account combination code or/and the password combination code obtained in the step S15 and the login security account corresponding to the account combination code or/and the login security password corresponding to the password combination code to a server side for verification.
The method comprises the steps of aiming at a login account only, a login password only, a login account and a login password; for login account only: the step S1 includes the following steps:
s11, acquiring the input login account and login password at the mobile phone device end;
s12, performing login account security processing on the login account acquired in the step S11 to obtain a login security account;
s13, performing login safe account safety processing on the login safe account obtained in the step S12 to obtain the safe account;
s14, generating an account number QR code for the login safe account number obtained in the step S12;
s15, combining the secured account obtained in the step S13 with the QR code of the account generated in the step S14 to obtain an account combination code;
and S16, sending the account combination code obtained in the step S15, the input login password and the login safe account corresponding to the account combination code to a server side for verification.
Only for the login password: the step S1 includes the following steps:
s11, acquiring the input login account and login password at the mobile phone device end;
s12, carrying out login password security processing on the login password obtained in the step S11 to obtain a login security password;
s13, carrying out login security password security processing on the login security password obtained in the step S12 to obtain a security password;
s14, generating a password (QR) code for the login security password obtained in the step S12;
s15, combining the security password obtained in the step S13 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the password combination code obtained in the step S15 and the login security password corresponding to the input login account and the password combination code to a server side for verification.
For the login account and the login password: the step S1 includes the following steps:
s11, acquiring the input login account and login password at the mobile phone device end;
s12, respectively carrying out security processing on the login account and the login password acquired in the step S11 to obtain a login security account and a login security password;
s13, respectively carrying out security processing on the login security account and the login security password obtained in the step S12 to obtain the security account and the security password;
s14, respectively generating an account QR code and a password QR code for the login security account and the login security password obtained in the step S12;
s15, combining the secured account obtained in the step S13 with the QR code of the account generated in the step S14 to obtain an account combination code; combining the security password obtained in the step S13 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the account combination code and the password combination code obtained in the step S15, and the login security account corresponding to the account combination code and the login security password corresponding to the password combination code to a server side for verification.
In a preferred embodiment of the present invention, in step S12, the method for performing login account security processing on the acquired login account to obtain a login security account includes:
Loginsecuritynumber=sha[[securitynumber]],
wherein sha [ ] ] represents a security algorithm;
securitynumber represents a login account;
logins securitynumber represents a login secured account number;
the method for carrying out login password security processing on the obtained login password to obtain the login security password comprises the following steps:
Loginsafetynumber=sha[[safetynumber[[,
security number represents a login password;
loginsafetynumber denotes a login security password.
In a preferred embodiment of the present invention, in step S13, the method for performing a secure process on the obtained login secured account to obtain the secured account thereof includes:
Loginsecuritynumber′=sha[[Loginsecuritynumber]],
wherein sha [ ] ] represents a security algorithm;
logins securitynumber represents a login secured account number;
loginstecurynymber' represents a secured account number;
the method for performing login security password security processing on the obtained login security password to obtain the security password comprises the following steps:
Loginsafetynumber′=sha[[Loginsafetynumber]],
loginsafetynumber represents a login security password;
loginsafetynumber' denotes a security password.
In a preferred embodiment of the present invention, in step S15, the method for combining the obtained secured account with the generated account QR code to obtain the account combination code thereof includes the following steps:
s151, converting the safety account number into a safety account number binary system;
s152, judging the relationship between the total number of binary digits of the safety account and the total number of black units in the QR code of the account:
Figure BDA0003088642520000051
wherein x represents the total number of binary digits of the safety account number;
y represents the total number of black units in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z represents the total number of the QR codes of the account;
s153, if z is larger than or equal to 2, sequentially connecting the QR codes of the z accounts from left to right to obtain QR connecting codes of the accounts; if z is 1, only one account QR code is available, and the account QR code is an account QR connection code; black units and white units in the QR connecting code of the account are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an A-th unit, wherein A is z multiplied by alpha2Wherein, alpha represents the size of the QR code of the account;
s154, encoding characters in a binary system of the safety account number from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account number respectively; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account to a y arrangement code in sequence;
s155, extracting the arrangement code mapped by the character corresponding to the y-th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of unmapped characters before the cut-off codes;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into lines to obtain binary character strings;
and S157, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
In a preferred embodiment of the present invention, in step S15, the method for combining the obtained security password with the generated password QR code to obtain the password combination code thereof includes the following steps:
s151, converting the security password into a security password binary system;
s152, judging the relation between the total number of the binary digits of the security password and the total number of the black units in the password QR code:
Figure BDA0003088642520000052
wherein x' represents the total number of bits of the secure password binary;
y' represents the total number of black cells in the password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z' represents the total number of the password QR codes;
s153, if z 'is not less than 2, connecting the z' password QR codes from left to right in sequence to obtain the password QR connecting codes; if z' is 1, only one password QR code is available, and the password QR code is the password QR connecting code; black cells and white cells in the QR code concatenated code are sequentially encoded from left to right and from top to bottom as 1 st cell, 2 nd cell, 3 rd cell, … …, and a 'th cell, where a' is z 'x α'2Wherein α' represents the size of the password QR code;
s154, encoding the characters in the binary system of the security password from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the y' th character of the password respectively; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the first y 'of the password arrangement codes to obtain the y' password arrangement codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the y 'th character of the password to a y' password permutation code in sequence;
s155, extracting the password permutation code mapped by the character corresponding to the y' th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the password cut-off code into lines to obtain binary character strings;
and S157, converting the binary character string into a hexadecimal character string to obtain the password combination code.
In a preferred embodiment of the present invention, in step S15, the method for the server to verify the correctness of the account number binding code includes the following steps:
s151, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received login security account;
s152, judging the relation between the total digits of the binary account number combination code and the total number of black units and white units in the QR code of the server-side account number:
Figure BDA0003088642520000061
wherein K represents the total digits of the binary account number binding codes;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
j represents the total number of the QR codes of the server-side account;
s153, if J is larger than or equal to 2, sequentially connecting the QR codes of the J server-side accounts from left to right to obtain a QR connecting code of the server-side account; if J is 1, only one server-side account number QR code is available, and the server-side account number QR code is the server-side account number QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of the server-side account from left to right and from top to bottom, wherein the black units and the white units are respectively a No. 1 unit, a No. 2 unit, a No. 3 unit, … … unit and a No. V unit, and V is J multiplied by delta2Wherein δ represents a server side accountSize of number QR code;
s154, encoding characters in the binary account number binding code from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the Kth character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the Kth character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the Kth unit in sequence;
s155, extracting codes of black cells in the 1 st cell, the 2 nd cell, the 3 rd cell, … … and the K th cell;
s156, arranging the extracted codes of the black units in a sequence from small to large, and writing characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s157, converting the server binary character string into the binary string which is the same as the safety account number in the step S13, and obtaining the server account number;
s158, determining whether the server account is consistent with a preset account preset at the server:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
In a preferred embodiment of the present invention, in step S158, the method for calculating the server-side password comprises the following steps:
s1581, the server side converts the received password combination code into a binary password combination code; generating a server-side password (QR) code from the received login security password;
s1582, judging the relation between the total digits of the binary password combination code and the total number of black units and white units in the server-side password QR code:
Figure BDA0003088642520000071
wherein K' represents the total number of bits of the binary cipher code;
l' represents the total number of black units and white units in the server-side password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
j' represents the total number of the server-side password QR codes;
s1583, if J 'is not less than 2, sequentially connecting the J' server-side password QR codes from left to right to obtain server-side password QR connecting codes; if J' is 1, only one server-side password QR code is available, and the server-side password QR code is the server-side password QR connecting code; black cells and white cells in the server-side password QR connection code are encoded in order from left to right and from top to bottom, i.e., the 1 st cell, the 2 nd cell, the 3 rd cell, … …, and the V 'th cell, and V' is J '× δ'2Wherein δ' represents the size of the server-side password QR code;
s1584, coding the characters in the binary password combination code from left to right, wherein the characters are respectively a password 1 st character, a password 2 nd character, a password 3 rd character, … … and a password K' th character; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the K 'th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the K' th unit in sequence;
s1585, extracting codes of black units in the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the K' th unit;
s1586, arranging the extracted codes of the black units in a descending order, writing characters mapped by the arranged codes of the black units into lines, and obtaining a server-side binary character string;
s1587, the server side binary character string is converted into the security password system which is the same as the security password system in the step S13, and the server side password is obtained.
For example, in the first step, the login account number input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account of the input login account;
Figure BDA0003088642520000072
in the embodiment, the safety algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower-case 16-system numerical values thereof.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088642520000073
fourthly, an account QR code is generated for the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Fifthly, the secured account number 188f3647551830c11fbd2d43563f1867 is converted into a secured account binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111.
Sixthly, judging the relationship between the total digits of the binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 of the safety account number and the total number of black cells in the QR code of the account number:
due to the fact that
Figure BDA0003088642520000081
Thus, it is possible to provide
Figure BDA0003088642520000082
Seventhly, because z is 1, the account QR code is an account QR connection code, as shown in fig. 2; if z is 2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 3; if z is 4, sequentially connecting the QR codes of the 4 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 4.
Eighthly, coding black units and white units in the account QR connection code shown in fig. 2 from left to right and from top to bottom in sequence, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit in sequence, and the size of the account QR code is 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 9 th, 12 th, 16 th, 19 th, 20 th, 21 st, 23 rd, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, the character mapped on cell 29 is 1. (here, since only the first behavior example is taken in the ninth step, 1 to 20 bits of the binary system of the secured account number, that is, 11000100011110011011, whose corresponding hexadecimal is c479b, and c479b is taken as the preset account number stored in the server).
Step ten, mapping the characters 0 to the 8 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 14 th unit, the 15 th unit, the 17 th unit, the 18 th unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1.
The eleventh step, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into a line to obtain a binary character string 11000100000000010011100011011.
In the twelfth step, the binary string 11000100000000010011100011011 is converted into hexadecimal string 1880271b, i.e. the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088642520000091
fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088642520000092
the server-side preset account is 188f3647551830c11fbd2d43563f1867, and the server-side preset account 188f3647551830c11fbd2d43563f1867 is associated with a preset password of 188f3647551830c11fbd2d43563f 1867.
In the fifteenth step, a password QR code is generated for the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Sixthly, the security code 188f3647551830c11fbd2d43563f1867 is converted into a security code binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111.
Seventeenth step, judging the relationship between the total digits of the security code binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 and the total number of black cells in the code QR code:
due to the fact that
Figure BDA0003088642520000093
Thus, it is possible to provide
Figure BDA0003088642520000094
Eighteenth, because z' is 1, the password QR code is a password QR connection code, as shown in fig. 2; if z' is 2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 3; if z' is 4, sequentially connecting 4 password QR codes from left to right to obtain the password QR connecting code; as shown in fig. 4.
Nineteenth step, coding the black unit and the white unit in the password QR connecting code shown in fig. 2 from left to right and from top to bottom in sequence, which are the 1 st unit, the 2 nd unit, the 3 rd unit, … …, and the 841 rd unit in sequence, respectively, and the size of the password QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, the character mapped on cell 29 is 1. (here, since only the first behavior example is taken in the twentieth step, 1-20 bits of the binary system of the security password, that is, 11000100011110011011, the corresponding hexadecimal system is c479b, and c479b is used as the preset password associated with the preset account c479b stored in the server side).
Twenty-first, mapping character 0 to the 8 th, 10 th, 11 th, 13 th, 14 th, 15 th, 17 th, 18 th and 22 th units; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1.
In the twentieth step, the characters mapped by the units 1, 2, 3, … … and the password cut-off code are written into lines, and the binary string is 11000100000000010011100011011.
And a twentieth step of converting the binary string 11000100000000010011100011011 into a hexadecimal string 1880271b, thereby obtaining the password combination code.
And twenty-fourth step, sending the account combination code 1880271b, the login safe account 315be36db8ad7b3e3a7bb0839d6fa839, the password combination code 1880271b and the login safe password 315be36db8ad7b3e3a7bb0839d6fa839 to the server side.
The twenty-fifth step, the account combination code received by the server is 1880271b, and the login security account received by the server is 315be36db8ad7b3e3a7bb0839d6fa 839;
the twenty-sixth step, the server side converts the received account number binding code 1880271b into a binary account number binding code 11000100000000010011100011011; and generating a server-side account QR code from the received login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Twenty-seventh step, because
Figure BDA0003088642520000101
Thus, it is possible to provide
Figure BDA0003088642520000102
In the twenty-eighth step, since J is 1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 2; if J is 2, sequentially connecting the QR codes of the 2 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 3; if J is 4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 4.
And twenty-ninth step, sequentially coding black units and white units in the server-side account number QR connection code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit … … and a unit 841, and the size of the server-side account number QR code is 29.
Thirty, encoding characters in the binary account number combined code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 0, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, the character corresponding to the 15 th character is 0, the character corresponding to the 16 th character of the account is 1, the character corresponding to the 17 th character is 0, and the character corresponding to the 18 th character is 0, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 1, the character corresponding to the 21 st character of the account is 1, the character corresponding to the 22 th character of the account is 0, the character corresponding to the 23 rd character of the account is 0, the character corresponding to the 24 th character of the account is 0, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 0, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 1.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, the character mapped on cell 29 is 1.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain 11000100011110011011 binary character strings at the server end.
And a thirty-third step, converting the server-side binary string 11000100011110011011 into hexadecimal, and obtaining the server-side account number c479 b.
And thirty-fourth step, judging whether the server side account number c479b is consistent with a preset account number preset at the server side:
calculating a server-side password because the server-side account c479b is consistent with a preset account c479b preset at the server side;
thirty-fifth step, the server side converts the received password combination code 1880271b into a binary password combination code 11000100000000010011100011011; and generating a server-side password QR code from the received login security password 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Thirty-sixth step, because
Figure BDA0003088642520000111
Thus, it is possible to provide
Figure BDA0003088642520000112
Thirty-seventh step, because J' is 1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 2; if J' is 2, sequentially connecting the 2 server-side password QR codes from left to right to obtain a server-side password QR connecting code; as shown in fig. 3; if J' is 4, sequentially connecting the 4 server-side password QR codes from left to right to obtain the server-side password QR connecting codes; as shown in fig. 4.
And thirty-eighth step, sequentially coding the black unit and the white unit in the server-side password QR connecting code from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding the characters in the binary password combination code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 0, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the character corresponding to the 16 th character of the password is 1, the character corresponding to the 17 th character of the password is 0, the character corresponding to the 18 th character is 0, the 19 th character of the password corresponds to the character 1, the 20 th character of the password corresponds to the character 1, the 21 st character of the password corresponds to the character 1, the 22 nd character of the password corresponds to the character 0, the 23 rd character of the password corresponds to the character 0, the 24 th character of the password corresponds to the character 0, the 25 th character of the password corresponds to the character 1, the 26 th character of the password corresponds to the character 1, the 27 th character of the password corresponds to the character 0, the 28 th character of the password corresponds to the character 1, and the 29 th character of the password corresponds to the character 1.
Step forty, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, the character mapped on cell 29 is 1.
And a fortieth step, writing the characters mapped by the codes of the arranged black units into lines to obtain 11000100011110011011 serving as a binary character string.
In the fortieth step, the server-side binary string 11000100011110011011 is converted to hexadecimal, resulting in its server-side password of c479 b.
The forty-third step, judging whether the server password c479b is consistent with the preset password preset at the server:
and if the server-side password c479b is consistent with the preset password c479b associated with the preset account preset at the server side, the login is passed.
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, acquiring the input login account and login password at the mobile phone device end;
s12, respectively carrying out security processing on the login account or/and the login password acquired in the step S11 to obtain a login security account or/and a login security password;
s13, respectively carrying out security processing on the login security account or/and the login security password obtained in the step S12 to obtain the security account or/and the security password;
s14, respectively generating an account number QR code or/and a password QR code for the secured account number or/and the secured password obtained in the step S12;
s15, combining the login safe account obtained in the step S12 with the QR code of the account generated in the step S14 to obtain an account combination code; or/and combining the login security password obtained in the step S12 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the account combination code or/and the password combination code obtained in the step S15 and the safety account corresponding to the account combination code or/and the safety password corresponding to the password combination code to a server side for verification.
The method comprises the steps of aiming at a login account only, a login password only, a login account and a login password; for login account only: the step S1 includes the following steps:
s11, acquiring the input login account and login password at the mobile phone device end;
s12, performing login account security processing on the login account acquired in the step S11 to obtain a login security account;
s13, performing login safe account safety processing on the login safe account obtained in the step S12 to obtain the safe account;
s14, generating an account number QR code for the secured account number obtained in the step S12;
s15, combining the login safe account obtained in the step S12 with the QR code of the account generated in the step S14 to obtain an account combination code;
and S16, sending the account combination code obtained in the step S15, the input password and the safe account corresponding to the account combination code to a server side for verification.
Only for the login password: the step S1 includes the following steps:
s11, acquiring the input login account and login password at the mobile phone device end;
s12, carrying out login password security processing on the login password obtained in the step S11 to obtain a login security password;
s13, carrying out login security password security processing on the login security password obtained in the step S12 to obtain a security password;
s14, generating a password (QR) code for the security password obtained in the step S12;
s15, combining the login security password obtained in the step S12 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the password combination code obtained in the step S15 and the inputted account number and the security password corresponding to the password combination code to a server side for verification.
For the login account and the login password: the step S1 includes the following steps:
the step S1 includes the following steps:
s11, acquiring the input login account and login password at the mobile phone device end;
s12, respectively carrying out security processing on the login account and the login password acquired in the step S11 to obtain a login security account and a login security password;
s13, respectively carrying out security processing on the login security account and the login security password obtained in the step S12 to obtain the security account and the security password;
s14, respectively generating an account QR code and a password QR code for the secured account and the secured password obtained in the step S12;
s15, combining the login safe account obtained in the step S12 with the QR code of the account generated in the step S14 to obtain an account combination code; combining the login security password obtained in the step S12 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the account combination code and the password combination code obtained in the step S15, and the safety account corresponding to the account combination code and the safety password corresponding to the password combination code to a server side for verification.
In a preferred embodiment of the present invention, in step S15, the method for combining the obtained login security account with the generated account QR code to obtain the account combination code thereof includes the following steps:
s151, converting the login safety account number into a login safety account number binary system;
s152, judging the relationship between the total number of digits of the binary system of the login safety account and the total number of black units in the QR code of the account:
Figure BDA0003088642520000131
wherein,' x represents the total number of digits of the binary system of the login safety account;
"y represents the total number of black cells in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"z represents the total number of account number QR codes;
s153, if 'z is larger than or equal to 2, sequentially connecting' z account QR codes from left to right to obtain account QR connecting codes; if' z is 1, only one account QR code is available, and the account QR code is an account QR connection code; sequentially coding black units and white units in the QR connecting code of the account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an A th unit, and A ═ z × "alpha-2Wherein,' alpha represents the size of the account QR code;
s154, encoding characters in a binary system of the login safety account from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the' y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the ' y ' th character of the account to a ' y arrangement code in sequence;
s155, extracting the arrangement code mapped by the character corresponding to the 'y' th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of unmapped characters before the cut-off codes;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into lines to obtain binary character strings;
and S157, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
In a preferred embodiment of the present invention, in step S15, the method for combining the obtained login security password with the generated password QR code to obtain the password combination code thereof includes the steps of:
s151, converting the login security password into a login security password binary system;
s152, judging the relation between the total digits of the login security password binary system and the total number of black units in the password QR code:
Figure BDA0003088642520000141
wherein,' x represents the total number of digits of the login security password binary system;
"y represents the total number of black cells in the password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"z represents the total number of the cryptographic QR code;
s153, if the ' z ' is larger than or equal to 2, sequentially connecting the ' z password QR codes from left to right to obtain password QR connecting codes thereof; if "" z ═ 1If the password is the QR code, only one password QR code is needed, and the password QR code is the password QR connecting code; sequentially coding a black unit and a white unit in the QR code from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a 'A' unit, wherein 'A' -Z '-alpha' is formed2Wherein,' α represents the size of the password QR code;
s154, encoding the characters in the login security password binary system from left to right, wherein the characters are respectively the 1 st character, the 2 nd character, the 3 rd character, … … and the' -y character of the password; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the first Y password permutation codes to obtain the Y password permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the Y th character of the password to the Y password arrangement code in sequence;
s155, extracting the password arrangement code mapped by the character corresponding to the Y-th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the password cut-off code into lines to obtain binary character strings;
and S157, converting the binary character string into a hexadecimal character string to obtain the password combination code.
In a preferred embodiment of the present invention, in step S15, the method for the server to verify the correctness of the account number binding code includes the following steps:
s151, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received safe account;
s152, judging the relation between the total digits of the binary account number combination code and the total number of black units and white units in the QR code of the server-side account number:
Figure BDA0003088642520000142
wherein, the' K represents the total digits of the binary account number combination code;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"J represents the total number of server-side account QR codes;
s153, if 'J is larger than or equal to 2, sequentially connecting the QR codes of the' J server-side accounts from left to right to obtain the QR connecting codes of the server-side accounts; if' J ═ 1, only one server-side account number QR code is present, and the server-side account number QR code is a server-side account number QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of the server-side account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a V th unit, and V is ═ J × "delta ^ respectively2The method comprises the following steps that a 'delta' represents the size of a QR code of a server-side account;
s154, encoding characters in the binary account number binding code from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 'K' character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 'K' character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 'K' unit in sequence;
s155, extracting codes of black units in the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the' K unit;
s156, arranging the extracted codes of the black units in a sequence from small to large, and writing characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s157, converting the server-side binary character string into the binary string which is the same as the login safety account number in the step S12, and obtaining the server-side account number of the server-side binary string; in the present embodiment, the present invention further includes:
executing the following operations on the server account:
`Loginsecuritynumber=sha[[``Loginsecuritynumber]],
wherein sha [ ] ] represents a security algorithm;
"logins churitynumber represents a server-side account number;
locinsecuritynumber represents an account security value;
judging whether the account security value' Loginsecurynymber is consistent with the received security account or not:
if the account security value' logins is consistent with the received secured account, step S158 is executed;
if the account security value' logins is inconsistent with the received security account, the process returns to step S151, and if the number of returns reaches the threshold value of the number of returns of the account, the login is not passed.
S158, determining whether the server account is consistent with a preset account preset at the server:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
In a preferred embodiment of the present invention, in step S158, the method for calculating the server-side password comprises the following steps:
s1581, the server side converts the received password combination code into a binary password combination code; generating a server-side password (QR) code from the received security password;
s1582, judging the relation between the total digits of the binary password combination code and the total number of black units and white units in the server-side password QR code:
Figure BDA0003088642520000151
wherein,' K represents the total number of bits of the binary cipher-code combination code;
the' L represents the total number of black units and white units in the QR code at the server side;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
' J represents the total number of the server-side password QR codes;
s1583, if the ' J ' is larger than or equal to 2, sequentially connecting the ' J server-side password QR codes from left to right to obtain server-side password QR connecting codes; if' J ═ 1, only one server-side password QR code is available, and the server-side password QR code is the server-side password QR connecting code; sequentially coding a black unit and a white unit in the QR connecting code at the server end from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a V th unit, and the V is 'J x' delta2Wherein,' delta represents the size of the server-side password QR code;
s1584, coding the characters in the binary password combination code from left to right, wherein the characters are respectively a password 1 st character, a password 2 nd character, a password 3 rd character, … … and a password K; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the K-th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the K-th unit in sequence;
s1585, extracting the codes of black units in the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 'K' unit;
s1586, arranging the extracted codes of the black units in a descending order, writing characters mapped by the arranged codes of the black units into lines, and obtaining a server-side binary character string;
s1587, the server side binary string is converted into the same as the login security password system in the step S12, and the server side password is obtained. In the present embodiment, the present invention further includes:
the following operations are performed on the server-side password:
`Loginsafetynumber=sha[[``safetynumber]],
wherein sha [ ] ] represents a security algorithm;
"security number represents a server-side password;
"Loginsafetynumber represents a password security value;
judging whether the password security value' Loginsetynumber is consistent with the received security password:
if the password security value' Loginsetynumber is consistent with the received security password, executing to judge whether the password of the server side is consistent with a preset password associated with a preset account preset at the server side;
if the password security value' Loginsafetynumber is inconsistent with the received security password, returning to the step S1581, and if the number of times of returning reaches the password returning set number threshold, failing to log in.
For example, in the first step, the login account number input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account of the input login account;
Figure BDA0003088642520000161
in the present embodiment, the safety algorithm sha [, ]]]The MD5 algorithm is adopted to obtain 32-bit lower case 16-system numerical values.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088642520000162
fourthly, an account QR code is generated for the obtained secured account 188f3647551830c11fbd2d43563f1867, as shown in fig. 5.
Fifth, the login secured account number 315be36db8ad7b3e3a7bb0839d6fa839 is converted into a login secured account number binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001.
Sixthly, judging the relationship between the total digits of the login security account binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 and the total number of black cells in the QR code of the account:
due to the fact that
Figure BDA0003088642520000171
Thus, it is possible to provide
Figure BDA0003088642520000172
Seventhly, because' z is 1, the account QR code is an account QR connection code, as shown in fig. 5; if' z is 2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 6; if' z is 4, sequentially connecting the QR codes of the 4 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 7.
Eighthly, coding the black units and the white units in the account QR connection code shown in fig. 5 from left to right and from top to bottom in sequence, wherein the black units and the white units are respectively the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 841 rd unit, and the size of the account QR code is 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 12 th, 14 th, 18 th, 19 th, 23 th, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the first action example is taken in the ninth step, 1 to 18 bits of the binary system of the secured account number, that is, 110001010110111110, whose corresponding hexadecimal is 315be, and 315be is taken as the preset account number stored in the server).
Tenth, mapping the 8 th unit, the 9 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 15 th unit, the 16 th unit, the 17 th unit, the 20 th unit, the 21 st unit and the 22 nd unit with a character 0; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 nd cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 0, the character mapped on cell 21 is 0, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0.
The eleventh step, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into a line to obtain a binary character string 11000100000100000110000111110.
In the twelfth step, the binary string 11000100000100000110000111110 is converted into hexadecimal string 18820c3e, i.e. the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088642520000181
in the embodiment, the safety algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower-case 16-system numerical values thereof.
Fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088642520000182
in the fifteenth step, a password QR code is generated for the obtained security password 188f3647551830c11fbd2d43563f1867, as shown in fig. 5.
Sixthly, the login security password 315be36db8ad7b3e3a7bb0839d6fa839 is converted into a login security password binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001.
Seventeenth step, judging the relationship between the total digits of the login security password binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 and the total number of black cells in the password QR code:
due to the fact that
Figure BDA0003088642520000183
Thus, it is possible to provide
Figure BDA0003088642520000184
Eighteenth, since "z ═ 1, the password QR code is a password QR concatenated code, as shown in fig. 5; if' z is 2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 6; if' z is 4, sequentially connecting 4 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 7.
Nineteenth step, coding the black unit and the white unit in the password QR code shown in fig. 5 from left to right and from top to bottom in sequence, which are the 1 st unit, the 2 nd unit, the 3 rd unit, … …, and the 841 rd unit in sequence, respectively, and the size of the password QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher code; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the first behavior example is taken in the twentieth step, 1 to 18 bits of the binary system of the security password, that is, 110001010110111110, which corresponds to a hexadecimal number of 315be, and 315be is taken as the preset password stored in the server).
Twenty-first, mapping character 0 to the 8 th, 9 th, 10 th, 11 th, 13 th, 15 th, 16 th, 17 th, 20 th, 21 st and 22 nd units; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 nd cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 0, the character mapped on cell 21 is 0, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0.
In the twenty-second step, the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code are written into a row, and the binary character string is 11000100000100000110000111110.
The twentieth step converts the binary string 11000100000100000110000111110 into hexadecimal string 18820c3e, and obtains the cipher code.
And twenty-fourth step, the account combination code 18820c3e and the secured account 188f3647551830c11fbd2d43563f1867, the password combination code 18820c3e and the login secured password 188f3647551830c11fbd2d43563f1867 are sent to the server side.
The twenty-fifth step, the account combination code received by the server is 18820c3e, and the secured account number received by the server is 188f3647551830c11fbd2d43563f 1867;
the twenty-sixth step, the server side converts the received account number combination code 18820c3e into a binary account number combination code 11000100000100000110000111110; and generating a server-side account QR code from the received secured account 188f3647551830c11fbd2d43563f1867, as shown in fig. 5.
Twenty-seventh step, because
Figure BDA0003088642520000191
Thus, it is possible to provide
Figure BDA0003088642520000192
In the twenty-eighth step, because' J ═ 1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 5; if' J is 2, sequentially connecting the QR codes of the 2 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 6; if' J is 4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 7.
And twenty-ninth step, sequentially coding black units and white units in the server-side account number QR connection code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit … … and a unit 841, and the size of the server-side account number QR code is 29.
Thirty, encoding characters in the binary account number combined code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 1, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, the character corresponding to the 15 th character is 0, the character corresponding to the 16 th character of the account is 0, the character corresponding to the 17 th character is 0, and the character corresponding to the 18 th character is 1, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 0, the character corresponding to the 21 st character of the account is 0, the character corresponding to the 22 th character of the account is 0, the character corresponding to the 23 rd character of the account is 0, the character corresponding to the 24 th character of the account is 1, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 1, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 0.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain 110001010110111110 binary character strings at the server end.
And thirty-third step, converting the server-side binary character string 110001010110111110 into hexadecimal, and obtaining the server-side account number 315 be.
And thirty-fourth step, judging whether the server side account 315be is consistent with a preset account preset at the server side:
calculating a server side password because the server side account 315be is consistent with a preset account 315be preset in the server side;
thirty-fifth step, the server side converts the received password combination code 18820c3e into a binary password combination code 11000100000100000110000111110; and generating a server-side password (QR) code from the received security password 188f3647551830c11fbd2d43563f1867, as shown in FIG. 5.
Thirty-sixth step, because
Figure BDA0003088642520000201
Thus, it is possible to provide
Figure BDA0003088642520000202
Thirty-seventh step, since "J ═ 1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 5; if 'J' is 2, connecting 2 server-side password QR codes from left to right in sequence to obtain a server-side password QR connecting code; as shown in fig. 6; if 'J' is 4, connecting 4 server-side password QR codes from left to right in sequence to obtain server-side password QR connecting codes; as shown in fig. 7.
And thirty-eighth step, sequentially coding the black unit and the white unit in the server-side password QR connecting code from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding the characters in the binary password combination code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 1, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the character corresponding to the 16 th character of the password is 0, the character corresponding to the 17 th character of the password is 0, the character corresponding to the 18 th character is 1, the 19 th character of the password corresponds to the character 1, the 20 th character of the password corresponds to the character 0, the 21 st character of the password corresponds to the character 0, the 22 nd character of the password corresponds to the character 0, the 23 rd character of the password corresponds to the character 0, the 24 th character of the password corresponds to the character 1, the 25 th character of the password corresponds to the character 1, the 26 th character of the password corresponds to the character 1, the 27 th character of the password corresponds to the character 1, the 28 th character of the password corresponds to the character 1, and the 29 th character of the password corresponds to the character 0.
Step forty, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And a fortieth step, writing the characters mapped by the codes of the arranged black units into lines to obtain 110001010110111110 serving as a binary character string.
In the fortieth step, the server side binary string 110001010110111110 is converted into hexadecimal, resulting in a server side password of 315 be.
The forty-third step, determining whether the server password 315be is consistent with a preset password preset at the server:
the login is passed because the server password 315be is consistent with the preset password 315be associated with the preset account preset at the server.
For example, in the first step, the login account number input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account of the input login account;
Figure BDA0003088642520000211
in the embodiment, the safety algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower-case 16-system numerical values thereof.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088642520000212
fourthly, an account QR code is generated for the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Fifthly, the secured account number 188f3647551830c11fbd2d43563f1867 is converted into a secured account binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111.
Sixthly, judging the relationship between the total digits of the binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 of the safety account number and the total number of black cells in the QR code of the account number:
due to the fact that
Figure BDA0003088642520000213
Thus, it is possible to provide
Figure BDA0003088642520000214
Seventhly, because z is 1, the account QR code is an account QR connection code, as shown in fig. 2; if z is 2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 3; if z is 4, sequentially connecting the QR codes of the 4 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 4.
Eighthly, coding black units and white units in the account QR connection code shown in fig. 2 from left to right and from top to bottom in sequence, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit in sequence, and the size of the account QR code is 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 9 th, 12 th, 16 th, 19 th, 20 th, 21 st, 23 rd, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, the character mapped on cell 29 is 1. (here, since only the first behavior example is taken in the ninth step, 1 to 20 bits of the binary system of the secured account number, that is, 11000100011110011011, whose corresponding hexadecimal is c479b, and c479b is taken as the preset account number stored in the server).
Step ten, mapping the characters 0 to the 8 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 14 th unit, the 15 th unit, the 17 th unit, the 18 th unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1.
The eleventh step, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into a line to obtain a binary character string 11000100000000010011100011011.
In the twelfth step, the binary string 11000100000000010011100011011 is converted into hexadecimal string 1880271b, i.e. the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088642520000221
in the embodiment, the safety algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower-case 16-system numerical values thereof.
Fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088642520000222
in the fifteenth step, a password QR code is generated for the obtained security password 188f3647551830c11fbd2d43563f1867, as shown in fig. 5.
Sixthly, the login security password 315be36db8ad7b3e3a7bb0839d6fa839 is converted into a login security password binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001.
Seventeenth step, judging the relationship between the total digits of the login security password binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 and the total number of black cells in the password QR code:
due to the fact that
Figure BDA0003088642520000231
Thus, it is possible to provide
Figure BDA0003088642520000232
Eighteenth, since "z ═ 1, the password QR code is a password QR concatenated code, as shown in fig. 5; if' z is 2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 6; if' z is 4, sequentially connecting 4 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 7.
Nineteenth step, coding the black unit and the white unit in the password QR code shown in fig. 5 from left to right and from top to bottom in sequence, which are the 1 st unit, the 2 nd unit, the 3 rd unit, … …, and the 841 rd unit in sequence, respectively, and the size of the password QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher code; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the first behavior example is taken in the twentieth step, 1 to 18 bits of the binary system of the security password, that is, 110001010110111110, which corresponds to a hexadecimal number of 315be, and 315be is taken as the preset password stored in the server).
Twenty-first, mapping character 0 to the 8 th, 9 th, 10 th, 11 th, 13 th, 15 th, 16 th, 17 th, 20 th, 21 st and 22 nd units; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 nd cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 0, the character mapped on cell 21 is 0, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0.
In the twenty-second step, the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code are written into a row, and the binary character string is 11000100000100000110000111110.
The twentieth step converts the binary string 11000100000100000110000111110 into hexadecimal string 18820c3e, and obtains the cipher code.
And a twenty-fourth step, sending the account combination code 1880271b and the login secured account 315be36db8ad7b3e3a7bb0839d6fa839, the password combination code 18820c3e and the secured password 188f3647551830c11fbd2d43563f1867 to the server side.
The twenty-fifth step, the account combination code received by the server is 1880271b, and the login security account received by the server is 315be36db8ad7b3e3a7bb0839d6fa 839;
the twenty-sixth step, the server side converts the received account number binding code 1880271b into a binary account number binding code 11000100000000010011100011011; and generating a server-side account QR code from the received login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Twenty-seventh step, because
Figure BDA0003088642520000241
Thus, it is possible to provide
Figure BDA0003088642520000242
In the twenty-eighth step, since J is 1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 2; if J is 2, sequentially connecting the QR codes of the 2 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 3; if J is 4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 4.
And twenty-ninth step, sequentially coding black units and white units in the server-side account number QR connection code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit … … and a unit 841, and the size of the server-side account number QR code is 29.
Thirty, encoding characters in the binary account number combined code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 0, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, the character corresponding to the 15 th character is 0, the character corresponding to the 16 th character of the account is 1, the character corresponding to the 17 th character is 0, and the character corresponding to the 18 th character is 0, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 1, the character corresponding to the 21 st character of the account is 1, the character corresponding to the 22 th character of the account is 0, the character corresponding to the 23 rd character of the account is 0, the character corresponding to the 24 th character of the account is 0, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 0, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 1.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, the character mapped on cell 29 is 1.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain 11000100011110011011 binary character strings at the server end.
And a thirty-third step, converting the server-side binary string 11000100011110011011 into hexadecimal, and obtaining the server-side account number c479 b.
And thirty-fourth step, judging whether the server side account number c479b is consistent with a preset account number preset at the server side:
calculating a server-side password because the server-side account c479b is consistent with a preset account c479b preset at the server side;
thirty-fifth step, the server side converts the received password combination code 18820c3e into a binary password combination code 11000100000100000110000111110; and generating a server-side password (QR) code from the received security password 188f3647551830c11fbd2d43563f1867, as shown in FIG. 5.
Thirty-sixth step, because
Figure BDA0003088642520000251
Thus, it is possible to provide
Figure BDA0003088642520000252
Thirty-seventh step, since "J ═ 1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 5; if 'J' is 2, connecting 2 server-side password QR codes from left to right in sequence to obtain a server-side password QR connecting code; as shown in fig. 6; if 'J' is 4, connecting 4 server-side password QR codes from left to right in sequence to obtain server-side password QR connecting codes; as shown in fig. 7.
And thirty-eighth step, sequentially coding the black unit and the white unit in the server-side password QR connecting code from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding the characters in the binary password combination code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 1, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the character corresponding to the 16 th character of the password is 0, the character corresponding to the 17 th character of the password is 0, the character corresponding to the 18 th character is 1, the 19 th character of the password corresponds to the character 1, the 20 th character of the password corresponds to the character 0, the 21 st character of the password corresponds to the character 0, the 22 nd character of the password corresponds to the character 0, the 23 rd character of the password corresponds to the character 0, the 24 th character of the password corresponds to the character 1, the 25 th character of the password corresponds to the character 1, the 26 th character of the password corresponds to the character 1, the 27 th character of the password corresponds to the character 1, the 28 th character of the password corresponds to the character 1, and the 29 th character of the password corresponds to the character 0.
Step forty, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And a fortieth step, writing the characters mapped by the codes of the arranged black units into lines to obtain 110001010110111110 serving as a binary character string.
In the fortieth step, the server side binary string 110001010110111110 is converted into hexadecimal, resulting in a server side password of 315 be.
The forty-third step, determining whether the server password 315be is consistent with a preset password preset at the server:
the login is passed because the server password 315be is consistent with the preset password 315be associated with the preset account preset at the server.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (10)

1. The utility model provides an engineering survey wisdom management control platform, including the cell-phone equipment end and with the cell-phone equipment end can realize wireless communication's server end, its characterized in that, after its user used cell-phone equipment end login server end to succeed, show the display information that server end acquiescence was held on the cell-phone equipment end.
2. The intelligent management control platform for engineering measurement as claimed in claim 1, wherein the default display information at the server includes one or any combination of a project management module, a personnel management module, an equipment management module, a learning module, a data management module, and a task information module.
3. The intelligent management control platform for engineering measurement as claimed in claim 2, wherein the project management module comprises one or any combination of a help module, a project list module, a route calculation module, a new project module, and a project profile module;
the help module is used for providing an operation description of the software system; the item list module is used for displaying all items related to the current user; the line calculation module is used for calculating and displaying input data; the new project module is used for allowing a legal user to add a new project; the item profile module is used for displaying and providing basic information for modifying the selected items in the item list module;
or/and the personnel management module comprises one or any combination of a personnel information module, a user authority module, a personnel allocation module, a project allocation module and a role module;
the personnel information module is used for storing personal information of personnel, and comprises one or any combination of name, identification card number, contact telephone, age, native place, college and university, academic degree and work experience;
the user authority module is used for giving the user the authority to use the corresponding functional module; the personnel allocation module is used for recording personnel allocation process; the project allocation module is used for allocating personnel to each project name; the role module is used for defining the authority of the user;
or/and the equipment management module comprises one or any combination of an equipment management method module, an equipment information module and an equipment allocation module;
the equipment management method module is used for displaying the use and maintenance method of each equipment; the equipment information module is used for displaying various attributes of the item equipment, including one or any combination of type, starting date, checked date and maintenance record; the equipment transferring module is used for transferring the flow of the equipment;
or/and the learning module comprises a learning material module or/and a rapid self-testing module;
the learning materials are used for displaying various learning materials; the quick self-testing module is used for testing knowledge points by a user;
the examination module comprises a question bank module, a test paper module, an examination module and a result analysis module; the question bank module is used for inputting an examination question bank and a self-testing question bank, and the test paper combining module and the rapid self-testing module respectively select test questions from the examination question bank and the self-testing question bank; the examination paper combining module is used for customizing examination ranges, examination time and reference personnel by a user to extract questions and combine papers; the examination module is used for a reference person to take an examination; the result analysis module checks the examination result and obtains various analysis results;
or/and the task information module comprises one or any combination of a project management approval module, a learning task module, an assessment task module and an equipment management approval module;
the project management approval module is used for prompting a user about a process to be approved in project management and providing a quick entrance for approval; the learning task module is used for prompting a user to learn a task and providing a learning shortcut entrance; the examination task module is used for prompting the examination task of the user and providing a quick entrance for taking an examination; the equipment management approval module is used for prompting the user equipment management aspect to-be-approved process and providing a quick entrance for approval.
4. The intelligent management and control platform for engineering measurement according to claim 3, wherein the line calculation module comprises one or any combination of a data entry module, a data approval module, a parameter setting module and a calculation result module;
the data output end of the data input module is connected with the data input end of the data approval module, the data output end of the data approval module is connected with the data input end of the parameter setting module, and the data output end of the parameter setting module is connected with the data input end of the calculation result module;
the data entry module is used for the entry of users with different authorities to the data; the data approval module is used for approving the input data; the parameter setting module is used for setting the format of the input data; and the calculation result module is used for displaying the calculation result of the approval process data.
5. A working method of an engineering measurement intelligent management control platform is characterized by comprising the following steps:
s1, the user logs in the server by the mobile phone device;
and S2, after the user successfully logs in the server by using the mobile phone device, inquiring and displaying the data of the server.
6. The method of claim 5, wherein step S1 includes the following steps:
s11, acquiring the input login account and login password at the mobile phone device end;
s12, respectively carrying out security processing on the login account or/and the login password acquired in the step S11 to obtain a login security account or/and a login security password;
s13, respectively carrying out security processing on the login security account or/and the login security password obtained in the step S12 to obtain the security account or/and the security password;
s14, respectively generating an account number QR code or/and a password QR code for the login security account number or/and the login security password obtained in the step S12;
s15, combining the secured account obtained in the step S13 with the QR code of the account generated in the step S14 to obtain an account combination code; or/and combining the security password obtained in the step S13 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the account combination code or/and the password combination code obtained in the step S15 and the login security account corresponding to the account combination code or/and the login security password corresponding to the password combination code to a server side for verification.
7. The method of claim 6, wherein in step S12, the login account security process is performed on the obtained login account, and the method for obtaining the login security account includes:
Figure FDA0003088642510000031
wherein Locinsecuritynumber represents a login security account;
the method for carrying out login password security processing on the obtained login password to obtain the login security password comprises the following steps:
Figure FDA0003088642510000041
security number represents a login password;
loginsafetynumber denotes a login security password.
8. The method of claim 6, wherein in step S13, the obtained login security account is processed by performing a login security account security process, and the method of obtaining the security account comprises:
Figure FDA0003088642510000042
wherein the content of the first and second substances,
Figure FDA0003088642510000043
representing a security algorithm;
logins securitynumber represents a login secured account number;
loginstecurynymber' represents a secured account number;
the method for performing login security password security processing on the obtained login security password to obtain the security password comprises the following steps:
Figure FDA0003088642510000044
loginsafetynumber represents a login security password;
loginsafetynumber' denotes a security password.
9. The method of claim 6, wherein in step S15, the method of combining the obtained secured account with the generated QR code of the account to obtain the account combination code comprises the following steps:
s151, converting the safety account number into a safety account number binary system;
s152, judging the relationship between the total number of binary digits of the safety account and the total number of black units in the QR code of the account:
Figure FDA0003088642510000045
wherein x represents the total number of binary digits of the safety account number;
y represents the total number of black units in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z represents the total number of the QR codes of the account;
s153, if z is larger than or equal to 2, sequentially connecting the QR codes of the z accounts from left to right to obtain QR connecting codes of the accounts; if z is 1, only one account QR code is available, and the account QR code is an account QR connection code; to account number QRBlack units and white units in the concatenated code are encoded from left to right and from top to bottom, namely unit 1, unit 2, unit 3, unit … … and unit A, where A is z × α2Wherein, alpha represents the size of the QR code of the account;
s154, encoding characters in a binary system of the safety account number from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account number respectively; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account to a y arrangement code in sequence;
s155, extracting the arrangement code mapped by the character corresponding to the y-th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of unmapped characters before the cut-off codes;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into lines to obtain binary character strings;
and S157, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
10. The method of claim 6, wherein in step S15, the method for the server to verify the correctness of the account number binding code comprises the following steps:
s151, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received login security account;
s152, judging the relation between the total digits of the binary account number combination code and the total number of black units and white units in the QR code of the server-side account number:
Figure FDA0003088642510000061
wherein K represents the total digits of the binary account number binding codes;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
j represents the total number of the QR codes of the server-side account;
s153, if J is larger than or equal to 2, sequentially connecting the QR codes of the J server-side accounts from left to right to obtain a QR connecting code of the server-side account; if J is 1, only one server-side account number QR code is available, and the server-side account number QR code is the server-side account number QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of the server-side account from left to right and from top to bottom, wherein the black units and the white units are respectively a No. 1 unit, a No. 2 unit, a No. 3 unit, … … unit and a No. V unit, and V is J multiplied by delta2Wherein, δ represents the size of the QR code of the server-side account;
s154, encoding characters in the binary account number binding code from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the Kth character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the Kth character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the Kth unit in sequence;
s155, extracting codes of black cells in the 1 st cell, the 2 nd cell, the 3 rd cell, … … and the K th cell;
s156, arranging the extracted codes of the black units in a sequence from small to large, and writing characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s157, converting the server binary character string into the binary string which is the same as the safety account number in the step S13, and obtaining the server account number;
s158, determining whether the server account is consistent with a preset account preset at the server:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
CN202110588807.1A 2021-05-28 2021-05-28 Engineering survey intelligent management control platform Active CN113312536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110588807.1A CN113312536B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110588807.1A CN113312536B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control platform

Publications (2)

Publication Number Publication Date
CN113312536A true CN113312536A (en) 2021-08-27
CN113312536B CN113312536B (en) 2022-11-08

Family

ID=77375672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110588807.1A Active CN113312536B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control platform

Country Status (1)

Country Link
CN (1) CN113312536B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103731543A (en) * 2012-10-13 2014-04-16 成都哆可梦网络科技有限公司 Login system for two-dimension code mobile games
US20140365778A1 (en) * 2013-06-07 2014-12-11 Tencent Technology (Shenzhen) Company Limited Method and system for roaming website account and password
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login
CN107515717A (en) * 2017-09-05 2017-12-26 三星电子(中国)研发中心 A kind of exchange method of information, system and device
CN109214198A (en) * 2018-08-13 2019-01-15 苏州泥娃软件科技有限公司 A kind of secure cloud document system encrypting search
CN109685452A (en) * 2018-12-04 2019-04-26 国网河北省电力有限公司石家庄供电分公司 A kind of power supply company's item data management platform
CN110445805A (en) * 2019-08-22 2019-11-12 北京中科锐链科技有限公司 A kind of false-proof authentication system and method for two dimensional code
CN110611685A (en) * 2019-10-30 2019-12-24 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition
CN110751363A (en) * 2019-09-03 2020-02-04 广东电网有限责任公司培训与评价中心 Intelligent training evaluation system and method
CN110827459A (en) * 2019-09-29 2020-02-21 江苏理工学院 Encrypted two-dimensional code identity authentication system
CN111026798A (en) * 2019-12-05 2020-04-17 苏州中车建设工程有限公司 Electromechanical equipment database system and control method thereof
US20200162256A1 (en) * 2018-07-03 2020-05-21 Royal Bank Of Canada System and method for anonymous location verification

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103731543A (en) * 2012-10-13 2014-04-16 成都哆可梦网络科技有限公司 Login system for two-dimension code mobile games
US20140365778A1 (en) * 2013-06-07 2014-12-11 Tencent Technology (Shenzhen) Company Limited Method and system for roaming website account and password
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login
CN107515717A (en) * 2017-09-05 2017-12-26 三星电子(中国)研发中心 A kind of exchange method of information, system and device
US20200162256A1 (en) * 2018-07-03 2020-05-21 Royal Bank Of Canada System and method for anonymous location verification
CN109214198A (en) * 2018-08-13 2019-01-15 苏州泥娃软件科技有限公司 A kind of secure cloud document system encrypting search
CN109685452A (en) * 2018-12-04 2019-04-26 国网河北省电力有限公司石家庄供电分公司 A kind of power supply company's item data management platform
CN110445805A (en) * 2019-08-22 2019-11-12 北京中科锐链科技有限公司 A kind of false-proof authentication system and method for two dimensional code
CN110751363A (en) * 2019-09-03 2020-02-04 广东电网有限责任公司培训与评价中心 Intelligent training evaluation system and method
CN110827459A (en) * 2019-09-29 2020-02-21 江苏理工学院 Encrypted two-dimensional code identity authentication system
CN110611685A (en) * 2019-10-30 2019-12-24 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition
CN111026798A (en) * 2019-12-05 2020-04-17 苏州中车建设工程有限公司 Electromechanical equipment database system and control method thereof

Also Published As

Publication number Publication date
CN113312536B (en) 2022-11-08

Similar Documents

Publication Publication Date Title
CN107959568A (en) A kind of measurement verification calibration digital certificates intelligent generation method and system
CN111523094B (en) Deep learning model watermark embedding method and device, electronic equipment and storage medium
WO2005013042A2 (en) A reverse mapping method and apparatus for form filling
CN103873432A (en) Verification code implementation method and system thereof and verification code server end
CN110399933B (en) Data annotation correction method and device, computer readable medium and electronic equipment
CN110659569A (en) Electronic signature method, device, storage medium and electronic equipment
US20150187223A1 (en) Deidentified access of instructional content
CN114626694B (en) Network course planning management system based on internet
CN106847035A (en) Learning method, device and system based on equipment simulating
CN114742679A (en) Online education management control system based on internet
CN104731583A (en) Study scheme generation system and method based on numbering recording of exercises and knowledge points
CN104168117A (en) Voice digital signature method
CN113312536B (en) Engineering survey intelligent management control platform
CN105931093A (en) Product design internet platform
CN113312534B (en) Engineering survey intelligent management platform
CN113837113A (en) Document verification method, device, equipment and medium based on artificial intelligence
CN113312535B (en) Engineering survey intelligent management control cloud platform
CN112486957B (en) Database migration detection method, device, equipment and storage medium
CN110674493B (en) BIM system login verification method and system
CN111651292A (en) Data verification method and device, electronic equipment and computer readable storage medium
CN107231330A (en) A kind of password determination, login validation method and equipment
CN112085469B (en) Data approval method, device, equipment and storage medium based on vector machine model
CN107784064A (en) Web data processing method, device, computer equipment and computer-readable storage medium
CN107786330A (en) For the method, apparatus of privacy sharing, computer-readable storage medium and electronic equipment
CN107944507A (en) Packaging products in boxes error-reporting method and its system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant