CN103177203A - Computer login management system - Google Patents

Computer login management system Download PDF

Info

Publication number
CN103177203A
CN103177203A CN 201110441934 CN201110441934A CN103177203A CN 103177203 A CN103177203 A CN 103177203A CN 201110441934 CN201110441934 CN 201110441934 CN 201110441934 A CN201110441934 A CN 201110441934A CN 103177203 A CN103177203 A CN 103177203A
Authority
CN
China
Prior art keywords
interim
computer
logs
password
lander
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201110441934
Other languages
Chinese (zh)
Inventor
周琳娅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HUAQI PORTABLE DIGITAL Co Ltd
Original Assignee
BEIJING HUAQI PORTABLE DIGITAL Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HUAQI PORTABLE DIGITAL Co Ltd filed Critical BEIJING HUAQI PORTABLE DIGITAL Co Ltd
Priority to CN 201110441934 priority Critical patent/CN103177203A/en
Publication of CN103177203A publication Critical patent/CN103177203A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a computer login management system which comprises a client-side and a management terminal, the client-side comprises a temporary login interface, and the management terminal comprises a temporary password generating unit; a temporary visitor sends a temporary login request to the management terminal through the temporary login interface, the management terminal generates a temporary login password and sends the password to the client-side after receiving the request, and the temporary visitor completes login by inputting the temporary login password. According to the computer login management system, the user can flexibly manage the computer information, safety and flexibility are high, and the user can manage the authority of a temporary visitor in a remote manner.

Description

A kind of computer logs in management system
[technical field]
The present invention relates to the computer security field, provide especially a kind of computer to log in management system.
[background technology]
In prior art, in order to ensure the safety of user computer internal information, generally log in password by setting and prevent that the disabled user from logging in computer, only know that this user who logs in password can log in this computer and read the interior information of computer.
The mode that logs in password due to setting is easier to be cracked by the disabled user, and easily reveals.Therefore engendered more senior safety verification technology; such as fingerprint technique, iris technology etc.; after these technology join in the application that computer security logs in; uniqueness due to fingerprint and iris; computer can only can land safely by identification owner's fingerprint or iris afterwards, has effectively protected the security of computer internal information.Yet this technology also defines user's use in the protection computerized information, when for example owner goes out, wishes that other people open computer and read the interior information of computer, can't realize that the telemanagement computer logs in.
[summary of the invention]
Technical matters to be solved by this invention is to provide a kind of computer and logs in management system, it is provided with interim log-in interface, non-owner user by interim log-in interface and get that owner sends log in password temporarily after can land safely computer, single with computer landing approach in the solution prior art, the technical matters that limited subscriber uses.
For solving the problems of the technologies described above, the present invention is achieved by the following technical solutions:
A kind of computer logs in management system, and it comprises: client and management end, described client comprise an interim log-in interface, and described management end comprises an interim password generation unit; Described interim lander sends to management end by interim log-in interface and logs in request temporarily, and after management end is received this request, generation logs in password temporarily and sends to client, and the lander logs in password temporarily and completes and log in by inputting this temporarily.
Described client is arranged in computer, and described management end is arranged in a mobile terminal, and the owner of computer can control the authority that interim lander uses computer by mobile terminal remote as owner.
Described client also comprises main log-in interface, and it logs in the window of this computer for owner; Described interim log-in interface is the window that interim lander logs in this computer.
Described client also comprises the binding unit, and it is used for setting up the computer that client is installed and the unique corresponding relation that the mobile terminal of management end is installed, and limits interim lander's authority by this mobile terminal.
Described client also comprises mnemon, and it is a cipher memory unit, and what it was used for that the memory management end sends to client logs in password temporarily.
Described client also comprises authentication unit, its password that is used for verifying interim lander's input be stored in mnemon whether log in password consistent temporarily, if unanimously can allow interim lander to log in, otherwise refuse this time to log in.
Described client also comprises a cleaning unit, and it logs in password whether after consistent action at authentication unit to what store in the password of interim lander input and mnemon temporarily, automatically deletes to log in password in mnemon temporarily.
Described management end also comprises confirmation unit, it is used for identifying for owner whether this time interim lander is validated user, if be validated user, generate one by interim password generation unit and log in password temporarily and this is logged in password temporarily and send to client and interim lander.
Described management end also comprises setup unit, and it limits interim lander to the rights of using of computer for owner.
Described rights of using comprise the time that interim lander reads specified file, enters the appointed area, logs in temporarily that limits.
The present invention has the following advantages:
computer login system of the present invention is by installation administration end in mobile terminal, client with this mobile terminal binding is installed in computer, when non-owner user or interim lander need to log in this computer, this non-owner user need to be by the selected option that logs in temporarily to owner's mobile terminal transmission solicited message, the management end of owner's mobile terminal device can generate an interim password automatically at this moment, it can log in this computer after logging in password temporarily to input this interim lander, realize the purpose that owner can this computerized information of flexible management, and security and dirigibility are higher, make owner can long-range realization to the management of interim lander's authority.
[description of drawings]
Fig. 1 is the structured flowchart that computer of the present invention logs in the client of management system;
Fig. 2 is the structured flowchart that computer of the present invention logs in the management end of management system;
Fig. 3 is the implementation method process flow diagram that computer of the present invention logs in management system.
[embodiment]
Reach for further setting forth the present invention technological means and the effect that predetermined purpose is taked, below in conjunction with drawings and Examples, to the specific embodiment of the present invention, be described in detail as follows.
Computer of the present invention logs in management system and comprises and be arranged on the client in computer and be arranged on management end in mobile terminal, and the owner of computer can control by mobile terminal remote interim lander's authority as owner.The user by the client in the operation computer, sets up the unique corresponding relation of this computer and mobile terminal when using this system for the first time, with mobile terminal and computer binding.Particularly, described client comprises an interim log-in interface, and described management end comprises an interim password generation unit; Described interim lander sends to management end by interim log-in interface and logs in request temporarily, and after management end is received this request, generation logs in password temporarily and sends to client, and the lander logs in password temporarily and completes and log in by inputting this temporarily.
Interim lander can log in by interim log-in interface by owner's license, read the computer internal information, and owner can preset interim lander's authority, can only read specified file, enters the appointed area, set interim landing time etc. such as limiting interim lander.During concrete enforcement, described client is not limited only to be arranged in computer, also can be arranged in the electronic equipment that any needs land safely.
Be illustrated in figure 1 as the structured flowchart of described client 1, this client comprises binds unit 10, main log-in interface 11, interim log-in interface 12, the first radio communication unit 13, mnemon 14 and authentication unit 15.Wherein, described binding unit 10 is used for setting up the computer that client is installed and the unique corresponding relation that the mobile terminal of management end is installed, and limits interim lander's authority by this mobile terminal; Described main log-in interface 11 logs in the window of this computer for owner, this main log-in interface can be verified login user by modes such as checking fingerprint, iris, main passwords; Described interim log-in interface 12 logs in the window of this computer for interim lander, this interim log-in interface 12 verifies by verify the mode that logs in password temporarily whether interim lander is legal; Described the first radio communication unit 13 is used for setting up the communication between client and management end, sends the solicited message that temporarily logs in or receives the information such as code that temporarily logs in from management end to management end; Described mnemon 14 is a cipher memory unit, and it is used for that the memory management end sends logs in password temporarily, also can remember the main password of owner oneself setting; Store in the password that described authentication unit 15 is mainly used in verifying interim lander's input and mnemon whether log in password consistent temporarily, if unanimously can allow interim lander to log in, otherwise refuse this time to log in.
In preferred embodiment, described client also can comprise a cleaning unit, and it logs in password whether after consistent action at authentication unit to what store in the password of interim lander input and mnemon temporarily, automatically deletes to log in password in mnemon temporarily.Certainly should cleaning the unit also can be when certain the cleaning unit, authentication unit can be compared the up-to-date password that temporarily logs in of storing in mnemon with the password of lander's input temporarily, regularly clear up the unit and can delete according to the password that logs in that the time that the user sets regularly will have been remembered temporarily.
As shown in Figure 2, be the structured flowchart of described management end 2, this management end 2 comprises the second radio communication unit 20, confirmation unit 21, interim password generation unit 22 and setup unit 23.wherein, described the second radio communication unit 20 is used for setting up wireless connections with the first radio communication unit 13 of client, described confirmation unit 21 identifies for owner whether this time interim lander is validated user, if be validated user, generate one by interim password generation unit 22 and log in password temporarily, and by the second radio communication unit 20, this is logged in password temporarily and send to client and interim lander, after client 1 receives and logs in password temporarily, record this by mnemon 14 and log in password temporarily, wait for interim lander input log in password temporarily after, the authentication unit 15 of client 1 is compared the password that temporarily logs in that records in the password of interim lander input and mnemon 14, if correctly complete this time and log in, if incorrect, point out error message, log in failure, described setup unit 23 limits interim lander to the rights of using of computer for owner, reads specified file, enters the appointed area, sets interim landing time etc. such as limiting interim lander.
As shown in Figure 3, log in the implementation method process flow diagram of management system for computer of the present invention, the method comprises:
S1, the selected interim log-in interface of interim lander;
S2, send the solicited message temporarily log in to management end by interim log-in interface, this solicited message can comprise that interim lander's name, phone number etc. can distinguish interim lander's information;
S3, management end get solicited message, determine interim lander's identity; This process can be confirmed by the interim lander's that gets name, cell-phone number information by owner, also can be confirmed by owner interim lander's identity by directly dialing this cell-phone number;
If this interim lander of S4 is validated user, can carry out next step, if be non-validated user, management end sends to client the information that refusal logs in, and by the Client-Prompt error message, logs in failure;
S5, management end generate one and log in password temporarily, and this is logged in cipher feedback to client and interim lander temporarily, as send in interim lander's mobile phone, and client is remembered this and logged in password temporarily;
S6, interim lander log in password by what interim log-in interface input got temporarily;
The judgement of S7, client has been remembered log in temporarily that password and interim lander input whether log in password identical temporarily, if the same carry out next step, if difference point out error message logs in failure;
S8, complete and log in.
Before described step S1, also can comprise step S0: set up the computer that client is installed and the unique corresponding relation that the mobile terminal of management end is installed, can limit interim lander to the rights of using of computer by this mobile terminal;
Described rights of using comprise the time that interim lander reads specified file, enters the appointed area, logs in temporarily that limits.
Log in failure or complete log in after, the automatic deletion in cleaning unit of client has been remembered logs in password temporarily.
Below only embodiments of the invention are described, but be not to limit the present invention, various variations or the modification made according to spirit of the present invention are all within the protection category of claim of the present invention.

Claims (10)

1. a computer logs in management system, it is characterized in that this system comprises: client and management end, described client comprise an interim log-in interface, and described management end comprises an interim password generation unit; Described interim lander sends to management end by interim log-in interface and logs in request temporarily, and after management end is received this request, generation logs in password temporarily and sends to client, and the lander logs in password temporarily and completes and log in by inputting this temporarily.
2. computer as claimed in claim 1 logs in management system, it is characterized in that: described client is arranged in computer, described management end is arranged in a mobile terminal, and the owner of computer can control the authority that interim lander uses computer by mobile terminal remote as owner.
3. computer as claimed in claim 2 logs in management system, it is characterized in that: described client also comprises main log-in interface, and it logs in the window of this computer for owner; Described interim log-in interface is the window that interim lander logs in this computer.
4. computer as claimed in claim 1 logs in management system, it is characterized in that: described client also comprises the binding unit, it is used for setting up the computer that client is installed and the unique corresponding relation that the mobile terminal of management end is installed, and limits interim lander's authority by this mobile terminal.
5. computer as claimed in claim 1 logs in management system, it is characterized in that: described client also comprises mnemon, and it is a cipher memory unit, and what it was used for that the memory management end sends to client logs in password temporarily.
6. computer as claimed in claim 5 logs in management system, it is characterized in that: described client also comprises authentication unit, its password that is used for verifying interim lander's input be stored in mnemon whether log in password consistent temporarily, if unanimously can allow interim lander to log in, otherwise refusal this time logs in.
7. computer as claimed in claim 1 logs in management system, it is characterized in that: described client comprises that also one clears up the unit, it logs in password whether after consistent action at authentication unit to what store in the password of interim lander input and mnemon temporarily, automatically deletes to log in password in mnemon temporarily.
8. computer as claimed in claim 1 logs in management system, it is characterized in that: described management end also comprises confirmation unit, it is used for identifying for owner whether this time interim lander is validated user, if be validated user, generate one by interim password generation unit and log in password temporarily and this is logged in password temporarily and send to client and interim lander.
9. the interim login system of computer as claimed in claim 1, it is characterized in that: described management end also comprises setup unit, it limits interim lander to the rights of using of computer for owner.
10. the interim login system of computer as claimed in claim 9 is characterized in that: described rights of using comprise the time that interim lander reads specified file, enters the appointed area, logs in temporarily that limits.
CN 201110441934 2011-12-26 2011-12-26 Computer login management system Pending CN103177203A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110441934 CN103177203A (en) 2011-12-26 2011-12-26 Computer login management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110441934 CN103177203A (en) 2011-12-26 2011-12-26 Computer login management system

Publications (1)

Publication Number Publication Date
CN103177203A true CN103177203A (en) 2013-06-26

Family

ID=48637051

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110441934 Pending CN103177203A (en) 2011-12-26 2011-12-26 Computer login management system

Country Status (1)

Country Link
CN (1) CN103177203A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618717A (en) * 2013-11-28 2014-03-05 北京奇虎科技有限公司 Multi-account client information dynamic authentication method, device and system
WO2015169003A1 (en) * 2014-05-08 2015-11-12 中兴通讯股份有限公司 Account assignment method and apparatus
CN108985047A (en) * 2018-06-28 2018-12-11 努比亚技术有限公司 A kind of unlocking method, terminal, wearable device and computer readable storage medium
CN109376512A (en) * 2018-09-30 2019-02-22 湖北职业技术学院 A kind of Computer Network Security System and its working method
CN110161402A (en) * 2019-06-19 2019-08-23 上海工程技术大学 A kind of monitoring of track circuit failure and diagnostic system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618717A (en) * 2013-11-28 2014-03-05 北京奇虎科技有限公司 Multi-account client information dynamic authentication method, device and system
WO2015169003A1 (en) * 2014-05-08 2015-11-12 中兴通讯股份有限公司 Account assignment method and apparatus
CN108985047A (en) * 2018-06-28 2018-12-11 努比亚技术有限公司 A kind of unlocking method, terminal, wearable device and computer readable storage medium
CN109376512A (en) * 2018-09-30 2019-02-22 湖北职业技术学院 A kind of Computer Network Security System and its working method
CN110161402A (en) * 2019-06-19 2019-08-23 上海工程技术大学 A kind of monitoring of track circuit failure and diagnostic system

Similar Documents

Publication Publication Date Title
CN110121873B (en) Access token management method, terminal and server
CN108173822B (en) Intelligent door lock control method, intelligent door lock and computer readable storage medium
EP1833219B1 (en) Methods, apparatus and software for using a token to calculate time-limited password within cellular telephone
CN104202338B (en) A kind of safety access method being applicable to enterprise-level Mobile solution
US10219154B1 (en) Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network
CN103095659B (en) Account logon method and system in a kind of the Internet
CN109787988A (en) A kind of identity reinforces certification and method for authenticating and device
US20070209081A1 (en) Methods, systems, and computer program products for providing a client device with temporary access to a service during authentication of the client device
KR101451359B1 (en) User account recovery
CN105187431A (en) Log-in method, server, client and communication system for third party application
CN103813334A (en) Right control method and right control device
CN105530224A (en) Method and device for terminal authentication
US11263558B2 (en) Method for monitoring access to electronically controllable devices
CN105608765A (en) Access authorization control method and device
CN112330855A (en) Electronic lock safety management method, equipment and system
CN104185181A (en) WiFi user access control method based on iptables
CN104504789A (en) Access control management method and access control management device
CN106488453A (en) A kind of method and system of portal certification
CN103177203A (en) Computer login management system
CN103179101A (en) Implementation method of login management system of electronic device
CN112836191A (en) Vehicle authorization method and device, computer equipment and storage medium
CN105160744A (en) System and method for opening door by utilizing mobile phone based on cloud platform
CN103428698B (en) Mobile interchange participant's identity strong authentication method
DE102017121648B3 (en) METHOD FOR REGISTERING A USER AT A TERMINAL DEVICE
CN101268712B (en) Method and a device to suspend the access to a service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C05 Deemed withdrawal (patent law before 1993)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130626