CN113312536B - Engineering survey intelligent management control platform - Google Patents

Engineering survey intelligent management control platform Download PDF

Info

Publication number
CN113312536B
CN113312536B CN202110588807.1A CN202110588807A CN113312536B CN 113312536 B CN113312536 B CN 113312536B CN 202110588807 A CN202110588807 A CN 202110588807A CN 113312536 B CN113312536 B CN 113312536B
Authority
CN
China
Prior art keywords
character
account
password
module
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110588807.1A
Other languages
Chinese (zh)
Other versions
CN113312536A (en
Inventor
高兵
徐其学
王玨
王元清
谢先武
吕超武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway 11th Bureau Group Co Ltd
Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd
Original Assignee
China Railway 11th Bureau Group Co Ltd
Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Railway 11th Bureau Group Co Ltd, Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd filed Critical China Railway 11th Bureau Group Co Ltd
Priority to CN202110588807.1A priority Critical patent/CN113312536B/en
Publication of CN113312536A publication Critical patent/CN113312536A/en
Application granted granted Critical
Publication of CN113312536B publication Critical patent/CN113312536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Mining & Analysis (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an engineering measurement intelligent management control platform which comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, wherein when a user successfully logs in the server end by using the mobile phone equipment end, default display information of the server end is displayed on the mobile phone equipment end. The intelligent platform can log in the intelligent platform safely and inquire data on the intelligent platform.

Description

Engineering survey intelligent management control platform
Technical Field
The invention relates to the technical field of engineering, in particular to an engineering measurement intelligent management control platform.
Background
With the rapid development of national railway infrastructure, urban rail transit, river-crossing tunnels and the like, a series of tunnel engineering construction of urban tunnels, underground railways, underwater tunnels and the like also comes to the high tide. The patent application number 2020110515724, entitled "a method, device and system for equipment login", discloses a method, device and system for equipment login, comprising sending a token request to a security device, wherein the token request carries a user name and authentication information for logging in the security device; receiving a login token sent by the security device, wherein the login token is sent by the security device after the security device successfully verifies the security cloud platform based on the user name and verification information; and sending a login request to the security equipment, wherein the login request carries the login token, so that the security equipment logs in a management interface of the security equipment by using the user name and a login password corresponding to the user name after the received login token is verified by the security equipment. Therefore, even if the login password is modified by the security equipment, the cloud security platform can accurately log in the management interface.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides an engineering measurement intelligent management control platform.
In order to achieve the above object, the invention provides an engineering measurement intelligent management control platform, which comprises a mobile phone device end and a server end capable of realizing wireless communication with the mobile phone device end, wherein when a user successfully logs in the server end by using the mobile phone device end, default display information of the server end is displayed on the mobile phone device end.
The invention also discloses a working method of the engineering measurement intelligent management control platform, which comprises the following steps:
s1, a user logs in a server side by using a mobile phone device side;
and S2, after the user successfully logs in the server by using the mobile phone equipment terminal, inquiring and displaying the data of the server.
In conclusion, by adopting the technical scheme, the intelligent platform can safely log in the intelligent platform and inquire data on the intelligent platform.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic diagram of the connection of the present invention.
Fig. 2 is a schematic diagram of a QR code of an account according to the present invention.
Fig. 3 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 4 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 5 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 6 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 7 is a schematic diagram of a QR connection code of the account according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention and are not to be construed as limiting the present invention.
The invention discloses an engineering measurement intelligent management control platform, which comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, wherein when a user successfully logs in the server end by using the mobile phone equipment end, default display information of the server end is displayed on the mobile phone equipment end, as shown in figure 1.
In a preferred embodiment of the present invention, the default display information of the server includes one or any combination of an approval module, a project management module, a personnel management module, an equipment management module, a learning module, an assessment module, a data management module, a task information module, and a gadget module.
In a preferred embodiment of the present invention, the project management module includes one or any combination of a help module, a project list module, a route calculation module, a new project module, and a project profile module;
the help module is used for providing an operation description of the software system; the item list module is used for displaying all items related to the current user; the line calculation module is used for calculating and displaying input data; the new project module is used for allowing a legal user to add a new project; the item profile module is used for displaying and providing basic information for modifying the selected item in the item list module. When the mobile phone equipment end receives a trigger signal of the project management module, displaying a help module, a project list module, a route calculation module, a newly-built project module and one, two, three, four or five of project profile modules on a touch display screen; in the interface state, if the mobile phone equipment end receives a help module trigger signal, displaying an operation instruction of the software system on the touch display screen; if the mobile phone equipment end receives the item list module trigger signal, displaying all items related to the current user on the touch display screen, and sequencing according to the time sequence; when receiving a trigger signal of receiving a certain item, the mobile phone device end displays basic information of the item on the touch display screen, wherein the basic information comprises one or any combination of time when the new item is added, place where the new item is added, title, user ID of adding the new item, item progress and item description. If the mobile phone equipment end receives a line calculation module trigger signal, displaying a calculation result of input data on the touch display screen; if the mobile phone equipment receives a trigger signal of a newly-built project module, judging whether the user has the permission to add a new project, if so, displaying the added new project on a touch display screen, wherein the added new project comprises one or any combination of time for adding the new project, a place where the new project is added, a title and a user ID for adding the new project, and if not, prompting the user, and giving the administrator the permission to add the new project; and if the mobile phone equipment end receives the item profile module trigger signal, displaying and providing basic information for modifying the selected item in the item list module on the touch display screen.
In a preferred embodiment of the present invention, the line calculation module includes one or any combination of a data entry module, a data approval module, a parameter setting module, and a calculation result module;
the data output end of the data input module is connected with the data input end of the data approval module, the data output end of the data approval module is connected with the data input end of the parameter setting module, and the data output end of the parameter setting module is connected with the data input end of the calculation result module;
the data entry module is used for the entry of users with different authorities to the data; the data approval module is used for approving the input data; the parameter setting module is used for setting the format of the input data; and the calculation result module is used for displaying the calculation result of the approval process data. Firstly, a parameter setting user sets various parameter information used by the project at a parameter setting module; then, the bridge information is input into the data input module, stored on the server and submitted to a data approval person through the data approval module; and the data approval personnel check the data uploaded by the parameter setting user in the data approval module, if the data is qualified, the data is submitted to the upper-level data approval personnel through the data approval module, if the data is unqualified, and the corresponding data approval personnel is returned after modification opinions are added.
In a preferred embodiment of the present invention, the personnel management module includes one or any combination of a personnel information module, a user authority module, a personnel allocation module, a project allocation module and a role module;
the personnel information module is used for storing personal information of personnel, and the personal information comprises one or any combination of name, identification card number, contact telephone, age, native place, colleges and universities, academic degrees and working experiences;
the user authority module is used for giving the user the authority to use the corresponding functional module; the personnel allocation module is used for recording personnel allocation process; the project allocation module is used for allocating personnel to each project name; and the role module is used for defining the authority of the user. After the personnel information perfecting user perfects the personal information in the personnel information module, submitting the personnel information perfecting user to review by a personnel information approval user; the personnel information approval user has the administrator authority granted by the role module, and after the personnel information module approves and passes the new personnel information, the information is stored in the server; the personnel transfer user provides a personnel demand plan at the personnel transfer module, the personnel demand examination and approval user examines and approves the demand plan, the examination and approval is given to other personnel transfer users through the initiating personnel transfer plan, after the other personnel transfer users agree, a transfer list is returned to the personnel demand examination and approval user, and finally the initiating plan personnel transfer user reports the actual personnel to the post; the role module is essentially a set of permissions, which facilitates rapid assignment of permissions to users, and administrators can change the roles of other users at the module.
In a preferred embodiment of the present invention, the device management module includes one or any combination of a device management method module, a device information module, and a device allocation module;
the equipment management method module is used for displaying the use and maintenance method of each piece of equipment; the equipment information module is used for displaying various attributes of the item equipment, including one or any combination of type, starting date, checked date and maintenance record; the equipment transferring module is used for the equipment transferring process. An equipment management user uploads a PDF file of 'Total station systematic item error checking method' in an equipment management method module, the measuring user checks the method in the module, and the total station is checked according to instructions; the equipment information user inputs new equipment information in the equipment information module, if the equipment information needs to be updated, an equipment information updating approval process needs to be initiated, after the user agrees through the upper-level equipment information, the equipment information is changed, and the system prompts the user to scrap or send for inspection instrument equipment within 3 months in the future according to the latest inspected time and the evaluation age; and the equipment transfer user initiates equipment requirements in the equipment transfer module, and transfers the required equipment to a requirement plan initiating project after the approval is passed.
In a preferred embodiment of the invention, the learning module comprises a learning material module or/and a quick self-test module;
the learning materials are used for displaying various learning materials; the quick self-testing module is used for testing knowledge points by a user. The learning material user uploads training materials on the learning material module, the online learning user browses the learning materials online through the module, and after learning is finished, the online learning user can enter the rapid self-testing module to test knowledge proficiency according to the sections selected by the current learning material module.
In a preferred embodiment of the invention, the examination module comprises an question bank module, a test paper module, an examination module and a result analysis module; the question bank module is used for inputting an examination question bank and a self-testing question bank, and the test paper combining module and the rapid self-testing module respectively select test questions from the examination question bank and the self-testing question bank; the examination paper composing module is used for customizing examination range, examination time and reference personnel by a user to perform examination paper drawing and composing; the examination module is used for a reference person to take an examination; and the result analysis module checks the examination result and obtains various analysis results. The question bank input user inputs the test questions in the question bank module singly or in batch, and necessary editing is carried out; the volume user selects 100 items from the level measurement item bank in the volume module, and the examination statement of 18/2021.1.5 comprises users to be tested; the user to be tested timely takes an examination on 18.00 at 2021.1.5, and the result of the examination including total points, correct rate, wrong questions, answering time and the like is checked through the result analysis module; the examination paper user can check examination success rate, average score, error-prone questions and the like through the result analysis module.
In a preferred embodiment of the invention, the task information module comprises one or any combination of a project management approval module, a learning task module, an assessment task module and an equipment management approval module;
the project management approval module is used for prompting a user about a process to be approved in project management and providing a quick entrance for approval; the learning task module is used for prompting a user to learn a task and providing a learning shortcut entrance; the examination task module is used for prompting the examination task of the user and providing a quick entrance for taking an examination; the equipment management approval module is used for prompting the user equipment management aspect to-be-approved process and providing a quick entrance for approval. The project management user sees that 12 platform data of the Beijing bridge project need to be examined and approved in the project management examination and approval module, the data are examined and approved through a quick entrance, if the data are not wrong, all the users are authorized to use the data, and if the data are wrong, the opinion is returned to the examination and approval initiator; a user to be learned sees the first chapter of leveling needing to be learned in the current month in a learning task, and online learning can be carried out through a quick entrance; the user to be tested can immediately take a leveling test after seeing the examination task and can take the test through a quick entrance; and the equipment management user checks the equipment transfer approval process in the equipment management approval module and approves the data through a quick entrance.
The invention also discloses a working method of the engineering measurement intelligent management control platform, which comprises the following steps:
s1, a user logs in a server side by using a mobile phone device side;
and S2, after the user successfully logs in the server by using the mobile phone equipment terminal, inquiring and displaying the data of the server.
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, acquiring an input login account and a login password at a mobile phone device end;
s12, respectively carrying out security processing on the login account or/and the login password acquired in the step S11 to obtain a login security account or/and a login security password;
s13, respectively carrying out security processing on the login security account or/and the login security password obtained in the step S12 to obtain the security account or/and the security password;
s14, respectively generating an account QR code or/and a password QR code for the login security account or/and the login security password obtained in the step S12;
s15, combining the secured account obtained in the step S13 with the QR code of the account generated in the step S14 to obtain an account combination code; or/and combining the security password obtained in the step S13 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the account number combination code or/and the password combination code obtained in the step S15 and the login safety account number corresponding to the account number combination code or/and the login safety password corresponding to the password combination code to a server side for verification accuracy.
The method comprises the steps of aiming at a login account only, a login password only, a login account and a login password; for login account only: the step S1 includes the following steps:
s11, acquiring an input login account and a login password at a mobile phone device end;
s12, performing login account security processing on the login account acquired in the step S11 to obtain a login security account;
s13, performing login safety account safety processing on the login safety account obtained in the step S12 to obtain a safety account of the login safety account;
s14, generating an account number QR code for the login safety account number obtained in the step S12;
s15, combining the secured account obtained in the step S13 with the QR code of the account generated in the step S14 to obtain an account combination code;
and S16, sending the account combination code obtained in the step S15, the input login password and the login safety account corresponding to the account combination code to a server side for verification.
Only for login password: the step S1 includes the following steps:
s11, acquiring an input login account and a login password at a mobile phone device end;
s12, carrying out login password security processing on the login password obtained in the step S11 to obtain a login security password;
s13, carrying out login security password security processing on the login security password obtained in the step S12 to obtain a security password;
s14, generating a password (QR) code for the login security password obtained in the step S12;
s15, combining the security password obtained in the step S13 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the password combination code obtained in the step S15 and the login security password corresponding to the input login account number and the password combination code to a server side for verifying the correctness.
For the login account and the login password: the step S1 includes the following steps:
s11, acquiring an input login account and a login password at a mobile phone device end;
s12, respectively carrying out security processing on the login account and the login password acquired in the step S11 to obtain a login security account and a login security password;
s13, respectively carrying out security processing on the login security account and the login security password obtained in the step S12 to obtain a security account and a security password;
s14, respectively generating an account number QR code and a password QR code for the login security account number and the login security password obtained in the step S12;
s15, combining the security account obtained in the step S13 with the QR code of the account generated in the step S14 to obtain an account combination code; combining the security password obtained in the step S13 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the account number combination code and the password combination code obtained in the step S15, and the login safety account number corresponding to the account number combination code and the login safety password corresponding to the password combination code to a server side for verification.
In a preferred embodiment of the present invention, in step S12, the method for performing login account security processing on the acquired login account to obtain a login security account includes:
Loginsecuritynumber=sha[[securitynumber]],
wherein sha [ ] ] represents a security algorithm;
securitynumber represents a login account;
logins securitynumber represents a login secured account number;
the method for carrying out login password security processing on the obtained login password to obtain the login security password comprises the following steps:
Loginsafetynumber=sha[[safetynumber[[,
security number represents a login password;
loginsafetynumber denotes a login security password.
In a preferred embodiment of the present invention, in step S13, the method for performing a secure process on the obtained login secured account to obtain the secured account thereof includes:
Loginsecuritynumber′=sha[[Loginsecuritynumber]],
wherein sha [ ] ] represents a security algorithm;
logins securitynumber represents a login secured account number;
loginstecurynymber' represents a secured account number;
the method for performing login security password security processing on the obtained login security password to obtain the security password comprises the following steps:
Loginsafetynumber′=sha[[Loginsafetynumber]],
loginsafetynumber represents a login security password;
loginsafetynumber' denotes a security password.
In a preferred embodiment of the present invention, in step S15, the method for combining the obtained secured account with the generated account QR code to obtain the account combination code thereof includes the following steps:
s151, converting the security account number into a security account number binary system;
s152, judging the relation between the total binary digit of the safety account number and the total number of black units in the QR code of the account number:
Figure BDA0003088642520000051
wherein x represents the total number of digits of the secure account number binary system;
y represents the total number of black units in the QR code of the account;
if represents the condition if;
z represents a set of all integers;
int [ ] represents a rounding function;
z represents the total number of the QR codes of the account;
s153, if z is larger than or equal to 2, sequentially connecting the QR codes of the z accounts from left to right to obtain QR connecting codes of the accounts; if z =1, only one account QR code is available, and the account QR code is an account QR connection code; sequentially coding black units and white units in the QR connecting code of the account from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, 8230, a No. 1 unit, a No. 2 unit, a No. 3 unit, a No. 8230, a No. 3 unitA unit, a = z × α 2 Wherein, alpha represents the size of the QR code of the account;
s154, encoding characters in a binary system of the safety account number from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230of the account number, and the y th character of the account number respectively; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the account, wherein the characters are 8230, and the y-th character of the account are sequentially mapped to a y arrangement code;
s155, extracting the arrangement code mapped by the character corresponding to the y-th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of the unmapped characters before the cut-off codes;
s156, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, the cut-off code into lines to obtain a binary character string;
and S157, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
In a preferred embodiment of the present invention, in step S15, the method for combining the obtained security code with the generated password QR code to obtain a password combination code thereof includes the steps of:
s151, converting the security password into a security password binary system;
s152, judging the relation between the total number of binary digits of the security password and the total number of black units in the QR code:
Figure BDA0003088642520000052
wherein x' represents the total number of digits of the secure password binary;
y' represents the total number of black cells in the password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents the rounding function;
z' represents the total number of the password QR codes;
s153, if z 'is not less than 2, connecting the z' password QR codes from left to right in sequence to obtain the password QR connecting codes; if z' =1, only one password QR code exists, and the password QR code is a password QR connecting code; the black unit and the white unit in the QR code connecting code are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, \8230;, an A 'th unit, A' = z '× alpha' 2 Wherein α' represents the size of the password QR code;
s154, encoding the characters in the binary system of the security password from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, and the y' character of the password respectively; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to the sequence from small to large to obtain a code arrangement code; taking the first y 'of the password arrangement codes to obtain the y' password arrangement codes; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the password, \8230;, and the y 'th character of the password to a y' password arrangement code in sequence;
s155, extracting a password permutation code mapped by the character corresponding to the y' th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s156, writing a line according to characters mapped by the unit 1, the unit 2, the unit 3, \8230; \ 8230;, the password cut-off code respectively to obtain a binary character string;
and S157, converting the binary character string into a hexadecimal character string to obtain the password combination code.
In a preferred embodiment of the present invention, in step S15, the method for the server to verify the correctness of the account number binding code includes the following steps:
s151, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received login security account;
s152, judging the relation between the total digits of the binary account number combination code and the total number of black units and white units in the QR code of the server-side account number:
Figure BDA0003088642520000061
wherein K represents the total digit of the binary account number combination code;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
j represents the total number of QR codes of the server side account;
s153, if J is larger than or equal to 2, sequentially connecting the QR codes of the J server-side accounts from left to right to obtain a QR connecting code of the server-side account; if J =1, only one server-side account number QR code is available, and the server-side account number QR code is a server-side account number QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of a server account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, \8230; \ 8230;, a V th unit, and V = J multiplied by delta 2 Wherein, δ represents the size of the QR code of the server-side account;
s154, encoding characters in the binary account number binding code from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the Kth character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the account in sequence to the 1 st unit, the 2 nd unit, the 3 rd unit, the 8230, the 8230and the K unit;
s155, extracting 1 st unit, 2 nd unit, 3 rd unit, \8230 \ 8230;, the K unit is the code of the black unit;
s156, arranging the extracted codes of the black units in a sequence from small to large, and writing characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s157, converting the binary character string of the server terminal into the binary character string which is the same as the security account number in the step S13 to obtain the server terminal account number;
s158, determining whether the server account number is consistent with a preset account number preset in the server:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
if the server side account number is inconsistent with a preset account number preset at the server side, the login is not passed.
In a preferred embodiment of the present invention, in step S158, the method for calculating the server-side password comprises the following steps:
s1581, the server side converts the received password combination code into a binary password combination code; generating a server-side password (QR) code by using the received login security password;
s1582, judging the relation between the total digits of the binary password combination code and the total number of black units and white units in the server-side password QR code:
Figure BDA0003088642520000071
wherein K' represents the total number of bits of the binary cipher code;
l' represents the total number of black units and white units in the QR code of the server;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
j' represents the total number of the server-side password QR codes;
s1583, if J 'is not less than 2, sequentially connecting the J' server-side password QR codes from left to right to obtain server-side password QR connecting codes; if J' =1, only one server-side password QR code exists, and the server-side password QR code is a server-side password QR connection code; the black unit and the white unit in the server-side password QR connecting code are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, 8230sign, a V 'th unit, V' = J '× delta' 2 Wherein δ' represents the size of the server-side password QR code;
s1584, coding the characters in the binary password combination code from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, 8230, 8230and the K' th character of the password respectively; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the password, \8230;, and the K 'th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, and the K' th unit in sequence;
s1585, extracting codes of black cells in a unit 1, a unit 2, a unit 3, \8230;, and a unit K';
s1586, arranging the extracted codes of the black units in a descending order, writing characters mapped by the arranged codes of the black units into lines, and obtaining a server-side binary character string;
s1587, converting the binary string of the server side into the binary string of the security password in the step S13, and obtaining the password of the server side.
For example, in the first step, the login account input at the mobile phone device side is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.com.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account;
Figure BDA0003088642520000072
in the present embodiment, the security algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower case 16-ary numerical values thereof.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088642520000073
fourthly, an account QR code is generated for the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
<xnotran> , 188f3647551830c11fbd2d43563f1867 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111. </xnotran>
<xnotran> , 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 QR : </xnotran>
Due to the fact that
Figure BDA0003088642520000081
Thus, it is possible to provide
Figure BDA0003088642520000082
Seventhly, because z =1, the account QR code is an account QR connection code, as shown in fig. 2; if z =2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 3; if z =4, sequentially connecting the 4 account QR codes from left to right to obtain account QR connecting codes; as shown in fig. 4.
Eighthly, coding the black unit and the white unit in the account QR connection code shown in fig. 2 from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, the unit 8230the unit 8230, the unit 841, and the account QR code has the size of 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 9 th, 12 th, 16 th, 19 th, 20 th, 21 st, 23 rd, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1. (here, since only the first action example is taken in the ninth step, 1 to 20 bits of the binary system of the secured account number, that is, 11000100011110011011, the corresponding hexadecimal system thereof is c479b, and c479b is taken as the preset account number stored in the server side).
Step ten, mapping characters 0 on the 8 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 14 th unit, the 15 th unit, the 17 th unit, the 18 th unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 th cell is 1, the character mapped on the 1 st cell is 0, the 24 th cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the cell is 1, the character mapped on the cell is 0, the character mapped on the 1 th cell is 24 th cell is 0, the character mapped on the cell is 24.
In the tenth step, characters mapped by the units 1, 2, 3, 8230, 8230and the stop codes are written into lines to obtain binary character strings 11000100000000010011100011011.
In the twelfth step, the binary character string 11000100000000010011100011011 is converted into a hexadecimal character string 1880271b, and the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088642520000091
fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088642520000092
the preset account at the server side is 188f3647551830c11fbd2d43563f1867, and the preset password associated with the preset account at the server side 188f3647551830c11fbd2d43563f1867 is 188f3647551830c11fbd2d43563f1867.
In the fifteenth step, a password QR code is generated for the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
<xnotran> , 188f3647551830c11fbd2d43563f1867 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111. </xnotran>
<xnotran> , 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 QR : </xnotran>
Due to the fact that
Figure BDA0003088642520000093
Thus, the device
Figure BDA0003088642520000094
Eighteenth step, since z' =1, the password QR code is a password QR connection code, as shown in fig. 2; if z' =2, sequentially connecting the 2 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 3; if z' =4, sequentially connecting 4 password QR codes from left to right to obtain password QR connecting codes of the 4 password QR codes; as shown in fig. 4.
Nineteenth step, coding the black unit and the white unit in the code QR connecting code shown in fig. 2 from left to right and from top to bottom in sequence, wherein the coding is respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230;, and the unit 841, and the size of the code QR code is 29.
Twentieth, only take the first behavior example because of more data; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 9 th, 12 th, 16 th, 19 th, 20 th, 21 st, 23 th, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are cipher code; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1. (here, since only the first behavior example is used in the twentieth step, 1 to 20 bits of the binary system of the security password, that is, 11000100011110011011, are taken, the corresponding hexadecimal is c479b, and c479b is taken as the preset password associated with the preset account number c479b stored in the server side).
Twenty-first, mapping character 0 to the 8 th unit, 10 th unit, 11 th unit, 13 th unit, 14 th unit, 15 th unit, 17 th unit, 18 th unit and 22 th unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 22 th cell is 0, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 1.
And a twentieth step, writing the characters mapped by the unit 1, the unit 2, the unit 3, \8230;, and the password cut-off code into lines to obtain binary character strings of 11000100000000010011100011011.
And a twentieth step of converting the binary character string 1100010000010011100011011 into a hexadecimal character string 1880271b to obtain the password combination code.
And twenty-fourth step, sending the account number combination code 1880271b, the login security account 315be36db8ad7b3e3a7bb0839d6fa839, the password combination code 1880271b and the login security password 315be36db8ad7b3e3a7bb0839d6fa839 to the server side.
The twenty-fifth step, the account number combination code received by the server is 1880271b, and the login secure account number received by the server is 315be36db8ad7b3e3a7bb0839d6fa839;
twenty-sixth step, the server side converts the received account number combination code 1880271b into a binary account number combination code of 11000100000000010011100011011; and generating a server-side account QR code from the received login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Twenty-seventh step, because
Figure BDA0003088642520000101
Thus, the device
Figure BDA0003088642520000102
Twenty-eighth, because J =1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 2; if J =2, sequentially connecting the QR codes of the 2 server-side account numbers from left to right to obtain a QR connecting code of the server-side account number; as shown in fig. 3; if J =4, sequentially connecting the QR codes of the 4 server-side account numbers from left to right to obtain a QR connecting code of the server-side account number; as shown in fig. 4.
Twenty-ninth step, coding the black unit and the white unit in the server-side account number QR connection code from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230and the unit 841, and the size of the server-side account number QR code is 29.
Thirty-third, encoding characters in a binary account binding code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, 8230, and the 29 th character of the account; that is, the character corresponding to the 1 st character of the account number is 1, the character corresponding to the 2 nd character of the account number is 1, the character corresponding to the 3 rd character of the account number is 0, the character corresponding to the 4 th character of the account number is 0, the character corresponding to the 5 th character of the account number is 0, the character corresponding to the 6 th character of the account number is 1, the character corresponding to the 7 th character of the account number is 0, the character corresponding to the 8 th character of the account number is 0, the character corresponding to the 9 th character of the account number is 0, the character corresponding to the 10 th character of the account number is 0, the character corresponding to the 11 th character of the account number is 0, the character corresponding to the 12 th character of the account number is 0, the character corresponding to the 13 th character of the account number is 0, the character corresponding to the 14 th character of the account number is 0, and the character corresponding to the 15 th character of the account number is 0, the character corresponding to the 16 th character of the account is 1, the character corresponding to the 17 th character of the account is 0, the character corresponding to the 18 th character of the account is 0, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 1, the character corresponding to the 21 st character of the account is 1, the character corresponding to the 22 nd character of the account is 0, the character corresponding to the 23 th character of the account is 0, the character corresponding to the 24 th character of the account is 0, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 0, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 1.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, 8230, 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, 8230, 29 th unit; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 th cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 1.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain a binary character string of 11000100011110011011 at the server end.
And a thirty-third step, converting the binary character string 11000100011110011011 at the server end into a hexadecimal system to obtain the account number c479b at the server end.
And thirty-fourth step, judging whether the server side account number c479b is consistent with a preset account number preset at the server side:
calculating a server-side password because the server-side account number c479b is consistent with a preset account number c479b preset at the server side;
thirty-fifth step, the server side converts the received password combination code 1880271b into a binary password combination code 11000100000000010011100011011; and generating a server-side password QR code from the received login security password 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Thirty-sixth step, because
Figure BDA0003088642520000111
Thus, the device
Figure BDA0003088642520000112
Thirty-seventh step, since J' =1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 2; if J' =2, sequentially connecting the 2 server-side password QR codes from left to right to obtain a server-side password QR connection code; as shown in fig. 3; if J' =4, sequentially connecting the 4 server-side password QR codes from left to right to obtain a server-side password QR connection code; as shown in fig. 4.
Thirty-eighth step, coding the black unit and the white unit in the server-side password QR connection code from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230;, and the unit 841, and the size of the server-side password QR code is 29.
Thirty-ninth step, coding the characters in binary password combination code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the password respectively; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 0, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the 16 th character of the password corresponds to a character of 1, the 17 th character of the password corresponds to a character of 0, the 18 th character of the password corresponds to a character of 0, the 19 th character of the password corresponds to a character of 1, the 20 th character of the password corresponds to a character of 1, the 21 st character of the password corresponds to a character of 1, the 22 nd character of the password corresponds to a character of 0, the 23 rd character of the password corresponds to a character of 0, the 24 th character of the password corresponds to a character of 0, the 25 th character of the password corresponds to a character of 1, the 26 th character of the password corresponds to a character of 1, the 27 th character of the password corresponds to a character of 0, the 28 th character of the password corresponds to a character of 1, and the 29 th character of the password corresponds to a character of 1.
Forty step, mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the password, 8230, 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, 8230, 29 th unit; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 th cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 1.
And forty step, writing the characters mapped by the codes of the arranged black units into a line to obtain a binary character string of 11000100011110011011 at the server end.
In the fortieth step, the binary string 11000100011110011011 at the server end is converted into hexadecimal, and the password at the server end is c479b.
Step forty, judging whether the server password c479b is consistent with a preset password preset at the server:
and if the server-side password c479b is consistent with the preset password c479b associated with the preset account preset at the server side, the login is passed.
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, acquiring an input login account and a login password at a mobile phone device end;
s12, respectively carrying out security processing on the login account or/and the login password acquired in the step S11 to obtain a login security account or/and a login security password;
s13, respectively carrying out security processing on the login security account or/and the login security password obtained in the step S12 to obtain the security account or/and the security password;
s14, respectively generating an account number QR code or/and a password QR code for the safety account number or/and the safety password obtained in the step S12;
s15, combining the login safe account obtained in the step S12 with the QR code of the account generated in the step S14 to obtain an account combination code; or/and combining the login security password obtained in the step S12 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the account number combination code or/and the password combination code obtained in the step S15 and the safety account number corresponding to the account number combination code or/and the safety password corresponding to the password combination code to a server side for verification.
The method comprises the steps of aiming at a login account only, a login password only, a login account and a login password; for login account only: the step S1 includes the following steps:
s11, acquiring an input login account and a login password at a mobile phone device end;
s12, performing login account security processing on the login account acquired in the step S11 to obtain a login security account;
s13, performing login safety account safety processing on the login safety account obtained in the step S12 to obtain a safety account of the login safety account;
s14, generating an account number QR code for the safety account number obtained in the step S12;
s15, combining the login safe account obtained in the step S12 with the QR code of the account generated in the step S14 to obtain an account combination code;
and S16, sending the account number combination code obtained in the step S15, the input password and the safety account number corresponding to the account number combination code to a server side for verification.
Only for login password: the step S1 includes the following steps:
s11, acquiring an input login account and a login password at a mobile phone device end;
s12, carrying out login password security processing on the login password obtained in the step S11 to obtain a login security password;
s13, carrying out login security password security processing on the login security password obtained in the step S12 to obtain a security password;
s14, generating a password (QR) code for the security password obtained in the step S12;
s15, combining the login security password obtained in the step S12 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the password combination code obtained in the step S15 and the input account number and the security password corresponding to the password combination code to a server side for verification.
For the login account and the login password: the step S1 includes the following steps:
the step S1 includes the following steps:
s11, acquiring an input login account and a login password at a mobile phone device end;
s12, respectively carrying out security processing on the login account and the login password obtained in the step S11 to obtain a login security account and a login security password;
s13, respectively carrying out security processing on the login security account and the login security password obtained in the step S12 to obtain a security account and a security password;
s14, respectively generating an account number QR code and a password QR code for the secure account number and the secure password obtained in the step S12;
s15, combining the login safe account obtained in the step S12 with the account QR code generated in the step S14 to obtain an account combination code; combining the login security password obtained in the step S12 with the password QR code generated in the step S14 to obtain a password combination code;
and S16, sending the account number combination code and the password combination code obtained in the step S15, and the safety account number corresponding to the account number combination code and the safety password corresponding to the password combination code to a server side for verification.
In a preferred embodiment of the present invention, in step S15, the method for combining the obtained login security account with the generated account QR code to obtain the account combination code thereof includes the following steps:
s151, converting the login safety account number into a login safety account number binary system;
s152, judging the relation between the total number of binary digits of the login safety account number and the total number of black units in the QR code of the account number:
Figure BDA0003088642520000131
wherein,' x represents the total number of digits of the binary system of the login safety account;
y represents the total number of black units in the QR code of the account;
if represents the condition if;
z represents a set of all integers;
int [ ] represents the rounding function;
"z represents the total number of account number QR codes;
s153, if 'z is larger than or equal to 2, sequentially connecting' z account QR codes from left to right to obtain account QR connecting codes; if' z =1, only one account QR code is available, and the account QR code is an account QR connection code; sequentially coding a black unit and a white unit in the QR connecting code of the account from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, \8230; ' A = ' z × ' alpha 2 Wherein,' alpha represents the size of the account QR code;
s154, encoding characters in a binary system of the login safety account according to the sequence from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, and the y-th character of the account; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the' y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 'y th character of the account to a' y arrangement code in sequence;
s155, extracting the arrangement code mapped by the character corresponding to the' y th character of the account to obtain a stop code; mapping characters 0 or 1 to other units of unmapped characters before the cut-off codes;
s156, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, the cut-off code into lines to obtain a binary character string;
and S157, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
In a preferred embodiment of the present invention, the method for combining the obtained login security password with the generated password QR code to obtain the password combination code in step S15 includes the steps of:
s151, converting the login security password into a login security password binary system;
s152, judging the relation between the total digits of the login security password binary system and the total number of black units in the password QR code:
Figure BDA0003088642520000141
wherein,' x represents the total number of digits of the login security password binary system;
' y represents the total number of black units in the password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"z represents the total number of the cryptographic QR code;
s153, if the 'z is more than or equal to 2, sequentially connecting the' z password QR codes from left to right to obtain password QR connecting codes thereof; if' z =1, only one password QR code is available, and the password QR code is a password QR connecting code; the black unit and the white unit in the QR connecting code are sequentially coded from left to right and from top to bottom, respectively a 1 st unit, a 2 nd unit, a 3 rd unit, \8230; ' A unit, ' A = ' z × ' alpha ') 2 Wherein,' α represents the size of the password QR code;
s154, coding characters in the login security password binary system from left to right, wherein the characters are respectively a password 1 st character, a password 2 nd character, a password 3 rd character, \ 8230; \ 8230;, and a password y character; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the front Y password permutation codes to obtain the Y password permutation codes; the 1 st character, the 2 nd character, the 3 rd character, the 8230, the mapping the characters corresponding to the Y-th password characters to the Y-th password arrangement codes in sequence;
s155, extracting the password arrangement code mapped by the character corresponding to the Y-th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s156, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, the password cut-off code into lines to obtain a binary character string;
and S157, converting the binary character string into a hexadecimal character string to obtain the password combination code.
In a preferred embodiment of the present invention, in step S15, the method for the server to verify the correctness of the account number binding code includes the following steps:
s151, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received safe account;
s152, judging the relation between the total digits of the binary account number combination code and the total number of black units and white units in the QR code of the server-side account number:
Figure BDA0003088642520000142
wherein, the' K represents the total digits of the binary account number combination code;
l represents the total number of black units and white units in the QR code of the server-side account;
if represents the condition if;
z represents a set of all integers;
int [ ] represents a rounding function;
"J represents the total number of server-side account QR codes;
s153, if 'J is larger than or equal to 2, sequentially connecting the QR codes of the' J server-side accounts from left to right to obtainA server account number QR connecting code; if' J =1, only one server-side account QR code is available, and the server-side account QR code is a server-side account QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of a server side account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, a 8230a V unit and a V unit, and V = ' J × ' delta ' unit 2 The method comprises the following steps that a 'delta' represents the size of a QR code of a server-side account;
s154, encoding characters in the binary account number binding code from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the K-th character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the account, wherein the characters are 8230, and the characters corresponding to the K th character of the account are sequentially mapped to the 1 st unit, the 2 nd unit, the 3 rd unit, the 8230, the 8230and the K th unit;
s155, extracting codes of black units in the 1 st unit, the 2 nd unit, the 3 rd unit, \8230 `, and the K unit;
s156, arranging the extracted codes of the black units in a sequence from small to large, and writing characters mapped by the arranged codes of the black units into lines to obtain a binary character string at the server;
s157, converting the binary character string of the server terminal into a binary system which is the same as the binary system of the login safety account number in the step S12, and obtaining the server terminal account number of the server terminal; in the present embodiment, the present invention further includes:
executing the following operations on the server account:
`Loginsecuritynumber=sha[[``Loginsecuritynumber]],
wherein sha [ ] ] represents a security algorithm;
"logins churitynumber represents a server-side account number;
locinsecuritynumber represents an account security value;
judging whether the account security value' Loginsecurynymber is consistent with the received security account or not:
if the account security value' logins is consistent with the received secured account, step S158 is executed;
if the account security value' loginstecuritynumber is inconsistent with the received secured account, returning to step S151, and if the number of times of returning reaches the threshold value of the number of times of returning to the account, logging in is not passed.
S158, determining whether the server account is consistent with a preset account preset at the server:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server-side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
In a preferred embodiment of the present invention, in step S158, the method for calculating the server-side password includes the following steps:
s1581, the server side converts the received password combination code into a binary password combination code; generating a server-side password (QR) code by using the received security password;
s1582, judging the relationship between the total digits of the binary password combination code and the total number of the black units and the white units in the QR code at the server side:
Figure BDA0003088642520000151
wherein,' K represents the total number of bits of the binary cipher-code combination code;
the' L represents the total number of black units and white units in the QR code at the server side;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
' J represents the total number of the server-side password QR codes;
s1583, if the ' J ' is larger than or equal to 2, sequentially connecting the ' J server-side password QR codes from left to right to obtain server-side password QR connecting codes; if' J =1, only one server-side password QR code is available, and the server-side password QR code is a server-side password QR connecting code; the black unit and the white unit in the server-side password QR connecting code are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, \8230 \ 8230;, a V unit, = V = ' J × ' delta ' unit 2 Wherein,' delta represents the size of the server-side password QR code;
s1584, coding the characters in the binary password combination code from left to right, wherein the characters are respectively the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the K character of the password; sequentially mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the password, the password of 8230, the password of 82308230, and the password of K to the 1 st unit, the 2 nd unit, the 3 rd unit, the password of 82308230, the password of K and the K unit;
s1585, extracting codes of black units in units 1, 2, 3, \8230 `, ` K `;
s1586, arranging the extracted codes of the black units in a sequence from small to large, and writing characters mapped by the codes of the arranged black units into lines to obtain a binary character string at the server;
s1587, converting the binary string of the server side into the binary string of the login security password in the step S12, and obtaining the password of the server side. In the present embodiment, the present invention further includes:
the following operations are performed on the server-side password:
`Loginsafetynumber=sha[[``safetynumber]],
wherein sha [ ] ] represents a security algorithm;
' security number represents a server-side password;
"Loginsafetynumber represents a password security value;
judging whether the password security value' Loginsetynumber is consistent with the received security password:
if the password security value' Loginsafetynumber is consistent with the received security password, executing to judge whether the password of the server side is consistent with a preset password associated with a preset account number preset at the server side;
if the password security value' logins afetynumber is inconsistent with the received security password, returning to the step S1581, and if the number of times of returning reaches the password returning set number threshold, failing to log in.
For example, in the first step, the login account input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.com.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account;
Figure BDA0003088642520000161
in the present embodiment, the security algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower case 16-ary numerical values thereof.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088642520000162
fourthly, an account QR code is generated for the obtained secured account 188f3647551830c11fbd2d43563f1867, as shown in fig. 5.
<xnotran> , 315be36db8ad7b3e3a7bb0839d6fa839 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001. </xnotran>
<xnotran> , 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 QR : </xnotran>
Due to the fact that
Figure BDA0003088642520000171
Thus, the device
Figure BDA0003088642520000172
Seventhly, because' z =1, the account QR code is an account QR connection code, as shown in fig. 5; if' z =2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 6; if' z =4, sequentially connecting the QR codes of the 4 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 7.
Eighthly, coding the black unit and the white unit in the account QR connection code shown in fig. 5 from left to right and from top to bottom sequentially, wherein the black unit, the white unit and the white unit are respectively the unit 1, the unit 2, the unit 3, the unit 8230, and the unit 841, and the account QR code has the size of 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 12 th, 14 th, 18 th, 19 th, 23 th, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the first behavior example is taken in the ninth step, 1 to 18 bits of the binary system of the secured account number, that is, 110001010110111110, the corresponding hexadecimal system thereof is 315be, and 315be is taken as the preset account number stored in the server side).
Step ten, mapping characters 0 on the 8 th unit, the 9 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 15 th unit, the 16 th unit, the 17 th unit, the 20 th unit, the 21 st unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 nd cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, the character mapped on the 22 th cell is 0, the character mapped on the 23 th cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
In the tenth step, the characters mapped by the units 1, 2, 3, 8230, 8230and the end codes are written into lines to obtain binary character strings of 11000100000100000110000111110.
The twelfth step, the binary character string 11000100000100000110000111110 is converted into the hexadecimal character string 18820c3e, and the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088642520000181
in the embodiment, the safety algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower case 16-system numerical values.
Fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088642520000182
in the fifteenth step, a password QR code is generated for the obtained security password 188f3647551830c11fbd2d43563f1867, as shown in fig. 5.
<xnotran> , 315be36db8ad7b3e3a7bb0839d6fa839 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001. </xnotran>
<xnotran> , 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 QR : </xnotran>
Due to the fact that
Figure BDA0003088642520000183
Thus, it is possible to provide
Figure BDA0003088642520000184
Eighteenth, since "z =1, the password QR code is a password QR connection code, as shown in fig. 5; if' z =2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes thereof; as shown in fig. 6; if' z =4, sequentially connecting 4 password QR codes from left to right to obtain password QR connecting codes thereof; as shown in fig. 7.
Nineteenth step, coding the black unit and the white unit in the password QR connecting code shown in figure 5 from left to right and from top to bottom in sequence, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, the unit 8230the unit 82841, and the size of the password QR code is 29.
Twentieth, only take the first behavior example because of more data; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 12 th, 14 th, 18 th, 19 th, 23 th, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are cipher code; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the initial example is taken in the twentieth step, 1 to 18 bits of the binary system of the secure password, i.e., 110001010110111110, the corresponding hexadecimal is 315be, and 315be is taken as the preset password stored at the server side).
Twenty-first, mapping character 0 to the 8 th unit, the 9 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 15 th unit, the 16 th unit, the 17 th unit, the 20 th unit, the 21 st unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, the character mapped on the 22 th cell is 0, the character mapped on the 23 th cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
In the twentieth step, the characters mapped by the units 1, 2, 3, 8230, 8230and the end codes are written into lines to obtain binary character strings 11000100000100000110000111110.
And a twentieth step of converting the binary character string 11000100000100000110000111110 into a hexadecimal character string 18820c3e to obtain the password combination code.
In the twenty-fourth step, account combination code 18820c3e and secured account 188f3647551830c11fbd2d43563f1867, password combination code 18820c3e and login secured password 188f3647551830c11fbd2d43563f1867 are sent to the server side.
Twenty-fifth step, the account combination code received by the server is 18820c3e, and the secured account received by the server is 188f3647551830c11fbd2d43563f1867;
twenty-sixth step, the server side converts the received account number combination code 18820c3e into binary account number combination code 11000100000100000110000111110; and generating a server-side account QR code from the received secured account 188f3647551830c11fbd2d43563f1867, as shown in fig. 5.
Twenty-seventh step, because
Figure BDA0003088642520000191
Thus, the device
Figure BDA0003088642520000192
Twenty-eighth step, because' J =1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 5; if' J =2, sequentially connecting the QR codes of the 2 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 6; if' J =4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 7.
Twenty-ninth step, coding the black unit and the white unit in the server-side account number QR connection code from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230and the unit 841, and the size of the server-side account number QR code is 29.
Thirty-third, encoding characters in the binary account number combination code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, 8230, and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 1, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, and the character corresponding to the 15 th character is 0, the 16 th character of the account corresponds to a character 0, the 17 th character of the account corresponds to a character 0, the 18 th character of the account corresponds to a character 1, the 19 th character of the account corresponds to a character 1, the 20 th character of the account corresponds to a character 0, the 21 st character of the account corresponds to a character 0, the 22 nd character of the account corresponds to a character 0, the 23 th character of the account corresponds to a character 0, the 24 th character of the account corresponds to a character 1, the 25 th character of the account corresponds to a character 1, the 26 th character of the account corresponds to a character 1, the 27 th character of the account corresponds to a character 1, the 28 th character of the account corresponds to a character 1, and the 29 th character of the account corresponds to a character 0.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, the 8230, the 8230and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the descending order; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain a binary character string of 110001010110111110 at the server end.
And thirty-third step, converting the binary character string 110001010110111110 at the server end into hexadecimal, and obtaining the account number 315be at the server end.
And thirty-fourth step, judging whether the server side account 315be is consistent with a preset account preset at the server side:
calculating a server side password because the server side account 315be is consistent with a preset account 315be preset in the server side;
thirty-fifth step, the server side converts the received cipher combination code 18820c3e into binary cipher combination code 11000100000100000110000111110; and generating a server-side password (QR) code from the received security password 188f3647551830c11fbd2d43563f1867, as shown in FIG. 5.
Thirty-sixth step, because
Figure BDA0003088642520000201
Thus, it is possible to provide
Figure BDA0003088642520000202
Thirty-seventh step, since "J =1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 5; if' J =2, sequentially connecting the 2 server-side password QR codes from left to right to obtain a server-side password QR connecting code; as shown in fig. 6; if' J =4, sequentially connecting the 4 server-side password QR codes from left to right to obtain the server-side password QR connecting codes; as shown in fig. 7.
And thirty-eighth step, sequentially coding black units and white units in the server-side password QR connecting code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit 8230, a unit 8230and a unit 841, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding characters in binary password combination code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the password respectively; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 1, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the 16 th character of the password corresponds to the character 0, the 17 th character of the password corresponds to the character 0, the 18 th character of the password corresponds to the character 1, the 19 th character of the password corresponds to the character 1, the 20 th character of the password corresponds to the character 0, the 21 st character of the password corresponds to the character 0, the 22 nd character of the password corresponds to the character 0, the 23 rd character of the password corresponds to the character 0, the 24 th character of the password corresponds to the character 1, the 25 th character of the password corresponds to the character 1, the 26 th character of the password corresponds to the character 1, the 27 th character of the password corresponds to the character 1, the 28 th character of the password corresponds to the character 1, and the 29 th character of the password corresponds to the character 0.
Forty steps, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, the 8230, the 8230and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And forty step, writing the characters mapped by the codes of the arranged black units into lines to obtain a binary character string of 110001010110111110 at the server end.
In the fortieth step, the binary string 110001010110111110 at the server end is converted into hexadecimal, and the password at the server end is 315be.
Step forty, determining whether the server-side password 315be is consistent with a preset password preset at the server side:
the login is passed because the server password 315be is consistent with the preset password 315be associated with the preset account preset at the server.
For example, in the first step, the login account input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.com.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account;
Figure BDA0003088642520000211
in the embodiment, the safety algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower case 16-system numerical values.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088642520000212
fourthly, an account QR code is generated for the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
<xnotran> , 188f3647551830c11fbd2d43563f1867 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111. </xnotran>
<xnotran> , 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 QR : </xnotran>
Due to the fact that
Figure BDA0003088642520000213
Thus, it is possible to provide
Figure BDA0003088642520000214
Seventhly, because z =1, the account QR code is an account QR connection code, as shown in fig. 2; if z =2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 3; if z =4, sequentially connecting the 4 account QR codes from left to right to obtain account QR connecting codes; as shown in fig. 4.
Eighthly, coding black units and white units in the account QR connecting code from left to right and from top to bottom sequentially, wherein the black units and the white units are respectively the unit 1, the unit 2, the unit 3, the unit 8230the unit 82841, and the unit 841, and the account QR code has the size of 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 9 th, 12 th, 16 th, 19 th, 20 th, 21 st, 23 rd, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1. (here, since only the first action example is taken in the ninth step, 1 to 20 bits of the binary system of the secured account number, that is, 11000100011110011011, are taken, the corresponding hexadecimal system thereof is c479b, and c479b is taken as the preset account number stored in the server side).
Step ten, mapping characters 0 on the 8 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 14 th unit, the 15 th unit, the 17 th unit, the 18 th unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 th cell is 1, the character mapped on the 1 st cell is 0, the 24 th cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the cell is 1, the character mapped on the cell is 0, the character mapped on the 1 th cell is 24 th cell is 0, the character mapped on the cell is 24.
In the tenth step, characters mapped by the units 1, 2, 3, 82308230and the end code are written into lines to obtain binary character strings 11000100000000010011100011011.
And step ten, converting the binary character string 11000100000000010011100011011 into a hexadecimal character string 1880271b to obtain the account number combination code.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088642520000221
in the embodiment, the safety algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower case 16-system numerical values.
Fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088642520000222
fifteenth, a password QR code is generated for the obtained security password 188f3647551830c11fbd2d43563f1867, as shown in fig. 5.
<xnotran> , 315be36db8ad7b3e3a7bb0839d6fa839 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001. </xnotran>
<xnotran> , 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 QR : </xnotran>
Due to the fact that
Figure BDA0003088642520000231
Thus, the device
Figure BDA0003088642520000232
Eighteenth, since "z =1, the password QR code is a password QR connection code, as shown in fig. 5; if' z =2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes thereof; as shown in fig. 6; if' z =4, sequentially connecting 4 password QR codes from left to right to obtain password QR connecting codes thereof; as shown in fig. 7.
Nineteenth step, coding the black unit and the white unit in the code QR connecting code shown in fig. 5 from left to right and from top to bottom in sequence, wherein the coding is respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230;, and the unit 841, and the size of the code QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher code; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the initial behavior is taken in the twentieth step, 1 to 18 bits of the binary system of the secure password, i.e., 110001010110111110, which corresponds to a hexadecimal number of 315be, and 315be is taken as the preset password stored in the server side).
Twenty-first, mapping character 0 to the 8 th unit, the 9 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 15 th unit, the 16 th unit, the 17 th unit, the 20 th unit, the 21 st unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, the character mapped on the 22 th cell is 0, the character mapped on the 23 th cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
In the twentieth step, the characters mapped by the units 1, 2, 3, 8230, 8230and the end codes are written into lines to obtain binary character strings 11000100000100000110000111110.
The twenty-third step, the binary character string 11000100000100000110000111110 is converted into hexadecimal character string 18820c3e, and the password combination code is obtained.
And a twenty-fourth step, sending the account number combination code 1880271b, the login secure account number 315be36db8ad7b3e3a7bb0839d6fa839, the password combination code 18820c3e and the secure password 188f3647551830c11fbd2d43563f1867 to the server side.
The twenty-fifth step, the account number combination code received by the server is 1880271b, and the login secure account number received by the server is 315be36db8ad7b3e3a7bb0839d6fa839;
twenty-sixth step, the server side converts the received account number combination code 1880271b into a binary account number combination code of 11000100000000010011100011011; and generating a server-side account QR code from the received login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Twenty-seventh step, because
Figure BDA0003088642520000241
Thus, the device
Figure BDA0003088642520000242
Twenty-eighth step, because J =1, the server-side account number QR code is the server-side account number QR connection code, as shown in fig. 2; if J =2, sequentially connecting the QR codes of the 2 server-side account numbers from left to right to obtain a QR connecting code of the server-side account number; as shown in fig. 3; if J =4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 4.
Twenty-ninth step, coding the black unit and the white unit in the server-side account number QR connection code from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230and the unit 841, and the size of the server-side account number QR code is 29.
Thirty-third step, encoding characters in the binary account number combination code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 0, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, and the character corresponding to the 15 th character is 0, the character corresponding to the 16 th character of the account is 1, the character corresponding to the 17 th character of the account is 0, the character corresponding to the 18 th character of the account is 0, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 1, the character corresponding to the 21 st character of the account is 1, the character corresponding to the 22 nd character of the account is 0, the character corresponding to the 23 th character of the account is 0, the character corresponding to the 24 th character of the account is 0, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 0, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 1.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, the 8230, the 8230and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the descending order; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 th cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 1.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain a binary character string of 11000100011110011011 at the server end.
And a thirty-third step, converting the binary character string 11000100011110011011 at the server end into a hexadecimal system to obtain the account number c479b at the server end.
And thirty-fourth step, judging whether the server side account number c479b is consistent with a preset account number preset at the server side:
calculating a server-side password because the server-side account number c479b is consistent with a preset account number c479b preset at the server side;
thirty-fifth step, the server side converts the received password combination code 18820c3e into binary password combination code 11000100000100000110000111110; and generating a server-side password (QR) code from the received security password 188f3647551830c11fbd2d43563f1867, as shown in FIG. 5.
Thirty-sixth step, because
Figure BDA0003088642520000251
Thus, it is possible to provide
Figure BDA0003088642520000252
Thirty-seventh step, since "J =1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 5; if' J =2, sequentially connecting the 2 server-side password QR codes from left to right to obtain a server-side password QR connecting code; as shown in fig. 6; if' J =4, sequentially connecting 4 server-side password QR codes from left to right to obtain server-side password QR connecting codes thereof; as shown in fig. 7.
Thirty-eighth step, coding the black unit and the white unit in the server-side password QR connection code from left to right and from top to bottom sequentially, wherein the black unit and the white unit are respectively the unit 1, the unit 2, the unit 3, \ 8230 \ 8230;, and the unit 841, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding characters in binary password combination code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the password respectively; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 1, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, and the character corresponding to the 15 th character of the password is 0, the 16 th character of the password corresponds to a character 0, the 17 th character of the password corresponds to a character 0, the 18 th character of the password corresponds to a character 1, the 19 th character of the password corresponds to a character 1, the 20 th character of the password corresponds to a character 0, the 21 st character of the password corresponds to a character 0, the 22 nd character of the password corresponds to a character 0, the 23 rd character of the password corresponds to a character 0, the 24 th character of the password corresponds to a character 1, the 25 th character of the password corresponds to a character 1, the 26 th character of the password corresponds to a character 1, the 27 th character of the password corresponds to a character 1, the 28 th character of the password corresponds to a character 1, and the 29 th character of the password corresponds to a character 0.
Forty steps, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, the 8230, the 8230and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the descending order; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
Forty step, writing the characters mapped by the codes of the arranged black units into lines to obtain a binary character string at the server end, namely 110001010110111110.
In the fortieth step, the binary string 110001010110111110 at the server end is converted into hexadecimal, and the password at the server end is 315be.
Step forty, determining whether the server-side password 315be is consistent with a preset password preset at the server side:
the login is passed because the server password 315be is consistent with the preset password 315be associated with the preset account preset at the server.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (7)

1. An engineering measurement intelligent management control platform system comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, and is characterized in that when a user successfully logs in the server end by using the mobile phone equipment end, default display information of the server end is displayed on the mobile phone equipment end; the working method of the engineering measurement intelligent management control platform system comprises the following steps:
s1, a user logs in a server side by using a mobile phone device side; the method for logging in the server by the user through the mobile phone equipment comprises the following steps:
s11, acquiring an input login account and a login password at a mobile phone device end;
s12, respectively carrying out security processing on the login account or/and the login password acquired in the step S11 to obtain a login security account or/and a login security password;
s13, respectively carrying out security processing on the login security account or/and the login security password obtained in the step S12 to obtain the security account or/and the security password;
s14, respectively generating an account QR code or/and a password QR code for the login security account or/and the login security password obtained in the step S12;
s15, combining the security account obtained in the step S13 with the QR code of the account generated in the step S14 to obtain an account combination code; or/and combining the security password obtained in the step S13 with the password QR code generated in the step S14 to obtain a password combination code; the method for combining the obtained safe account with the generated account QR code to obtain the account combination code comprises the following steps:
s151, converting the security account number into a security account number binary system;
s152, judging the relationship between the total number of binary digits of the safety account and the total number of black units in the QR code of the account:
Figure FDA0003789179880000011
wherein x represents the total number of digits of the secure account number binary system;
y represents the total number of black units in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z represents the total number of the QR codes of the account;
s153, if z is larger than or equal to 2, connecting the Z account number QR codes from left to right in sequence to obtain account number QR connecting codes; if z =1, only one account QR code is available, and the account QR code is an account QR connection code; sequentially coding black units and white units in the QR connecting code of the account from left to right and from top to bottom,1 st cell, 2 nd cell, 3 rd cell, \8230;, A-th cell, A = z × α 2 Wherein, alpha represents the size of the QR code of the account;
s154, encoding characters in a binary system of the safety account number from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230of the account number, and the y th character of the account number respectively; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of the account, wherein the characters are 8230, and the y-th character of the account are sequentially mapped to a y arrangement code;
s155, extracting the arrangement code mapped by the character corresponding to the y character of the account number to obtain a stop code; mapping characters 0 or 1 to other units of the unmapped characters before the cut-off codes;
s156, writing a line according to characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, \8230;, the cut-off code respectively to obtain a binary character string;
s157, converting the binary character string into a hexadecimal character string to obtain the account number combination code;
s16, the account number combination code or/and the password combination code obtained in the step S15 and the login safety account number corresponding to the account number combination code or/and the login safety password corresponding to the password combination code are/is sent to a server side for verification accuracy;
and S2, after the user successfully logs in the server by using the mobile phone equipment terminal, inquiring and displaying the data of the server.
2. The intelligent management control platform system for engineering measurement as claimed in claim 1, wherein the default display information at the server includes one or any combination of a project management module, a personnel management module, an equipment management module, a learning module, a data management module, and a task information module.
3. The system of claim 2, wherein the project management module comprises one or any combination of a help module, a project list module, a route calculation module, a new project module, and a project profile module;
the help module is used for providing an operation description of the software system; the item list module is used for displaying all items related to the current user; the line calculation module is used for calculating and displaying input data; the new project module is used for allowing a legal user to add a new project; the item profile module is used for displaying and providing basic information for modifying the selected items in the item list module;
or/and the personnel management module comprises one or any combination of a personnel information module, a user authority module, a personnel allocation module, a project allocation module and a role module;
the personnel information module is used for storing personal information of personnel, and comprises one or any combination of name, identification card number, contact telephone, age, native place, college and university, academic degree and work experience;
the user authority module is used for giving the user the authority to use the corresponding functional module; the personnel allocation module is used for recording personnel allocation process; the project allocation module is used for allocating personnel to each project name; the role module is used for defining the authority of the user;
or/and the equipment management module comprises one or any combination of an equipment management method module, an equipment information module and an equipment allocation module;
the equipment management method module is used for displaying the use and maintenance method of each equipment; the equipment information module is used for displaying various attributes of the item equipment, including one or any combination of type, starting date, checked date and maintenance record; the equipment transferring module is used for transferring the flow of the equipment;
or/and the learning module comprises a learning material module or/and a rapid self-testing module;
the learning materials are used for displaying various learning materials; the quick self-testing module is used for testing knowledge points by a user;
the examination module comprises a question bank module, a test paper module, an examination module and a result analysis module; the question bank module is used for inputting an examination question bank and a self-testing question bank, and the test paper combining module and the rapid self-testing module respectively select test questions from the examination question bank and the self-testing question bank; the examination paper combining module is used for customizing examination ranges, examination time and reference personnel by a user to extract questions and combine papers; the examination module is used for a reference person to take an examination; the result analysis module checks the examination result and obtains various analysis results;
or/and the task information module comprises one or any combination of a project management approval module, a learning task module, an assessment task module and an equipment management approval module;
the project management approval module is used for prompting a user about a process to be approved in project management and providing a quick entrance for approval; the learning task module is used for prompting a user to learn a task and providing a learning shortcut entrance; the examination task module is used for prompting the examination task of the user and providing a quick entrance for taking an examination; the equipment management approval module is used for prompting the user equipment management aspect to-be-approved process and providing a quick entrance for approval.
4. The intelligent management control platform system for engineering measurement according to claim 3, wherein the line calculation module comprises one or any combination of a data entry module, a data approval module, a parameter setting module and a calculation result module;
the data output end of the data input module is connected with the data input end of the data approval module, the data output end of the data approval module is connected with the data input end of the parameter setting module, and the data output end of the parameter setting module is connected with the data input end of the calculation result module;
the data entry module is used for the entry of data by users with different authorities; the data approval module is used for approving the input data; the parameter setting module is used for setting the format of the input data; and the calculation result module is used for displaying the calculation result of the approval process data.
5. The system of claim 1, wherein in step S12, the method for performing login account security processing on the acquired login account to obtain a login security account comprises:
Figure FDA0003789179880000041
wherein Locinecuritynumber represents a login security account;
the method for carrying out login password security processing on the obtained login password to obtain the login security password comprises the following steps:
Figure FDA0003789179880000051
security number represents a login password;
loginsafetynumber represents a login security password;
Figure FDA0003789179880000052
representing a security algorithm;
securitynumber denotes a login account.
6. The system of claim 1, wherein in step S13, the obtained login security account is subjected to a login security account security process, and the method for obtaining the security account comprises:
Figure FDA0003789179880000053
wherein the content of the first and second substances,
Figure FDA0003789179880000054
representing a security algorithm;
logins securitynumber represents a login secured account number;
loginstecurynymber' represents a secured account number;
the method for performing login security password security processing on the obtained login security password to obtain the security password comprises the following steps:
Figure FDA0003789179880000055
loginsafetynumber represents a login security password;
loginsafetynumber' represents a security password.
7. The system of claim 1, wherein in step S16, the method for the server to verify the correctness of the account number binding code comprises the following steps:
s161, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received login security account;
s162, judging the relation between the total digits of the binary account number combination code and the total number of black units and white units in the QR code of the server-side account number:
Figure FDA0003789179880000061
wherein K represents the total digits of the binary account number binding codes;
l represents the total number of black units and white units in the QR code of the server-side account;
if represents the condition if;
z represents a set of all integers;
int [ ] represents a rounding function;
j represents the total number of the QR codes of the server-side account;
s163, if J is larger than or equal to 2, sequentially connecting the J server-side account numbers QR codes from left to right to obtain server-side account number QR connecting codes; if J =1, only one server-side account number QR code is available, and the server-side account number QR code is a server-side account number QR connection code; for black units and white units in QR (quick response) connection codes of server-side account numbersThe elements are sequentially encoded from left to right and from top to bottom, namely unit 1, unit 2, unit 3, \ 8230 \ 8230;. Unit V, and unit V = J × δ 2 Wherein, δ represents the size of the QR code of the server-side account;
s164, encoding characters in the binary account number binding code from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, the 8230, the 8230and the Kth character of the account number respectively; the method comprises the steps of mapping characters corresponding to the 1 st character, the 2 nd character and the 3 rd character of an account, wherein the characters are (8230); and the characters corresponding to the Kth character of the account are mapped to the 1 st unit, the 2 nd unit, the 3 rd unit, the (8230); and (K) unit in sequence;
s165, extracting 1 st unit, 2 nd unit, 3 rd unit, \8230 \ 8230;, K unit is black unit code;
s166, arranging the extracted codes of the black units in a sequence from small to large, and writing characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s167, converting the server-side binary character string into the binary string which is the same as the security account number in the step S13, and obtaining the server-side account number;
s168, judging whether the account number of the server side is consistent with a preset account number preset at the server side:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server-side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
CN202110588807.1A 2021-05-28 2021-05-28 Engineering survey intelligent management control platform Active CN113312536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110588807.1A CN113312536B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110588807.1A CN113312536B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control platform

Publications (2)

Publication Number Publication Date
CN113312536A CN113312536A (en) 2021-08-27
CN113312536B true CN113312536B (en) 2022-11-08

Family

ID=77375672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110588807.1A Active CN113312536B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control platform

Country Status (1)

Country Link
CN (1) CN113312536B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login
CN107515717A (en) * 2017-09-05 2017-12-26 三星电子(中国)研发中心 A kind of exchange method of information, system and device
CN109214198A (en) * 2018-08-13 2019-01-15 苏州泥娃软件科技有限公司 A kind of secure cloud document system encrypting search
CN109685452A (en) * 2018-12-04 2019-04-26 国网河北省电力有限公司石家庄供电分公司 A kind of power supply company's item data management platform
CN110611685A (en) * 2019-10-30 2019-12-24 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition
CN110751363A (en) * 2019-09-03 2020-02-04 广东电网有限责任公司培训与评价中心 Intelligent training evaluation system and method
CN110827459A (en) * 2019-09-29 2020-02-21 江苏理工学院 Encrypted two-dimensional code identity authentication system
CN111026798A (en) * 2019-12-05 2020-04-17 苏州中车建设工程有限公司 Electromechanical equipment database system and control method thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103731543A (en) * 2012-10-13 2014-04-16 成都哆可梦网络科技有限公司 Login system for two-dimension code mobile games
US9525667B2 (en) * 2013-06-07 2016-12-20 Tencent Technology (Shenzhen) Co., Ltd. Method and system for roaming website account and password
US11356262B2 (en) * 2018-07-03 2022-06-07 Royal Bank Of Canada System and method for anonymous location verification
CN110445805A (en) * 2019-08-22 2019-11-12 北京中科锐链科技有限公司 A kind of false-proof authentication system and method for two dimensional code

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login
CN107515717A (en) * 2017-09-05 2017-12-26 三星电子(中国)研发中心 A kind of exchange method of information, system and device
CN109214198A (en) * 2018-08-13 2019-01-15 苏州泥娃软件科技有限公司 A kind of secure cloud document system encrypting search
CN109685452A (en) * 2018-12-04 2019-04-26 国网河北省电力有限公司石家庄供电分公司 A kind of power supply company's item data management platform
CN110751363A (en) * 2019-09-03 2020-02-04 广东电网有限责任公司培训与评价中心 Intelligent training evaluation system and method
CN110827459A (en) * 2019-09-29 2020-02-21 江苏理工学院 Encrypted two-dimensional code identity authentication system
CN110611685A (en) * 2019-10-30 2019-12-24 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition
CN111026798A (en) * 2019-12-05 2020-04-17 苏州中车建设工程有限公司 Electromechanical equipment database system and control method thereof

Also Published As

Publication number Publication date
CN113312536A (en) 2021-08-27

Similar Documents

Publication Publication Date Title
CN107959568A (en) A kind of measurement verification calibration digital certificates intelligent generation method and system
CN113434485B (en) Data quality health degree analysis method and system based on multidimensional analysis technology
CN114626694B (en) Network course planning management system based on internet
CN112906361A (en) Text data labeling method and device, electronic equipment and storage medium
CN113312536B (en) Engineering survey intelligent management control platform
CN114742529B (en) Laboratory equipment maintenance management system
CN114021440B (en) FPGA (field programmable Gate array) time sequence simulation verification method and device based on MATLAB (matrix laboratory)
CN113312535B (en) Engineering survey intelligent management control cloud platform
CN113312534B (en) Engineering survey intelligent management platform
CN112486957B (en) Database migration detection method, device, equipment and storage medium
CN114139931A (en) Enterprise data evaluation method and device, computer equipment and storage medium
CN113837113A (en) Document verification method, device, equipment and medium based on artificial intelligence
CN110674493B (en) BIM system login verification method and system
CN115859836A (en) Rock mass creep constitutive model parameter identification method, device, equipment and medium
CN115827353A (en) Fault diagnosis method and device
CN107231330A (en) A kind of password determination, login validation method and equipment
CN112085469B (en) Data approval method, device, equipment and storage medium based on vector machine model
CN107944507A (en) Packaging products in boxes error-reporting method and its system
CN113128440A (en) Target object identification method, device, equipment and storage medium based on edge equipment
CN111400695A (en) Equipment fingerprint generation method, device, equipment and medium
CN111131263A (en) Data viewing method and device
CN113435696B (en) Method and system for evaluating emergency disposal capability of rail transit vehicle dispatcher
CN115941712B (en) Method and device for processing report data, computer equipment and storage medium
CN116389013B (en) Short message password verification method, mobile terminal and system
CN113254808B (en) GIS data screening method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant