CN103942508A - Login-free information submitting and identity identification method - Google Patents

Login-free information submitting and identity identification method Download PDF

Info

Publication number
CN103942508A
CN103942508A CN201410196157.6A CN201410196157A CN103942508A CN 103942508 A CN103942508 A CN 103942508A CN 201410196157 A CN201410196157 A CN 201410196157A CN 103942508 A CN103942508 A CN 103942508A
Authority
CN
China
Prior art keywords
information
input
hidden code
symbol
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410196157.6A
Other languages
Chinese (zh)
Other versions
CN103942508B (en
Inventor
田飞
罗文祥
龚江芸
李爱明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Xiaochong Network Technology Co.,Ltd.
Original Assignee
Hunan University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan University of Technology filed Critical Hunan University of Technology
Priority to CN201410196157.6A priority Critical patent/CN103942508B/en
Publication of CN103942508A publication Critical patent/CN103942508A/en
Application granted granted Critical
Publication of CN103942508B publication Critical patent/CN103942508B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a login-free information submitting and identity identification method used for providing a quick and safe data uploading procedure of an identity identification mode. According to the method, when a user does not log in an account of himself, the user can submit information quickly and safely through a hidden code. The method includes the following steps of inputting the information, detecting whether the information includes a guide symbol, judging whether an identification symbol meets requirements, and submitting the information. Through identification of the hidden code, junk information can be effectively prevented from being input manually, the user does not need to log in, the hidden code can be automatically submitted after being input, and the information is convenient and quick to submit.

Description

A kind of method of exempting to log in formula submission information identity verification
Technical field
The present invention relates to the technical field of internet information safety in daily life, especially a kind of user not when logon account, submission information that can be quick and safe, and carry out the method for identity verification.
 
Background technology
In daily life, along with the development of science and infotech, internet plays a part more and more important in people's daily life.On internet web page, submission information is a kind of high-frequency behavior, and present internet web page form data commit method and user's operating process are more complicated, and this will expend a large amount of time and efforts of user.Meanwhile, owing to submitting informational needs input username and password to, under strange terminal (as public library, Internet bar etc.) environment, will cause account password to have the risk of potential leakage.Therefore, information is submitted to has two hidden danger of the loaded down with trivial details and information leakage of process safety, is unfavorable for that user carries out information submission work on internet web page, brings much inconvenience to user.
Summary of the invention
Technical matters to be solved by this invention is: invention is a kind of is exempting to input user profile and identifying code, exempts to click in situation about logging in submit button, can submit the method for information to safe and efficiently.
The technical solution used in the present invention is: a kind of method of exempting to log in formula and submitting to information identity verification, comprises: input information text box 100, treat submission information 200 and hidden code 300.The present invention mentions hidden code both can authentication of users identity information, also can serve as machine identifying code, can also play the effect of submitting information button to.This hidden code is similar to password, but not single-rowly inputs for cryptographic item, but is blended in message text and uses with character string forms.Hidden code is default in the time logging in state by user, and wherein, boot symbol is the combining characters of a less use, at least double figures; Checking symbol length is not limit.
Described method comprises the steps: (a) user input message under logging status not; (b) after input information completes, input hidden code, in the time that system detects the boot symbol part of hidden code, automatically the character of input is afterwards considered as to the checking symbol part of hidden code, and encrypt and present with " * " number, the input of simultaneous verification symbol part is also correct, represents that hidden code is correct, now authentication success, program will be committed to specified database information data (not containing hidden code) automatically.
In step (a), if institute's input message comprises boot symbol, after input boot symbol, input validation symbol, when checking symbol correctly and length meets, is considered as hidden code, now authentication success; If checking symbol is incorrect or length exceedes preset length, is reduced to and treats that submission information shows.
In step (b), the hidden code of inputting is that user is in the time of application account or log in own setting under state.
Beneficial effect of the present invention is: 1, can when user does not log in, submit information to, prevent that account is stolen, and in step (b), by the checking of hidden code, can effectively prevent from artificially inputting junk information.2, after user logs in, also need submission information to audit, determine whether junk information, further prevent the implantation of junk information.3, hidden code is automatically submitted to and without click on submission button, is reduced the operation of repeating step, makes user submit to information more convenient.
Brief description of the drawings
Fig. 1 is the process flow diagram that data on webpage form of the present invention is submitted to.
Fig. 2 is the block diagram that data on webpage form of the present invention is submitted to.
Embodiment
Below by specific embodiment, the present invention is described in further detail.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
One is exempted to log in formula and is submitted information identity verification method to, and described content, as Fig. 2, comprises: input information text box 100, treat submission information 200 and hidden code 300.
Fig. 1 shows the process flow diagram that data on webpage form of the present invention is submitted to.
In step 1, user can not input the submission information for the treatment of under logging status.
In step 2, in the time that system detects the boot symbol that user institute input message comprises hidden code, automatically show and comprise boot symbol in interior content thereafter with " * " number, this boot symbol is that user is in the time of application account or log in own setting under state.
In step 3, user's input validation symbol, this checking symbol is that user is in the time of application account or log in own setting under state.
In step 4, whether system can detect the checking symbol of user's input automatically correct, if correct, carry out step 5; If incorrect, be reduced at interior all characters the submission information for the treatment of by comprising boot symbol, in input information text box, show, get back to step 1.
In step 5, whether the checking symbol length that system can detect user's input is automatically suitable, if suitable, authentication success, carry out step 6; If checking symbol length exceedes preset length,, by comprising boot symbol and verifying that symbol is reduced at interior all characters the submission information for the treatment of, in input information text box, show, get back to step 1.
In step 6, if above step is carried out smoothly, information data (not containing hidden code) will automatically be submitted to and be saved to specified database.
The present invention can submit information to when user does not log in, prevents that account is stolen, and by the checking of hidden code, can effectively prevent from artificially inputting junk information; After user logs in, also need submission information to audit, determine whether junk information, further prevent the implantation of junk information; Hidden code is automatically submitted to and without click on submission button, is reduced the operation of repeating step, makes user submit to information more convenient.

Claims (2)

1. exempt from the formula that logs in and submit a method for information identity verification to, comprise the steps:
(a) user's input message under logging status not;
(b) after input information completes, input hidden code, in the time that system detects the boot symbol part of hidden code, automatically the character of input is afterwards considered as to the checking symbol part of hidden code, and encrypt and present with " * " number, the input of simultaneous verification symbol part is also correct, represents that hidden code is correct, now authentication success, program will be committed to specified database information data (not containing hidden code) automatically.
2. according to a kind of method of exempting to log in formula submission information identity verification claimed in claim 1, in step (a), when institute, input message comprises boot symbol, after input boot symbol, input validation symbol, in the time that checking symbol is correct and length meets, be considered as hidden code, now authentication success; When checking symbol is incorrect or length exceedes preset length, be reduced to and treat that submission information is presented in text input frame.
CN201410196157.6A 2014-05-12 2014-05-12 A kind of formula that logs in of exempting from submits information the method verifying identity to Active CN103942508B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410196157.6A CN103942508B (en) 2014-05-12 2014-05-12 A kind of formula that logs in of exempting from submits information the method verifying identity to

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410196157.6A CN103942508B (en) 2014-05-12 2014-05-12 A kind of formula that logs in of exempting from submits information the method verifying identity to

Publications (2)

Publication Number Publication Date
CN103942508A true CN103942508A (en) 2014-07-23
CN103942508B CN103942508B (en) 2016-10-12

Family

ID=51190174

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410196157.6A Active CN103942508B (en) 2014-05-12 2014-05-12 A kind of formula that logs in of exempting from submits information the method verifying identity to

Country Status (1)

Country Link
CN (1) CN103942508B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107544735A (en) * 2016-06-27 2018-01-05 阿里巴巴集团控股有限公司 The method, apparatus and terminal that list is submitted

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404392A (en) * 2011-11-10 2012-04-04 山东浪潮齐鲁软件产业股份有限公司 Integration type registering method for web application or website
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
US20120233042A1 (en) * 2011-03-08 2012-09-13 Gi Gi Chen System and method for registration, and system and method for managing electronic revenue and expenditure vouchers using the same
CN103118022A (en) * 2013-01-28 2013-05-22 上海巨人网络科技有限公司 Verification method of no-password unauthenticated login

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
US20120233042A1 (en) * 2011-03-08 2012-09-13 Gi Gi Chen System and method for registration, and system and method for managing electronic revenue and expenditure vouchers using the same
CN102404392A (en) * 2011-11-10 2012-04-04 山东浪潮齐鲁软件产业股份有限公司 Integration type registering method for web application or website
CN103118022A (en) * 2013-01-28 2013-05-22 上海巨人网络科技有限公司 Verification method of no-password unauthenticated login

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
姬伟: "菏泽信息工程大学OA系统安全技术的设计与应用", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107544735A (en) * 2016-06-27 2018-01-05 阿里巴巴集团控股有限公司 The method, apparatus and terminal that list is submitted

Also Published As

Publication number Publication date
CN103942508B (en) 2016-10-12

Similar Documents

Publication Publication Date Title
Melicher et al. Usability and security of text passwords on mobile devices
CN111241517B (en) Method and device for constructing biological feature verification question-answer library
RU2019100715A (en) METHODS TO ENSURE SECURITY OF TRANSACTIONS IN VIRTUAL REALITY
US9208304B2 (en) Method for web service user authentication
US9716699B2 (en) Password management system
CN103177204B (en) Password information tip method and device
CA2970338C (en) System and method for replacing common identifying data
CN103714301B (en) Cipher-code input method and device
CN104158664A (en) Identity authentication method and system
US10785256B1 (en) Systems and methods for key logger prevention security techniques
US20170017782A1 (en) Access Code Obfuscation Using Speech Input
WO2013152735A1 (en) Electronic cipher generation method, apparatus and device, and electronic cipher authentication system
CN105491030A (en) Website user password encryption and verification method
CN101170408A (en) Method and system for realizing agent certification based on identity authentication mode including random information
CN111327570B (en) Authentication method, apparatus and computer-readable storage medium
CN107622208A (en) Note encryption and decryption method and related product
CN103942508A (en) Login-free information submitting and identity identification method
CN102945336A (en) Password input method on intelligent communication terminal
CN106060000B (en) Method and equipment for identifying verification information
Stokes et al. How language formality in security and privacy interfaces impacts intended compliance
CN102982260B (en) A kind of (SuSE) Linux OS and installation series number verification method thereof
CN103051447A (en) Method for user security management of important system
CN103401869A (en) Automatic account logging method
US20120234923A1 (en) Method and/or device for managing authentication data
Mogal et al. How Two Factor Authentication Helps in Cybersecurity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20180517

Address after: 412000 Yuet Lake International 199, Pearl River North Road, Tianyuan District, Zhuzhou, Hunan 1502

Patentee after: ZHUZHOU ZHI HUI INTELLECTUAL PROPERTY OPERATION SERVICE Co.,Ltd.

Address before: 412007 Zhuzhou Taishan Road, Tianyuan No. 88, Hunan University of Technology, Taishan

Patentee before: Hunan University of Technology

TR01 Transfer of patent right
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180720

Address after: 410007 room 3003, 3 building, A7 tower, A-2 block, Desheng city square, 868 Yuxin District, Yuhua District, Changsha, Hunan (cluster Registration No. 62)

Patentee after: CHANGSHA QUICKWIS NETWORK TECHNOLOGY CO.,LTD.

Address before: 412000 Yuet Lake International 199, Pearl River North Road, Tianyuan District, Zhuzhou, Hunan 1502

Patentee before: ZHUZHOU ZHI HUI INTELLECTUAL PROPERTY OPERATION SERVICE Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220425

Address after: 310000 room 1901, building 1, No. 1168, Bin'an Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Zhejiang Xiaochong Technology Co.,Ltd.

Address before: 410007 room 3003, 3 building, A7 tower, A-2 block, Desheng city square, 868 Yuxin District, Yuhua District, Changsha, Hunan (cluster Registration No. 62)

Patentee before: CHANGSHA QUICKWIS NETWORK TECHNOLOGY CO.,LTD.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230919

Address after: Room 2003, Building 1, No. 1168 Bin'an Road, Changhe Street, Binjiang District, Hangzhou City, Zhejiang Province, 310000

Patentee after: Zhejiang Xiaochong Network Technology Co.,Ltd.

Address before: 310000 room 1901, building 1, No. 1168, Bin'an Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Zhejiang Xiaochong Technology Co.,Ltd.