CN103942508B - A kind of formula that logs in of exempting from submits information the method verifying identity to - Google Patents

A kind of formula that logs in of exempting from submits information the method verifying identity to Download PDF

Info

Publication number
CN103942508B
CN103942508B CN201410196157.6A CN201410196157A CN103942508B CN 103942508 B CN103942508 B CN 103942508B CN 201410196157 A CN201410196157 A CN 201410196157A CN 103942508 B CN103942508 B CN 103942508B
Authority
CN
China
Prior art keywords
information
hidden code
input
authenticator
logs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410196157.6A
Other languages
Chinese (zh)
Other versions
CN103942508A (en
Inventor
田飞
罗文祥
龚江芸
李爱明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Xiaochong Network Technology Co.,Ltd.
Original Assignee
Hunan University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan University of Technology filed Critical Hunan University of Technology
Priority to CN201410196157.6A priority Critical patent/CN103942508B/en
Publication of CN103942508A publication Critical patent/CN103942508A/en
Application granted granted Critical
Publication of CN103942508B publication Critical patent/CN103942508B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Document Processing Apparatus (AREA)

Abstract

Summary: the invention discloses a kind of method that internet page submits information to, in order to provide the data upload flow process of more quick, safe identity verification mode.When the method is a kind of account being not logged in oneself user, by the method for the quick and safe submission information of hidden code, described method comprises the steps: input information;Detect whether to comprise boot symbol;Judge whether authenticator meets;Submission information.The present invention, by the checking of hidden code, can effectively prevent from artificially inputting junk information, and user need not log in, and inputted hidden code and can automatically submit to, makes submission information more convenient, quick.

Description

A kind of formula that logs in of exempting from submits information the method verifying identity to
Technical field
The present invention relates to the technical field of internet information safety, especially one in daily life and be not logged in account user Time, the submission information that energy is quick and safe, and the method carrying out verifying identity.
Background technology
In daily life, along with the development of science Yu information technology, the Internet plays more and more heavier in people's daily life The effect wanted.Submitting information on internet web page to is a kind of high-frequency behavior, and present internet web page form data is submitted to The operating process of method and user is more complicated, and this will expend the substantial amounts of time and efforts of user.Simultaneously as submit letter to Breath needs to input username and password, under strange terminal (such as public library, Internet bar etc.) environment, it will cause account close Code has the risk of potential leakage.Therefore, information is submitted to has loaded down with trivial details two hidden danger safe with information leakage of process, is unfavorable for user Internet web page carries out information submission work, brings much inconvenience to user.
Summary of the invention
The technical problem to be solved is: invention is a kind of is exempting from input user profile and identifying code, exempts from click and logs in In the case of submitting button to, the method that information can be submitted to safe and efficiently.
The technical solution used in the present invention is: a kind of formula that logs in of exempting from submits information the method verifying identity to, comprises: information Input text box 100, information to be committed 200 and hidden code 300.The hidden code that the present invention mentions both can verify the identity letter of user Breath, also can be as machine authentication code, moreover it is possible to play the effect submitting information button to.This hidden code is similar to password, but the most single-row is Cryptographic item inputs, but is blended in message text use with character string forms.Hidden code by user when Entered state pre- If wherein, boot symbol is less combining characters, at least a double figures;Authenticator length does not limits.
Described method comprises the steps: that (a) user inputs information under being not logged in state;B () information has inputted after, Input hidden code, when system detects the boot symbol part of hidden code, automatically the character inputted afterwards is considered as the authenticator portion of hidden code Point, and present with " * " number encryption, authenticator part input simultaneously is the most correct, then it represents that hidden code is correct, now authentication Success, program will be committed to specified database information data (without hidden code) automatically.
In step (a), if institute's input information comprises boot symbol, after input boot symbol, input validation accords with, checking When symbol is correct and length meets, it is considered as hidden code, now authentication success;If authenticator is incorrect or length exceedes preset length, Then it is reduced to information to be committed show.
In step (b), the hidden code inputted is that user oneself is arranged when applying for account or under Entered state.
The medicine have the advantages that 1, information can be submitted user does not logs in when to, prevent account stolen, and in step Suddenly in (b), by the checking of hidden code, can effectively prevent from artificially inputting junk information.2, after user logs in, also need carrying Friendship information is audited, it may be judged whether for junk information, prevent the implantation of junk information further.3, hidden code automatically submit to and Submit button to without clicking on, reduce the operation repeating step, make user submit to information more convenient.
Accompanying drawing explanation
Fig. 1 is the flow chart that data on webpage form of the present invention is submitted to.
Fig. 2 is the block diagram that data on webpage form of the present invention is submitted to.
Detailed description of the invention
Below by specific embodiment, the present invention is described in further detail.Should be appreciated that specific embodiment described herein Only in order to explain the present invention, it is not intended to limit the present invention.
One is exempted from the formula that logs in and is submitted information to and verify identity process, and described content such as Fig. 2 comprises: information input text box 100, information 200 to be committed and hidden code 300.
Fig. 1 shows the flow chart that data on webpage form of the present invention is submitted to.
In step 1, user can input information to be committed under being not logged in state.
In step 2, when system detects the boot symbol that the inputted information of user comprises hidden code, then automatically with " * " number Display comprises the content thereafter of boot symbol, and this boot symbol is that user oneself is arranged when applying for account or under Entered state 's.
In step 3, user's input validation accords with, and this authenticator is that user oneself sets when applying for account or under Entered state Put.
In step 4, the authenticator that system can detect user's input automatically is the most correct, if correctly, then carries out step 5;If incorrect, then all characters comprising boot symbol are reduced to information to be committed, in information input text box Display, returns to step 1.
In steps of 5, the authenticator length that system can detect user's input automatically is the most suitable, if appropriate, then and identity It is proved to be successful, carries out step 6;If authenticator length exceedes preset length, then will comprise the institute of boot symbol and authenticator There is character to be reduced to information to be committed, show in information input text box, return to step 1.
In step 6, if above step is smoothed out, then information data (without hidden code) will submit preservation to extremely automatically Specified database.
The present invention can submit information to user does not logs in when, prevents account stolen, and by the checking of hidden code, can Effectively prevent from artificially inputting junk information;After user logs in, also need submission information is audited, it may be judged whether believe for rubbish Breath, prevents the implantation of junk information further;Hidden code is automatically submitted to and is submitted button to without clicking on, and reduces the behaviour repeating step Make, make user submit to information more convenient.

Claims (2)

1. exempt from the formula that logs in and submit information the method verifying identity to, comprise the steps:
A () user inputs information under being not logged in state;
B () information has inputted after, input hidden code, when system detects the boot symbol part of hidden code, automatically will The character inputted afterwards is considered as the authenticator part of hidden code, and presents with " * " number encryption, authenticator portion simultaneously Dividing input the most correct, then it represents that hidden code is correct, now authentication success, program will be automatically information data It is committed to specified database.
2. submit information the method verifying identity to, in step according to a kind of formula that logs in of exempting from described in claim 1 In (a), when input information comprise boot symbol, input boot symbol after, input validation accord with, work as authenticator Correct and time length meets, it is considered as hidden code, now authentication success;When authenticator is incorrect or length exceedes pre- If length, then it is reduced to information to be committed and shows in Text Entry.
CN201410196157.6A 2014-05-12 2014-05-12 A kind of formula that logs in of exempting from submits information the method verifying identity to Active CN103942508B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410196157.6A CN103942508B (en) 2014-05-12 2014-05-12 A kind of formula that logs in of exempting from submits information the method verifying identity to

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410196157.6A CN103942508B (en) 2014-05-12 2014-05-12 A kind of formula that logs in of exempting from submits information the method verifying identity to

Publications (2)

Publication Number Publication Date
CN103942508A CN103942508A (en) 2014-07-23
CN103942508B true CN103942508B (en) 2016-10-12

Family

ID=51190174

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410196157.6A Active CN103942508B (en) 2014-05-12 2014-05-12 A kind of formula that logs in of exempting from submits information the method verifying identity to

Country Status (1)

Country Link
CN (1) CN103942508B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107544735A (en) * 2016-06-27 2018-01-05 阿里巴巴集团控股有限公司 The method, apparatus and terminal that list is submitted

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404392A (en) * 2011-11-10 2012-04-04 山东浪潮齐鲁软件产业股份有限公司 Integration type registering method for web application or website
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
CN103118022A (en) * 2013-01-28 2013-05-22 上海巨人网络科技有限公司 Verification method of no-password unauthenticated login

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202012100800U1 (en) * 2011-03-08 2012-05-29 M-Media Co., Ltd. Entry system and electronic revenue / expenditure document tracking system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
CN102404392A (en) * 2011-11-10 2012-04-04 山东浪潮齐鲁软件产业股份有限公司 Integration type registering method for web application or website
CN103118022A (en) * 2013-01-28 2013-05-22 上海巨人网络科技有限公司 Verification method of no-password unauthenticated login

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
菏泽信息工程大学OA系统安全技术的设计与应用;姬伟;《中国优秀硕士学位论文全文数据库 信息科技辑》;20100715(第07期);I138-659 *

Also Published As

Publication number Publication date
CN103942508A (en) 2014-07-23

Similar Documents

Publication Publication Date Title
Melicher et al. Usability and security of text passwords on mobile devices
RU2019100715A (en) METHODS TO ENSURE SECURITY OF TRANSACTIONS IN VIRTUAL REALITY
US20140373088A1 (en) System and methods for analyzing and modifying passwords
US20160014120A1 (en) Method, server, client and system for verifying verification codes
CN106453205B (en) identity verification method and device
US20130269010A1 (en) Pattern entropy password strength estimator
MY180882A (en) Method and system for performing secure banking transactions
CN103177204B (en) Password information tip method and device
CN108875404B (en) Data desensitization method and device based on machine learning and storage medium
CN106161710B (en) A kind of user account safety management system based on smart phone
CN102867155A (en) Multiple-encryption and graded-management method for electronic files
CN102841996A (en) Clicking type verification picture and clicking type verification method
CN105491030A (en) Website user password encryption and verification method
US11899770B2 (en) Verification method and apparatus, and computer readable storage medium
Samuel et al. Knock, Knock.{Who’s} There? On the Security of {LG’s} Knock Codes
CN101170408A (en) Method and system for realizing agent certification based on identity authentication mode including random information
CN103942508B (en) A kind of formula that logs in of exempting from submits information the method verifying identity to
Stokes et al. How language formality in security and privacy interfaces impacts intended compliance
CN106060000B (en) Method and equipment for identifying verification information
EP2947591A1 (en) Authentication by Password Mistyping Correction
CN103401869A (en) Automatic account logging method
CN106790114A (en) A kind of code entry method with prompt facility
US20120144460A1 (en) Methods and devices for access authenication on a computer
JP2010257101A (en) User authentication system and method, scratch medium, and method for manufacturing the same
US20120234923A1 (en) Method and/or device for managing authentication data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180517

Address after: 412000 Yuet Lake International 199, Pearl River North Road, Tianyuan District, Zhuzhou, Hunan 1502

Patentee after: ZHUZHOU ZHI HUI INTELLECTUAL PROPERTY OPERATION SERVICE Co.,Ltd.

Address before: 412007 Zhuzhou Taishan Road, Tianyuan No. 88, Hunan University of Technology, Taishan

Patentee before: Hunan University of Technology

TR01 Transfer of patent right

Effective date of registration: 20180720

Address after: 410007 room 3003, 3 building, A7 tower, A-2 block, Desheng city square, 868 Yuxin District, Yuhua District, Changsha, Hunan (cluster Registration No. 62)

Patentee after: CHANGSHA QUICKWIS NETWORK TECHNOLOGY CO.,LTD.

Address before: 412000 Yuet Lake International 199, Pearl River North Road, Tianyuan District, Zhuzhou, Hunan 1502

Patentee before: ZHUZHOU ZHI HUI INTELLECTUAL PROPERTY OPERATION SERVICE Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220425

Address after: 310000 room 1901, building 1, No. 1168, Bin'an Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Zhejiang Xiaochong Technology Co.,Ltd.

Address before: 410007 room 3003, 3 building, A7 tower, A-2 block, Desheng city square, 868 Yuxin District, Yuhua District, Changsha, Hunan (cluster Registration No. 62)

Patentee before: CHANGSHA QUICKWIS NETWORK TECHNOLOGY CO.,LTD.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230919

Address after: Room 2003, Building 1, No. 1168 Bin'an Road, Changhe Street, Binjiang District, Hangzhou City, Zhejiang Province, 310000

Patentee after: Zhejiang Xiaochong Network Technology Co.,Ltd.

Address before: 310000 room 1901, building 1, No. 1168, Bin'an Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Zhejiang Xiaochong Technology Co.,Ltd.

TR01 Transfer of patent right