CN114499972B - Purchasing management login data working system - Google Patents

Purchasing management login data working system Download PDF

Info

Publication number
CN114499972B
CN114499972B CN202111620637.7A CN202111620637A CN114499972B CN 114499972 B CN114499972 B CN 114499972B CN 202111620637 A CN202111620637 A CN 202111620637A CN 114499972 B CN114499972 B CN 114499972B
Authority
CN
China
Prior art keywords
character
password
account
login
account number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111620637.7A
Other languages
Chinese (zh)
Other versions
CN114499972A (en
Inventor
冯领
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Medical and Pharmaceutical College
Original Assignee
Chongqing Medical and Pharmaceutical College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Medical and Pharmaceutical College filed Critical Chongqing Medical and Pharmaceutical College
Priority to CN202111620637.7A priority Critical patent/CN114499972B/en
Publication of CN114499972A publication Critical patent/CN114499972A/en
Application granted granted Critical
Publication of CN114499972B publication Critical patent/CN114499972B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a purchasing management login data working system, which comprises a login acquisition module and a verification login module; the data output end of the login acquisition module is connected with the data input of the verification login module; the login acquisition module is used for acquiring a terminal account number and a terminal password by a login terminal; the verification login module is used for sending the obtained login account number and login password as well as the physical address of the login terminal to the cloud management platform for verification. The cloud management platform management method and the cloud management platform management system can improve the safety of the cloud management platform and prevent important data from being leaked.

Description

Purchasing management login data working system
Technical Field
The invention relates to the technical field of asset security, in particular to a purchasing management login data working system.
Background
Today, the globalization of economy is increasingly accelerated, the continuous optimization and update of information technology are performed, the development speed of the information industry is faster and faster, the business operation mode is more and more, particularly, the development of cloud computing, virtualization and other technologies in recent years is performed, the intelligent network terminal is increased, the large data platform technology is widely applied, and the generated data volume is increased explosively. The increase of data brings about a greater value contained in the data, in which case the security of the data becomes particularly important. Most of the current internet malicious behaviors aim at stealing data information and getting violence from the data information. Therefore, the computer information security work is more important and urgent, which not only reduces the information risk, but also improves the authenticity of the data information.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a purchasing management login data working system.
In order to achieve the above object of the present invention, the present invention provides a purchasing management login data working system, including a login acquisition module and a verification login module;
the data output end of the login acquisition module is connected with the data input end of the verification login module;
the login acquisition module is used for acquiring a terminal account number and a terminal password by a login terminal;
the verification login module is used for sending the obtained login account number and login password as well as the physical address of the login terminal to the cloud management platform for verification.
In a preferred embodiment of the present invention, the system further comprises an IP address comparing module and a security processing module;
the data output end of the login acquisition module is connected with the data input end of the IP address comparison module, the data output first end of the IP address comparison module is connected with the data input end of the security processing module, the data output second end of the IP address comparison module is connected with the data input first end of the authentication login module, and the data output end of the security processing module is connected with the data input second end of the authentication login module;
The IP address comparison module is used for judging whether the registered IP address is consistent with the last IP address or not by the login terminal:
if the logged-in IP address is inconsistent with the last IP address, the last IP address is a common IP address, and if the use times or/and the use accumulated time length of the IP address are greater than or equal to a preset use times threshold value or/and a preset use accumulated time length threshold value, the IP address is the common IP address; executing a safety processing module;
if the registered IP address is consistent with the last IP address, the terminal account number and the terminal password are the login account number and the login password; executing a verification login module;
the security processing module is used for respectively performing security processing on the terminal account number and the terminal password acquired in the login acquisition module to acquire a login account number and a login password; the calculation method for obtaining the login account comprises the following steps:
A′=Numerical value algorithm||A-P||,
a represents an account number character string;
p represents a password string;
-representing a character connector;
numerical value algorithm is indicative of a numerical operation method;
a' represents a login account;
the calculation method for obtaining the login password comprises the following steps:
P′=Numerical value algorithm||P-A||,
a represents an account number character string;
p represents a password string;
-representing a character connector;
numerical value algorithm is indicative of a numerical operation method;
P' represents a login password.
In a preferred embodiment of the present invention, the method for verifying login by the cloud end management platform in the login obtaining module includes the following steps:
s41, the cloud management platform takes the received login account as a query code to query whether the received login account exists in an account database:
if the received login account does not exist in the account database, the cloud management platform sends feedback information to the login terminal, wherein the feedback information is an input account character error, and the account character and the password character are requested to be input again;
if the received login account exists in the account database, extracting a password and a physical address corresponding to the received login account;
s42, judging whether the extracted physical address is consistent with the received physical address:
if the extracted physical address is consistent with the received physical address, executing the next step;
if the extracted physical address is inconsistent with the received physical address, the login terminal corresponding to the login account is not a common login terminal, and a binding code is sent to the mobile phone number associated with the login account; sending the received binding code through the associated mobile phone number, and taking the login terminal corresponding to the physical address as a common login terminal; logging in the cloud management platform successfully;
S43, judging whether the extracted password is consistent with the received password characters:
if the extracted password is consistent with the received password character, logging in the cloud management platform is successful;
if the extracted password is inconsistent with the received password character, the cloud management platform sends feedback information to the login terminal, wherein the feedback information is that the input password character is wrong, and the account character and the password character are input again.
In a preferred embodiment of the present invention, the method for obtaining a terminal account by logging in a terminal in a login obtaining module includes the following steps:
s11, let i=1;
s12, inputting an account character A in an account input box i ,A i I=1, 2, 3, … …, I representing the I-th account character input to the account input box; i represents the total number of the account number characters input to the account number input box;
s13, the account number character A i Conversion to secured account number character A i ′,A i ' represents the ith character A input to the account number input box i The corresponding secured account number character;
s14, judging the size relation between I and I:
if I is not less than I, executing the next step;
if I > I, i=i+1, returning to step S12;
s15, connecting the safety account number characters to form an account number character string which is the terminal account number; the method for connecting the safety account number characters to form the account number character string comprises the following steps:
A=A 1 ′-A 2 ′-A 3 ′-…-A I ′,
Wherein A represents an account number character string;
A 1 ' 1 st character A which represents input to account number input box 1 The corresponding secured account number character;
A 2 ' represent the 2 nd character A entered into the account entry box 2 The corresponding secured account number character;
A 3 ' represent the 3 rd character A entered into the Account input box 3 The corresponding secured account number character;
A I ' represent the I-th character A entered into the account entry box I The corresponding secured account number character;
-representing a character connector.
In a preferred embodiment of the present invention, the method for obtaining the terminal password by logging in the terminal in the login obtaining module includes the following steps:
s1-1, let j=1;
s1-2, inputting a password character P in a password input box j ,P j A J-th password character inputted to the password input box is represented, j=1, 2, 3, … …, J; j represents the total number of the password characters input to the password input box;
s1-3, the password character P j Conversion to secure password characters P j ′,P j ' represents the j-th character P input to the password input box j The corresponding secure password character;
s1-4, judging the size relation between J and J:
if J is more than or equal to J, executing the next step;
if J > J, j=j+1, returning to step S1-2;
s1-5, connecting the safety password characters to form a password character string which is the terminal password; the method for connecting the safe password characters to form the password character string comprises the following steps:
P=P 1 ′-P 2 ′-P 3 ′-…-P J ′,
Wherein P represents a password string;
P 1 ' represent the 1 st character P entered into the password entry box 1 The corresponding secure password character;
P 2 ' represent the 2 nd character P entered into the password entry box 2 The corresponding secure password character;
P 3 ' represents the 3 rd character P entered into the password entry box 3 The corresponding secure password character;
P J ' represents the J-th character P entered into the password entry box J The corresponding secure password character;
-representing a character connector.
In a preferred embodiment of the invention, the account number character a is entered in step S13 i Conversion to secured account number character A i The' method comprises the steps of:
s131, forming all account characters into an account character set { a } 1 ,a 2 ,a 3 ,…a I′ (wherein a) 1 Representing the 1 st account number character, a 2 Representing the 2 nd account number character, a 3 Representing the 3 rd account number character, a I′ The method comprises the steps of representing an I 'account character, wherein I' represents the total number of all account characters; a, a 1 ≠a 2 ≠a 3 ≠……≠a I′ The method comprises the steps of carrying out a first treatment on the surface of the Let i' =1;
s132, for the ith account number character a i′ Performing numerical operation to obtain an ith account character value, wherein the calculation method for obtaining the ith account character value comprises the following steps:
a i′ ′=Numerical value algorithm||a i′ ||,
wherein a is i′ Representing the ith account number character;
numerical value algorithm is indicative of a numerical operation method;
a i′ 'represent the i' th account character value;
S133, judging the size relation between I 'and I':
if I 'is not less than I', executing the next step;
if I '> I', I '=i' +1; returning to step S132;
s134, arranging all the account number character values in the order from small to large or from large to small, wherein the order corresponding to the ith account number character value is the order of the ith account number character corresponding to the ith account number character value; let i "=1;
s135, for the ith account number character value a i′ The numerical operation is carried out to obtain an ith character account value, and the calculation method for obtaining the ith character account value comprises the following steps:
a i″ ″=Numerical value algorithm||a i′ ′||,
wherein a is i″ ' represents the i "th account character value;
numerical value algorithm is indicative of a numerical operation method;
a i″ "represents the i" th character account value;
s136, judging the size relation between I 'and I':
if I '-is not less than I', executing the next step;
if I' > I ", then I" =i "+1; returning to step S135;
s137, arranging all the character account values in the order from small to large or from large to small, wherein the order corresponding to the ith character account value is the order of the ith account character corresponding to the ith character account value;
s138, the order of the ith account number character corresponding to the ith account number character value in the step S134 and the order of the ith account number character corresponding to the ith' character account number value in the step S137 are all the safety account number characters corresponding to all the account number characters.
In a preferred embodiment of the invention, the cryptographic character a is entered in step S13 i Conversion to secure password character A i The' method comprises the steps of:
s13-1, all the password characters form a password character set { p } 1 ,p 2 ,p 3 ,…p J′ P, where 1 Representing the 1 st cipher character, p 2 Representing the 2 nd cipher character, p 3 Representing the 3 rd cipher character, p J′ Represents the J 'th password character, J' representing the total number of all password characters; p is p 1 ≠p 2 ≠p 3 ≠……≠p J′ The method comprises the steps of carrying out a first treatment on the surface of the Let j' =1;
s13-2, for the j' th password character p j′ Performing numerical operation to obtain a j 'password character value, wherein the calculation method for obtaining the j' password character value comprises the following steps:
p j′ ′=Numerical value algorithm||p j′ ||,
wherein p is j′ Representing a j' th password character;
numerical value algorithm is indicative of a numerical operation method;
p j′ 'represents the j' th password character value;
s13-3, judging the size relation between J 'and J':
if J 'is not less than J', executing the next step;
if J '> J', J '=j' +1; returning to the step S13-2;
s13-4, arranging all the password character values in the order from small to large or from large to small, wherein the order corresponding to the j ' password character value is the order of the j ' password character corresponding to the j ' password character value; let j "=1;
s13-5, for the j' th password character value p j″ The method for calculating the j' character password value comprises the following steps of:
p j″ ″=Numerical value algorithm||p j″ ′||,
wherein p is j″ ' represents the j "th password character value;
numerical value algorithm is indicative of a numerical operation method;
p j″ "represents the j" character password value;
s13-6, judging the size relation between J 'and J':
if J '-is not less than J', executing the next step;
if J' > J ", J" =j "+1; returning to the step S13-5;
s13-7, arranging all the character password values in the order from small to large or from large to small, wherein the order corresponding to the j ' character password value is the order of the j ' password character corresponding to the j ' character password value;
s13-8, the order of the j 'cipher characters corresponding to the j' cipher character value in the step S13-4 and the order of the j 'cipher characters corresponding to the j' cipher character value in the step S13-7 are all the security cipher characters corresponding to all the cipher characters.
In summary, by adopting the technical scheme, the cloud management platform can be improved in safety and important data leakage can be prevented.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
fig. 1 is a schematic block diagram of the connection of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
The invention discloses a purchasing management login data working system, which is shown in figure 1 and comprises a login acquisition module and a verification login module;
the data output end of the login acquisition module is connected with the data input end of the verification login module;
the login acquisition module is used for acquiring a terminal account number and a terminal password by a login terminal;
the verification login module is used for sending the obtained login account number and login password as well as the physical address of the login terminal to the cloud management platform for verification.
In a preferred embodiment of the present invention, the system further comprises an IP address comparing module and a security processing module;
The data output end of the login acquisition module is connected with the data input end of the IP address comparison module, the data output first end of the IP address comparison module is connected with the data input end of the security processing module, the data output second end of the IP address comparison module is connected with the data input first end of the authentication login module, and the data output end of the security processing module is connected with the data input second end of the authentication login module;
the IP address comparison module is used for judging whether the registered IP address is consistent with the last IP address or not by the login terminal:
if the logged-in IP address is inconsistent with the last IP address, the last IP address is a common IP address, and if the use times or/and the use accumulated time length of the IP address are greater than or equal to a preset use times threshold value or/and a preset use accumulated time length threshold value, the IP address is the common IP address; executing a safety processing module;
if the registered IP address is consistent with the last IP address, the terminal account number and the terminal password are the login account number and the login password; executing a verification login module;
the security processing module is used for respectively performing security processing on the terminal account number and the terminal password acquired in the login acquisition module to acquire a login account number and a login password; the calculation method for obtaining the login account comprises the following steps:
A′=Numerical value algorithm||A-P||,
A represents an account number character string;
p represents a password string;
-representing a character connector;
numerical value algorithm is indicative of a numerical operation method;
a' represents a login account;
the calculation method for obtaining the login password comprises the following steps:
P′=Numerical value algorithm||P-A||,
a represents an account number character string;
p represents a password string;
-representing a character connector;
numerical value algorithm is indicative of a numerical operation method;
p' represents a login password.
In a preferred embodiment of the present invention, the method for verifying login by the cloud end management platform in the login obtaining module includes the following steps:
s41, the cloud management platform takes the received login account as a query code to query whether the received login account exists in an account database:
if the received login account does not exist in the account database, the cloud management platform sends feedback information to the login terminal, wherein the feedback information is an input account character error, and the account character and the password character are requested to be input again;
if the received login account exists in the account database, extracting a password and a physical address corresponding to the received login account;
s42, judging whether the extracted physical address is consistent with the received physical address:
If the extracted physical address is consistent with the received physical address, executing the next step;
if the extracted physical address is inconsistent with the received physical address, the login terminal corresponding to the login account is not a common login terminal, and a binding code is sent to the mobile phone number associated with the login account; sending the received binding code through the associated mobile phone number, and taking the login terminal corresponding to the physical address as a common login terminal; logging in the cloud management platform successfully;
s43, judging whether the extracted password is consistent with the received password characters:
if the extracted password is consistent with the received password character, logging in the cloud management platform is successful;
if the extracted password is inconsistent with the received password character, the cloud management platform sends feedback information to the login terminal, wherein the feedback information is that the input password character is wrong, and the account character and the password character are input again.
In a preferred embodiment of the present invention, the method for obtaining a terminal account by logging in a terminal in a login obtaining module includes the following steps:
s11, let i=1;
s12, inputting an account character A in an account input box i ,A i I=1, 2, 3, … …, I representing the I-th account character input to the account input box; i represents the total number of the account number characters input to the account number input box;
S13, the account number character A i Conversion to secured account number character A i ′,A i ' represents the ith character A input to the account number input box i The corresponding secured account number character;
s14, judging the size relation between I and I:
if I is not less than I, executing the next step;
if I > I, i=i+1, returning to step S12;
s15, connecting the safety account number characters to form an account number character string which is the terminal account number; the method for connecting the safety account number characters to form the account number character string comprises the following steps:
A=A 1 ′-A 2 ′-A 3 ′-…-A I ′,
wherein A represents an account number character string;
A 1 ' 1 st character A which represents input to account number input box 1 The corresponding secured account number character;
A 2 ' represent the 2 nd character A entered into the account entry box 2 The corresponding secured account number character;
A 3 ' represent the 3 rd character A entered into the Account input box 3 The corresponding secured account number character;
A I ' represent the I-th character A entered into the account entry box I The corresponding secured account number character;
-representing a character connector.
In a preferred embodiment of the present invention, the method for obtaining the terminal password by logging in the terminal in the login obtaining module includes the following steps:
s1-1, let j=1;
s1-2, inputting a password character P in a password input box j ,P j A J-th password character inputted to the password input box is represented, j=1, 2, 3, … …, J; j represents the total number of the password characters input to the password input box;
S1-3, the password character P j Conversion to secure password characters P j ′,P j ' represents the j-th character P input to the password input box j The corresponding secure password character;
s1-4, judging the size relation between J and J:
if J is more than or equal to J, executing the next step;
if J > J, j=j+1, returning to step S1-2;
s1-5, connecting the safety password characters to form a password character string which is the terminal password; the method for connecting the safe password characters to form the password character string comprises the following steps:
P=P 1 ′-P 2 ′-P 3 ′-…-P J ′,
wherein P represents a password string;
P 1 ' represent the 1 st character P entered into the password entry box 1 The corresponding secure password character;
P 2 ' represent the 2 nd character P entered into the password entry box 2 The corresponding secure password character;
P 3 ' represents the 3 rd character P entered into the password entry box 3 The corresponding secure password character;
P J ' represents the J-th character P entered into the password entry box J The corresponding secure password character;
-representing a character connector.
In a preferred embodiment of the invention, the account number character a is entered in step S13 i Conversion to secured account number character A i The' method comprises the steps of:
s131, forming all account characters into an account character set { a } 1 ,a 2 ,a 3 ,…a I′ (wherein a) 1 Representing the 1 st account number character, a 2 Representing the 2 nd account number character, a 3 Representing the 3 rd account number character, a I′ The method comprises the steps of representing an I 'account character, wherein I' represents the total number of all account characters; a, a 1 ≠a 2 ≠a 3 ≠……≠a I′ The method comprises the steps of carrying out a first treatment on the surface of the Let i' =1;
s132, for the ith account number character a i′ Performing numerical operation to obtain an ith account character value, wherein the calculation method for obtaining the ith account character value comprises the following steps:
a i′ ′=Numerical value algorithm||a i′ ||,
wherein a is i′ Representing the ith account number character;
numerical value algorithm is indicative of a numerical operation method;
a i′ 'represent the i' th account character value;
s133, judging the size relation between I 'and I':
if I 'is not less than I', executing the next step;
if I '> I', I '=i' +1; returning to step S132;
s134, arranging all the account number character values in the order from small to large or from large to small, wherein the order corresponding to the ith account number character value is the order of the ith account number character corresponding to the ith account number character value; let i "=1;
s135, for the ith account number character value a i″ The numerical operation is carried out to obtain an ith character account value, and the calculation method for obtaining the ith character account value comprises the following steps:
a i″ ″=Numerical value algorithm||a i″ ′||,
wherein a is i″ ' represents the i "th account character value;
numerical value algorithm is indicative of a numerical operation method;
a i″ "represents the i" th character account value;
S136, judging the size relation between I 'and I':
if I '-is not less than I', executing the next step;
if I' > I ", then I" =i "+1; returning to step S135;
s137, arranging all the character account values in the order from small to large or from large to small, wherein the order corresponding to the ith character account value is the order of the ith account character corresponding to the ith character account value;
s138, the order of the ith account number character corresponding to the ith account number character value in the step S134 and the order of the ith account number character corresponding to the ith' character account number value in the step S137 are all the safety account number characters corresponding to all the account number characters.
The characters comprise uppercase letter characters, lowercase letter characters, number characters and special characters, wherein the uppercase letter characters comprise A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y and Z, namely A-Z; the lower case letter characters include a, b, c, d, e, f, g, h, i, j, k, l, m, n, o, p, q, r, s, t, u, v, w, x, y and z, namely a-z; the digital characters include 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9, i.e., 0 to 9; special characters include), ++! , @, #, $,%, ++ x, (, {, },) and: ", |, <, >,? 'and' are shown, (v)," j, ", +, -and =.
For example, A, B, C,1,2,3 of capital letters and numerical characters are taken as all account characters, and the account character set formed by the capital letters and the numerical characters is { A, B, C,1,2,3}, namely a 1 =A,a 2 =B,a 3 =C,a 4 =1,a 5 =2,a 6 =3;
Performing numerical operation on account characters to obtain account character values:
numerical value algorithm A numerical method preferably adopts a Hash MD5 algorithm, and the result is a 16-bit character value of 16, and for the convenience of comparison, the 16-bit character value of 16 is converted into a 10-bit character value, which is>Representing a conversion symbol that converts a 16-ary 16-bit character value into a 10-ary character value.
All the account number character values are arranged from small to large as follows: a, a 3 ′ a 6 ′ a 5 ′ a 4 ′ a 1 ′ a 2 ′;
The order of all account characters is: c3 2a 1B;
performing numeric operation on account number character values to obtain character account number values:
all the character account numbers are arranged from small to largeThe method comprises the following steps: a, a 6 ″ a 5 ″ a 4 ″ a 3 ″ a 1 ″ a 2 ″;
The order of all account characters is: 3 2 1C A B;
all account characters are as follows: c3 2a 1B;
all of its secured account number characters are: 3 2 1c a B;
that is, all account characters are: A. b, C,1,2, 3;
all of its secured account number characters are: A. b, 3, C,1, 2;
if the account character string input in the account input box is 112333AAC12A, the corresponding secured account character is CC1222AA3C1A.
In a preferred embodiment of the invention, the cryptographic character a is entered in step S13 i Conversion to secure password character A i The' method comprises the steps of:
s13-1, all the password characters form a password character set { p } 1 ,p 2 ,p 3 ,…p J′ P, where 1 Representing the 1 st cipher character, p 2 Representing the 2 nd cipher character, p 3 Representing the 3 rd cipher character, p J′ Represents the J 'th password character, J' representing the total number of all password characters; p is p 1 ≠p 2 ≠p 3 ≠……≠p J′ The method comprises the steps of carrying out a first treatment on the surface of the Let j' =1;
s13-2, for the j' th password character p j′ Performing numerical operation to obtain a j 'password character value, wherein the calculation method for obtaining the j' password character value comprises the following steps:
p j′ ′=Numerical value algorithm||p j′ ||,
wherein p is j′ Representing a j' th password character;
numerical value algorithm is indicative of a numerical operation method;
p j′ 'represents the j' th password character value;
s13-3, judging the size relation between J 'and J':
if J 'is not less than J', executing the next step;
if J '> J', J '=j' +1; returning to the step S13-2;
s13-4, arranging all the password character values in the order from small to large or from large to small, wherein the order corresponding to the j ' password character value is the order of the j ' password character corresponding to the j ' password character value; let j "=1;
s13-5, for the j' th password character value p j″ The method for calculating the j' character password value comprises the following steps of:
p j″ ″=Numerical value algorithm||p j″ ′||,
wherein p is j″ ' represents the j "th password character value;
numerical value algorithm is indicative of a numerical operation method;
p j″ "represents the j" character password value;
s13-6, judging the size relation between J 'and J':
if J '-is not less than J', executing the next step;
if J' > J ", J" =j "+1; returning to the step S13-5;
s13-7, arranging all the character password values in the order from small to large or from large to small, wherein the order corresponding to the j ' character password value is the order of the j ' password character corresponding to the j ' character password value;
s13-8, the order of the j 'cipher characters corresponding to the j' cipher character value in the step S13-4 and the order of the j 'cipher characters corresponding to the j' cipher character value in the step S13-7 are all the security cipher characters corresponding to all the cipher characters.
For example, A, B, C, 1,2,3 of capital letters and numerical characters are taken as all account characters, and the cipher character set formed by the capital letters and the numerical characters is {1,2,3, A, B, C }, namely p 1 =1,p 2 =2,p 3 =3,p 4 =A,p 5 =B,p 6 =C;
Performing numeric operation on the password characters to obtain password character values:
/>
All the password character values are arranged from small to large as follows: p is p 6 ′ p 3 ′ p 2 ′ p 1 ′ p 4 ′ p 5 ′;
The order of all the cryptographic characters is: c3 2a 1B;
performing numeric operation on the password character value to obtain a character password value:
/>
all the character password values are arranged from small to large as follows: p is p 3 ″ p 2 ″ p 1 ″ p 6 ″ p 4 ″ p 5 ″;
The order of all the cryptographic characters is: 32 1c a B;
all the password characters are as follows: c3 2a 1B;
all the security password characters are as follows: 32 1c a B;
that is, all the password characters are: A. b, C, 1, 2, 3;
all the security password characters are as follows: A. b, 3, C, 1, 2;
if the password character string input in the password input box is C12323ABC11A, the corresponding conversion character string is 3C1212AB3CCA.
The invention also discloses a working method of purchasing management login data, which comprises the following steps:
s1, a login terminal acquires a terminal account number and a terminal password;
s2, the login terminal judges whether the login IP address is consistent with the last IP address or not:
if the logged-in IP address is inconsistent with the last IP address, the last IP address is a common IP address, and if the use times or/and the use accumulated time length of the IP address are greater than or equal to a preset use times threshold value or/and a preset use accumulated time length threshold value, the IP address is the common IP address; executing the next step;
If the registered IP address is consistent with the last IP address, the terminal account number and the terminal password are the login account number and the login password; executing the step S4;
s3, respectively carrying out security processing on the terminal account number and the terminal password obtained in the step S1 to obtain a login account number and a login password; the calculation method for obtaining the login account comprises the following steps:
A′=Numerical value algorithm||A-P||,
a represents an account number character string;
p represents a password string;
-representing a character connector;
numerical value algorithm is indicative of a numerical operation method;
a' represents a login account;
the calculation method for obtaining the login password comprises the following steps:
P′=Numerical value algorithm||P-A||,
a represents an account number character string;
p represents a password string;
-representing a character connector;
numerical value algorithm is indicative of a numerical operation method;
p' represents a login password;
and S4, sending the obtained login account and login password and the physical address of the login terminal to a cloud management platform for verification.
In a preferred embodiment of the present invention, the method for verifying login by the cloud end management platform in step S4 includes the following steps:
s41, the cloud management platform takes the received login account as a query code to query whether the received login account exists in an account database:
If the received login account does not exist in the account database, the cloud management platform sends feedback information to the login terminal, wherein the feedback information is an input account character error, and the account character and the password character are requested to be input again;
if the received login account exists in the account database, extracting a password and a physical address corresponding to the received login account;
s42, judging whether the extracted physical address is consistent with the received physical address:
if the extracted physical address is consistent with the received physical address, executing the next step;
if the extracted physical address is inconsistent with the received physical address, the login terminal corresponding to the login account is not a common login terminal, and a binding code is sent to the mobile phone number associated with the login account; sending the received binding code through the associated mobile phone number, and taking the login terminal corresponding to the physical address as a common login terminal; logging in the cloud management platform successfully;
s43, judging whether the extracted password is consistent with the received password characters:
if the extracted password is consistent with the received password character, logging in the cloud management platform is successful;
if the extracted password is inconsistent with the received password character, the cloud management platform sends feedback information to the login terminal, wherein the feedback information is that the input password character is wrong, and the account character and the password character are input again.
In a preferred embodiment of the present invention, the method for obtaining a terminal account by logging in a terminal in step S1 includes the following steps:
s11, let i=1;
s12, inputting an account character A in an account input box i ,A i I=1, 2, 3, … …, I representing the I-th account character input to the account input box; i represents the total number of the account number characters input to the account number input box;
s13, the account number character A i Conversion to secured account number character A i ′,A i ' represents the ith character A input to the account number input box i The corresponding secured account number character;
s14, judging the size relation between I and I:
if I is not less than I, executing the next step;
if I > I, i=i+1, returning to step S12;
s15, connecting the safety account number characters to form an account number character string which is the terminal account number; the method for connecting the safety account number characters to form the account number character string comprises the following steps:
A=A 1 ′-A 2 ′-A 3 ′-…-A I ′,
wherein A represents an account number character string;
A 1 ' 1 st character A which represents input to account number input box 1 The corresponding secured account number character;
A 2 ' represent the 2 nd character A entered into the account entry box 2 The corresponding secured account number character;
A 3 ' represent the 3 rd character A entered into the Account input box 3 The corresponding secured account number character;
A I ' represent the I-th character A entered into the account entry box I The corresponding secured account number character;
-representing a character connector;
or/and the method for obtaining the terminal password by logging in the terminal in the step S1 comprises the following steps:
s1-1, let j=1;
s1-2, inputting a password character P in a password input box j ,P j A J-th password character inputted to the password input box is represented, j=1, 2, 3, … …, J; j represents the total number of the password characters input to the password input box;
s1-3, the password character P j Conversion to secure password characters P j ′,P j ' represents the j-th character P input to the password input box j The corresponding secure password character;
s1-4, judging the size relation between J and J:
if J is more than or equal to J, executing the next step;
if J > J, j=j+1, returning to step S1-2;
s1-5, connecting the safety password characters to form a password character string which is the terminal password; the method for connecting the safe password characters to form the password character string comprises the following steps:
P=P 1 ′-P 2 ′-P 3 ′-…-P J ′,
wherein P represents a password string;
P 1 ' represent the 1 st character P entered into the password entry box 1 The corresponding secure password character;
P 2 ' represent the 2 nd character P entered into the password entry box 2 The corresponding secure password character;
P 3 ' represents the 3 rd character P entered into the password entry box 3 The corresponding secure password character;
P J ' represents the J-th character P entered into the password entry box J The corresponding secure password character;
-representing a character connector.
In a preferred embodiment of the invention, the account number character a is entered in step S13 i Conversion to secured account number character A i The' method comprises the steps of:
s131, forming all account characters into an account character set { a } 1 ,a 2 ,a 3 ,…a I′ (wherein a) 1 Representing the 1 st account number character, a 2 Representing the 2 nd account number character, a 3 Representing the 3 rd account number character, a I′ The method comprises the steps of representing an I 'account character, wherein I' represents the total number of all account characters; a, a 1 ≠a 2 ≠a 3 ≠……≠a I′ The method comprises the steps of carrying out a first treatment on the surface of the Let i' =1;
s132, for the ith account number character a i′ Performing numerical operation to obtain an ith account character value, wherein the calculation method for obtaining the ith account character value comprises the following steps:
a i′ ′=Numerical value algorithm||a i′ ||,
wherein a is i′ Representing the ith account number character;
numerical value algorithm is indicative of a numerical operation method;
a i′ 'represent the i' th account character value;
s133, judging the size relation between I 'and I':
if I 'is not less than I', executing the next step;
if I '> I', I '=i' +1; returning to step S132;
s134, arranging all the account number character values in the order from small to large or from large to small, wherein the order corresponding to the ith account number character value is the order of the ith account number character corresponding to the ith account number character value; let i "=1;
S135, for the ith account number character value a i′ The numerical operation is carried out to obtain an ith character account value, and the calculation method for obtaining the ith character account value comprises the following steps:
a i″ ″=Numerical value algorithm||a i″ ′||,
wherein a is i″ ' represents the i "th account character value;
numerical value algorithm is indicative of a numerical operation method;
a i″ "represents the i" th character account value;
s136, judging the size relation between I 'and I':
if I '-is not less than I', executing the next step;
if I' > I ", then I" =i "+1; returning to step S135;
s137, arranging all the character account values in the order from small to large or from large to small, wherein the order corresponding to the ith character account value is the order of the ith account character corresponding to the ith character account value;
s138, the order of the ith account number character corresponding to the ith account number character value in the step S134 and the order of the ith account number character corresponding to the ith' character account number value in the step S137 are all the safety account number characters corresponding to all the account number characters;
or/and the password character A is processed in step S13 i Conversion to secure password character A i The' method comprises the steps of:
s13-1, all the password characters form a password character set { p } 1 ,p 2 ,p 3 ,…p J′ P, where 1 Representing the 1 st cipher character, p 2 Representing the 2 nd cipher character, p 3 Representing the 3 rd cipher character, p J′ Represents the J 'th password character, J' representing the total number of all password characters; p is p 1 ≠p 2 ≠p 3 ≠……≠p J′ The method comprises the steps of carrying out a first treatment on the surface of the Let j' =1;
s13-2, for the j' th password character p j′ Performing numerical operation to obtain a j 'password character value, wherein the calculation method for obtaining the j' password character value comprises the following steps:
p j′ ″=Numerical value algorithm||p j′ ||,
wherein p is j′ Representing a j' th password character;
numerical value algorithm is indicative of a numerical operation method;
p j′ 'represents the j' th password character value;
s13-3, judging the size relation between J 'and J':
if J 'is not less than J', executing the next step;
if J '> J', J '=j' +1; returning to the step S13-2;
s13-4, arranging all the password character values in the order from small to large or from large to small, wherein the order corresponding to the j ' password character value is the order of the j ' password character corresponding to the j ' password character value; let j "=1;
s13-5, for the j' th password character value p j″ The method for calculating the j' character password value comprises the following steps of:
p j″ ″=Numerical value algorithm||p j″ ′||,
wherein p is j″ ' represents the j "th password character value;
numerical value algorithm is indicative of a numerical operation method;
p j″ "represents the j" character password value;
S13-6, judging the size relation between J 'and J':
if J '-is not less than J', executing the next step;
if J' > J ", J" =j "+1; returning to the step S13-5;
s13-7, arranging all the character password values in the order from small to large or from large to small, wherein the order corresponding to the j ' character password value is the order of the j ' password character corresponding to the j ' character password value;
s13-8, the order of the j 'cipher characters corresponding to the j' cipher character value in the step S13-4 and the order of the j 'cipher characters corresponding to the j' cipher character value in the step S13-7 are all the security cipher characters corresponding to all the cipher characters.
In addition, the method for converting the account number character into the secured account number character or the method for converting the password character into the secured password character may be that the uppercase letter character, the lowercase letter character, the number character and the special character are arranged in a certain order (may be that after steps S131-S134 or steps S13-1-S13-4 are executed), a comparison character (account number character or password character) order is obtained, the comparison character order is shifted back by K bits, wherein K is a positive integer greater than or equal to 1 and less than or equal to K-1, and K is the total number of the comparison characters, so as to obtain the secured character (secured account number character or secured password character). As shown in tables 1 to 5.
Table 1 shows the resulting secured account number character with the control character (account number character) sequence shifted back by 1 bit
If the account number character is 123asdADF, the secured account number character is 012Zrc =CE.
Table 2 shows the resulting secured account number characters with the control endianness shifted back by 2 digits
Contrasting characters A B C D E F G H I J K L M N O P Q R S
Secured account number character - A B C D E F G H I J K L M N O P Q
Contrasting characters T U V W X Y Z a b c d e f g h i j k l
Secured account number character R S T U V W X Y Z a b c d e f g h i j
Contrasting characters m n o p q r s t u v w x y z 0 1 2 3 4
Secured account number character k l m n o p q r s t u v w x y z 0 1 2
Contrasting characters 5 6 7 8 9 ) @ # $ ^ & * ( { } :
Secured account number character 3 4 5 6 7 8 9 ) @ # $ ^ & * ( { }
Contrasting characters | < > [ ] \ , . / ` _ + -
Secured account number character : | < > [ ] \ , . / ` _ +
If the account number character is 123 asdADHh, the secured account number character is z01Yqb-BDff.
Table 3 shows the resulting secured account number characters with the control endianness shifted 3-digit back
If the account number character is mm123asdADF, the secured account number character is jjyz0Xpz +AC.
Table 4 shows the resulting secured account number characters with the control endianness shifted back by 4 digits
Contrasting characters A B C D E F G H I J K L M N O P Q R S
Secured account number character _ + - A B C D E F G H I J K L M N O
Contrasting characters T U V W X Y Z a b c d e f g h i j k l
Secured account number character P Q R S T U V W X Y Z a b c d e f g h
Contrasting characters m n o p q r s t u v w x y z 0 1 2 3 4
Secured account number character i j k l m n o p q r s t u v w x y z 0
Contrasting characters 5 6 7 8 9 ) @ # $ ^ & * ( { } :
Secured account number character 1 2 3 4 5 6 7 8 9 ) @ # $ ^ & * (
Contrasting characters | < > [ ] \ , . / ` _ + -
Secured account number character { } : | < > [ ] \ , . / `
If the account number character is 123 asdtadf, the secured account number character is xyzwozpp_ =b.
Table 5 shows the resulting secured account number characters with the control endianness shifted back by 5 digits
If the account number character is 123asdt2ADF, the secured account number character is wxyVnYox' A.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.

Claims (4)

1. The purchasing management login data working system is characterized by comprising a login acquisition module and a verification login module;
the data output end of the login acquisition module is connected with the data input of the verification login module;
the login acquisition module is used for acquiring a terminal account number and a terminal password by a login terminal; the method for obtaining the terminal account number by the login terminal comprises the following steps:
s11, let i=1;
s12, inputting an account character A in an account input box i ,A i I=1, 2, 3, … …, I representing the I-th account character input to the account input box; i represents the total number of the account number characters input to the account number input box;
s13, the account number character A i Conversion to secured account number character A i ′,A i ' represents the ith character A input to the account number input box i The corresponding secured account number character; the account number character A i Conversion to secured account number character A i The' method comprises the steps of:
S131, forming all account characters into an account character set { a } 1 ,a 2 ,a 3 ,…a I′ (wherein a) 1 Representing the 1 st account number character, a 2 Representing the 2 nd account number character, a 3 Representing the 3 rd account number character, a I′ The method comprises the steps of representing an I 'account character, wherein I' represents the total number of all account characters; a, a 1 ≠a 2 ≠a 3 ≠……≠a I′ The method comprises the steps of carrying out a first treatment on the surface of the Let i' =1;
s132, for the ith account number character a i′ Performing numerical operation to obtain an i' account character value;
s133, judging the size relation between I 'and I':
if I 'is not less than I', executing the next step;
if I '> I', I '=i' +1; returning to step S132;
s134, arranging all the account number character values in the order from small to large or from large to small, wherein the order corresponding to the ith account number character value is the order of the ith account number character corresponding to the ith account number character value; let i "=1;
s135, for the ith account number character value a i″ 'performing numerical operation to obtain an ith' character account value;
s136, judging the size relation between I 'and I':
if I '-is not less than I', executing the next step;
if I' > I ", then I" =i "+1; returning to step S135;
s137, arranging all the character account values in the order from small to large or from large to small, wherein the order corresponding to the ith character account value is the order of the ith account character corresponding to the ith character account value;
S138, mapping all the safety account number characters corresponding to all the account number characters according to the corresponding relation between the order of the ith account number character corresponding to the ith account number character value in the step S134 and the order of the ith account number character corresponding to the ith' character account number value in the step S137;
s14, judging the size relation between I and I:
if I is not less than I, executing the next step;
if I > I, i=i+1, returning to step S12;
s15, connecting the safety account number characters to form an account number character string which is the terminal account number; the method for connecting the safety account number characters to form the account number character string comprises the following steps:
A=A 1 ′-A 2 ′-A 3 ′-…-A I ′,
wherein A represents an account number character string;
A 1 ' 1 st character A which represents input to account number input box 1 The corresponding secured account number character;
A 2 ' represent the 2 nd character A entered into the account entry box 2 The corresponding secured account number character;
A 3 ' represent the 3 rd character A entered into the Account input box 3 The corresponding secured account number character;
A I ' represent the I-th character A entered into the account entry box I The corresponding secured account number character;
-representing a character connector;
the verification login module is used for sending the obtained login account number and login password as well as the physical address of the login terminal to the cloud management platform for verification.
2. The procurement management login data work system of claim 1 characterized by the cloud management platform verification login method comprising the steps of:
s41, the cloud management platform takes the received login account as a query code to query whether the received login account exists in an account database:
if the received login account does not exist in the account database, the cloud management platform sends feedback information to the login terminal, wherein the feedback information is an input account character error, and the account character and the password character are requested to be input again;
if the received login account exists in the account database, extracting a password and a physical address corresponding to the received login account;
s42, judging whether the extracted physical address is consistent with the received physical address:
if the extracted physical address is consistent with the received physical address, executing the next step;
if the extracted physical address is inconsistent with the received physical address, the login terminal corresponding to the login account is not a common login terminal, and a binding code is sent to the mobile phone number associated with the login account; sending the received binding code through the associated mobile phone number, and taking the login terminal corresponding to the received physical address as a common login terminal; logging in the cloud management platform successfully;
S43, judging whether the extracted password is consistent with the received password characters:
if the extracted password is consistent with the received password character, logging in the cloud management platform is successful;
if the extracted password is inconsistent with the received password character, the cloud management platform sends feedback information to the login terminal, wherein the feedback information is that the input password character is wrong, and the account character and the password character are input again.
3. The procurement management login data work system according to claim 1, characterized by the method of obtaining a terminal password by a login terminal in a login obtaining module comprising the steps of:
s1-1, let j=1;
s1-2, inputting a password character P in a password input box j ,P j A J-th password character inputted to the password input box is represented, j=1, 2, 3, … …, J; j represents the total number of the password characters input to the password input box;
s1-3, the password character P j Conversion to secure password characters P j ′,P j ' represents the j-th character P input to the password input box j The corresponding secure password character;
s1-4, judging the size relation between J and J:
if J is more than or equal to J, executing the next step;
if J > J, j=j+1, returning to step S1-2;
s1-5, connecting the safety password characters to form a password character string which is the terminal password; the method for connecting the safe password characters to form the password character string comprises the following steps:
P=P 1 ′-P 2 ′-P 3 ′-…-P J ′,
Wherein P represents a password string;
P 1 ' represent the 1 st character P entered into the password entry box 1 The corresponding secure password character;
P 2 ' represent the 2 nd character P entered into the password entry box 2 The corresponding secure password character;
P 3 ' represents the 3 rd character P entered into the password entry box 3 The corresponding secure password character;
P J ' represents the J-th character P entered into the password entry box J The corresponding secure password character;
-representing a character connector.
4. A purchase management registering data work system as claimed in claim 3, wherein in step S1-3 the password character P is entered j Conversion to secure password characters P j The' method comprises the steps of:
s1-3-1, all the password characters form a password character set { p } 1 ,p 2 ,p 3 ,…p J′ P, where 1 Representing the 1 st cipher character, p 2 Representing the 2 nd cipher character, p 3 Representing the 3 rd cipher character, p J′ Represents the J 'th password character, J' representing the total number of all password characters; p is p 1 ≠p 2 ≠p 3 ≠……≠p J′ The method comprises the steps of carrying out a first treatment on the surface of the Let j' =1;
s1-3-2, for the j' th cipher character p j′ Performing numeric operation to obtain a j' password character value;
s1-3-3, judging the size relation between J 'and J':
if J 'is not less than J', executing the next step;
if J '> J', J '=j' +1; returning to the step S1-3-2;
S1-3-4, arranging all the password character values in the order from small to large or from large to small, wherein the order corresponding to the j ' password character value is the order of the j ' password character corresponding to the j ' password character value; let j "=1;
S1-3-5, for the j "th password character value p j″ 'doing numerical operation to obtain the j' character password value;
s1-3-6, judging the size relation between J 'and J':
if J '-is not less than J', executing the next step;
if J' > J ", J" =j "+1; returning to the step S1-3-5;
s1-3-7, arranging all the character password values in the order from small to large or from large to small, wherein the order corresponding to the j ' character password value is the order of the j ' password character corresponding to the j ' character password value;
s1-3-8, according to the corresponding relation between the order of the j 'cipher characters corresponding to the j' cipher character values in the step S1-3-4 and the order of the j 'cipher characters corresponding to the j' cipher character values in the step S1-3-7, mapping to obtain all the security cipher characters corresponding to all the cipher characters.
CN202111620637.7A 2021-12-28 2021-12-28 Purchasing management login data working system Active CN114499972B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111620637.7A CN114499972B (en) 2021-12-28 2021-12-28 Purchasing management login data working system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111620637.7A CN114499972B (en) 2021-12-28 2021-12-28 Purchasing management login data working system

Publications (2)

Publication Number Publication Date
CN114499972A CN114499972A (en) 2022-05-13
CN114499972B true CN114499972B (en) 2023-09-05

Family

ID=81496138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111620637.7A Active CN114499972B (en) 2021-12-28 2021-12-28 Purchasing management login data working system

Country Status (1)

Country Link
CN (1) CN114499972B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003006163A (en) * 2001-06-21 2003-01-10 Dainippon Printing Co Ltd Method for generating and registering login/password
EP2386973A1 (en) * 2010-05-11 2011-11-16 Thomson Licensing Methods, devices and computer program supports for password generation and verification
CN106535082A (en) * 2015-09-09 2017-03-22 腾讯科技(深圳)有限公司 Method, device and system for processing data
CN111835772A (en) * 2020-07-15 2020-10-27 中国电子技术标准化研究院 User identity authentication method and device based on edge calculation
CN112632524A (en) * 2020-12-24 2021-04-09 冯凯鹏 Method and terminal for enhancing password security

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003006163A (en) * 2001-06-21 2003-01-10 Dainippon Printing Co Ltd Method for generating and registering login/password
EP2386973A1 (en) * 2010-05-11 2011-11-16 Thomson Licensing Methods, devices and computer program supports for password generation and verification
CN106535082A (en) * 2015-09-09 2017-03-22 腾讯科技(深圳)有限公司 Method, device and system for processing data
CN111835772A (en) * 2020-07-15 2020-10-27 中国电子技术标准化研究院 User identity authentication method and device based on edge calculation
CN112632524A (en) * 2020-12-24 2021-04-09 冯凯鹏 Method and terminal for enhancing password security

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种汉字报文的数值加密方法;仇军立等;山西电子技术;全文 *

Also Published As

Publication number Publication date
CN114499972A (en) 2022-05-13

Similar Documents

Publication Publication Date Title
US10181168B2 (en) Personal safety verification system and similarity search method for data encrypted for confidentiality
Abdullahi et al. Fractal coding-based robust and alignment-free fingerprint image hashing
CN105471575B (en) Information encryption and decryption method and device
CN110245482B (en) Authentication method and system
US8260060B2 (en) Comparison method, comparison system, computer, and program
KR101419784B1 (en) Method and apparatus for recognizing and verifying fingerprint
CN108206813B (en) Security audit method and device based on k-means clustering algorithm and server
WO2018019298A1 (en) Fingerprint generation method utilized in terminal, and device
US11403875B2 (en) Processing method of learning face recognition by artificial intelligence module
CN105786974A (en) Computer data storage query system
US11475354B2 (en) Deep learning method
CN111797217A (en) Information query method based on FAQ matching model and related equipment thereof
WO2023035362A1 (en) Polluted sample data detecting method and apparatus for model training
CN114499972B (en) Purchasing management login data working system
CN114499973B (en) Safety protection system for asset management system
CN113179249B (en) Method for rapidly and safely mining government affair data in big data network
CN113688762B (en) Face recognition method, device, equipment and medium based on deep learning
CN114495180A (en) Fingerprint matching method, chip and equipment
WO2017211309A1 (en) Method and device for encoding and decoding negotiable instrument information, processing system, and financial self-service equipment
US10320764B2 (en) Magnetic strip modification
CN113936130A (en) Document information intelligent acquisition and error correction method, system and equipment based on OCR technology
CN113674083A (en) Internet financial platform credit risk monitoring method, device and computer system
CN111611567A (en) Authentication method and device, electronic whiteboard and computer readable storage medium
Wang et al. Template Protection based on Chaotic Map and DNA Encoding for Multimodal Biometrics at Feature Level Fusion.
KR20210068649A (en) System And Method For Inputing Insurance Claim Document

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant