CN107563176A - Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk - Google Patents
Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk Download PDFInfo
- Publication number
- CN107563176A CN107563176A CN201710707494.0A CN201710707494A CN107563176A CN 107563176 A CN107563176 A CN 107563176A CN 201710707494 A CN201710707494 A CN 201710707494A CN 107563176 A CN107563176 A CN 107563176A
- Authority
- CN
- China
- Prior art keywords
- log
- flash disk
- usb flash
- message
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The present invention provides a kind of login authentication method based on USB flash disk, system, readable storage medium storing program for executing and computer, and the login authentication method includes:Under the login wait state of application, inquire about the current USB flash disk that current USB interface is accessed and whether there is log file, the log file includes including an identifier by the log-on message of encryption keys, the encryption key;If so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when the USB flash disk identifier and the identifier match, the log-on message successful decryption;The log-on message after decryption is read, and the login authentication of the application is carried out by the log-on message after decryption.Login authentication method and system in the present invention, the USB flash disk have security and confidentiality so that user can apply when logging in application conveniently and described in secure log.
Description
Technical field
The present invention be used for a kind of field of accession authorization system, more particularly to a kind of login authentication method based on USB flash disk,
System, readable storage medium storing program for executing and computer.
Background technology
With the rapid development of science and technology, the number of people's online is also more and more, it is sometimes necessary to searches data, just
Need to enter special website or software systems, when downloading required data, user needs register account number or directly stepped on
The website or the software systems are recorded, therefore during the website or the software systems are logged in, user needs oneself input to use
Name in an account book and corresponding password, it then can enter related webpage or software, meanwhile, people are generally by USB flash disk (USB
Flash disk, USB flash drive) carry out data on file.
In the prior art, during system login is realized, traditional approach be by inputting account name and password login,
Meanwhile also have by the way that user cipher is stored in USB flash disk, reuse the USB flash disk and logged in.
But in the prior art, the traditional approach inputs inconvenience, and middle input in public on the touchscreen
Password can be not safe enough, leaks the privacy of user sometimes.In addition, when being logged in using USB flash disk, the information in the USB flash disk is not entered
Row encryption, may result in privacy of user and is stolen.
The content of the invention
In view of above-mentioned condition, the purpose of the embodiment of the present invention are to provide a kind of base that effectively can prevent from stealing user profile
In the login authentication method of USB flash disk.
A kind of authentication login method based on USB flash disk, including:
Under the login wait state of application, it is literary with the presence or absence of logging in inquire about the current USB flash disk that current USB interface is accessed
Part, the log file include including an identifier by the log-on message of encryption keys, the encryption key;
If so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, work as institute
When stating USB flash disk identifier with the identifier match, the log-on message successful decryption;
The log-on message after decryption is read, and the login of the application is carried out by the log-on message after decryption
Certification.
Further, the login authentication method also includes:
Obtain the log-on message and the identifier;
The encryption key is generated according to the identifier, and according to the encryption key and AES to the login
Information is encrypted;
The log-on message after encryption is write into the log file.
Further, the step of acquisition identifier includes:
The essential information of USB flash disk is obtained, the essential information includes the id information of the USB flash disk;
MD5 values are calculated according to the essential information, using the MD5 values as the identifier.
Further, in the step of log-on message is decrypted the USB flash disk identifier according to the current USB flash disk
Including:
Obtain the USB flash disk identifier of log-on message to be decrypted and the current USB flash disk;
Decruption key is generated according to the USB flash disk identifier of the current USB flash disk;
The log-on message is decrypted according to the decruption key and decipherment algorithm.
Further, the log-on message read after decryption, and being carried out by the log-on message after decryption
The step of login authentication of the application, includes:
Read the log-on message;
Judge the log-on message whether effectively/be verified, if so, then Successful login.
Above-mentioned login authentication method, under the login wait state of application, inquire about the current U that current USB interface is accessed
Disk whether there is log file, and the log file includes the log-on message by encryption keys, the encryption key bag
An identifier is included, if so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when
When the USB flash disk identifier is with the identifier match, the log-on message successful decryption, the login letter after decryption is read
Breath, and pass through the login authentication of the log-on message progress application after decryption.This method can be in the login based on USB flash disk
During certification, the USB flash disk can have security and confidentiality, because the log-on message in the USB flash disk is by the U
The identifier of disk, which is encrypted, to be acquired, and the identifier is acquired according to the attribute information of the USB flash disk, described
The attribute information of USB flash disk has uniqueness, so that when being logged in by USB flash disk, avoids privacy and the important information leakage of user,
Cause unsafe problem.
A kind of authentication login system based on USB flash disk, including:
Query unit, it is under the login wait state of application, inquiring about the current USB flash disk that current USB interface is accessed
No log file to be present, the log file includes including a U by the log-on message of encryption keys, the encryption key
The identifier of disk;
Decryption unit, for when the current USB flash disk has the log file, obtaining the USB flash disk mark of the current USB flash disk
Symbol, and the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when the USB flash disk identifier
During with the identifier match, the log-on message successful decryption;
Login authentication unit, for reading the log-on message after decrypting, and pass through the log-on message after decryption
Carry out the login authentication of the application.
Further, in addition to:
First acquisition unit, for obtaining the log-on message and the identifier;
Ciphering unit, for generating the encryption key according to the identifier, and according to the encryption key and encryption
The log-on message is encrypted algorithm;
Memory cell, for the log-on message after encryption to be write into the log file.
Further, in addition to:
Second acquisition unit, for obtaining the essential information of USB flash disk, the essential information includes the id information of the USB flash disk;
Identifier determining unit, for calculating MD5 values according to the essential information, using the MD5 values as the mark
Symbol.
A kind of readable storage medium storing program for executing, computer program is stored thereon with, it is real when the computer program is executed by processor
The step of existing method described above.
A kind of computer equipment, including memory, processor and storage can be run on a memory and on a processor
Computer program, the computing device program is the step of realizing method described above.
Above-mentioned accession authorization system, under the login wait state of application, inquire about the current U that current USB interface is accessed
Disk whether there is log file, and the log file includes the log-on message by encryption keys, the encryption key bag
An identifier is included, if so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when
When the USB flash disk identifier is with the identifier match, the log-on message successful decryption, the login letter after decryption is read
Breath, and pass through the login authentication of the log-on message progress application after decryption.The system can be in the login based on USB flash disk
During certification, the USB flash disk can have security and confidentiality, because the log-on message in the USB flash disk is by the U
The identifier of disk, which is encrypted, to be acquired, and the identifier is acquired according to the attribute information of the USB flash disk, described
The attribute information of USB flash disk has uniqueness, so that when being logged in by USB flash disk, avoids privacy and the important information leakage of user,
Cause unsafe problem.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, without having to pay creative labor, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart for the login authentication method based on USB flash disk that first embodiment of the invention provides.
Fig. 2 is the flow chart for the login authentication method based on USB flash disk that second embodiment of the invention provides.
Fig. 3 is the structured flowchart for the accession authorization system based on USB flash disk that third embodiment of the invention provides.
Fig. 4 is the structured flowchart of accession authorization system of the another kind based on USB flash disk in third embodiment of the invention.
Fig. 5 is the structured flowchart of the decryption unit in third embodiment of the invention.
Fig. 6 is the structured flowchart of the login authentication unit in third embodiment of the invention.
Following embodiment will combine above-mentioned accompanying drawing and further illustrate the present invention.
Embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, and is retouched with reference to following
State and accompanying drawing, it will be clear that these and other aspects of embodiments of the invention.In these descriptions and accompanying drawing, this is specifically disclosed
Some particular implementations in the embodiment of invention, to represent to implement some modes of the principle of embodiments of the invention, but
It is it should be appreciated that the scope of embodiments of the invention is not limited.On the contrary, embodiments of the invention include falling into appended weighting
All changes, modification and equivalent in the range of the spirit and intension of sharp claim.
Referring to Fig. 1, the flow chart for the login authentication method showing in first embodiment of the invention, including S01 is extremely
S03。
Step S01, under the login wait state of application, inquire about the current USB flash disk that current USB interface is accessed and whether there is
Log file, the log file include including an identifier by the log-on message of encryption keys, the encryption key.
It is to be appreciated that when needing the application in log into thr computer, it is necessary first to which current USB flash disk is inserted into the calculating
The USB interface of machine, when the current USB flash disk that the COMPUTER DETECTION accesses to current USB interface, the computer will read institute
The storage information in current USB flash disk is stated, afterwards, it is necessary to judge to whether there is log file, the login in the storage information
File includes including an identifier by the log-on message of encryption keys, the encryption key.
Wherein, the log-on message can be username and password, can be that effective property is used to logging in
Information, for example, the cookie information of browser is exactly a kind of information of effective property, the general cookie information it is effective when
Between be no more than 1 day.
Wherein, the log-on message is encrypted by AES and encryption key row, the AES include MD5 and
Aes algorithm.
Step S02, if so, then being solved according to the USB flash disk identifier of the uniqueness of the current USB flash disk to the log-on message
It is close, when the USB flash disk identifier and the identifier match, the log-on message successful decryption.
It should be understood that when described step in the current USB flash disk that current USB interface described in the computer inquery is accessed being present
When recording file, just need that the log-on message in the log file is decrypted afterwards, at this time, it may be necessary to get described current
The USB flash disk identifier of the uniqueness of USB flash disk, just need to judge whether the USB flash disk identifier matches with the identifier afterwards, if so,
Then illustrate the log-on message successful decryption.
For example, during the uncommon fertile blank 5 of software is logged in, current USB flash disk is inserted in the software, the software is worked as to described
Preceding USB flash disk is detected, and then the software will judge to whether there is file in the current USB flash disk, if in the presence of obtaining the U
The identifier of disk, and judge whether the identifier of the USB flash disk is consistent with the identifier of the login USB flash disk, if so, then to the text
Part is decrypted, if successful decryption, it is just target USB flash disk to judge the USB flash disk.
Wherein, it is necessary to the USB flash disk identifier of the current USB flash disk be obtained, according to the U of the current USB flash disk during decryption
Disc identifier generates corresponding decruption key, and the log-on message is decrypted according to the decruption key and decipherment algorithm.
Wherein, the decipherment algorithm is symmetrical decipherment algorithm corresponding to the AES used in ciphering process.
Step S03, the log-on message after decryption is read, and described answer is carried out by the log-on message after decryption
Login authentication.
It is to be appreciated that when the log-on message successful decryption in the current USB flash disk, it is described to step on during login
Record information will be read and send to server corresponding to the application, so that the server is carried out to the log-on message
Checking, after being verified, will carry out applying described in successful log.
To sum up, above-mentioned login authentication method, under the login wait state of application, inquire about what current USB interface was accessed
Current USB flash disk whether there is log file, and the log file includes the log-on message by encryption keys, and the encryption is close
Key includes an identifier, if so, then being solved according to the USB flash disk identifier of the uniqueness of the current USB flash disk to the log-on message
It is close, when the USB flash disk identifier and the identifier match, the log-on message successful decryption, stepped on described in after reading decryption
Information is recorded, and the login authentication of the application is carried out by the log-on message after decryption.This method can be based on USB flash disk
During login authentication, the USB flash disk can have security and confidentiality, because the log-on message in the USB flash disk is to pass through
The identifier of the USB flash disk, which is encrypted, to be acquired, and the identifier is obtained according to the attribute information of the USB flash disk
Arrive, the attribute information of the USB flash disk has uniqueness, so that when being logged in by USB flash disk, avoids the privacy of user and important letter
Breath leakage, causes unsafe problem.
Referring to Fig. 2, the flow chart for another login authentication method showing shown in the embodiment of the present invention.
Step S11, the essential information of USB flash disk is obtained, and the essential information is spliced into a character string, the essential information
Include the id information of the USB flash disk.
It is to be appreciated that for example, the USB flash disk is USB flash disk a, the essential information not only includes the id information of the USB flash disk a, also wrapped
Include manufacturer's information of the USB flash disk a etc..
Step S12, MD5 values, the identifier using the MD5 values as the USB flash disk, and root are calculated according to the essential information
The encryption key is generated according to the identifier of the USB flash disk.
It whether there is the log file before, it is necessary to in the log file when inquiring in the current USB flash disk a
The log-on message is encrypted, and needs to obtain encryption key in ciphering process.
Wherein, when obtaining log-on message, it is necessary to be encrypted to the log-on message, it is necessary to pass through during encryption
AES and encryption key are encrypted to the log-on message, when using AES, can be counted by using MD5 algorithms
Identifier of the corresponding MD5 values as the USB flash disk a is calculated, a part for the encryption key, institute are used as by the identifier
The another part for stating encryption key can be by the customized character string of program.
Wherein, the AES includes MD5, AES and DES etc., wherein, MD5 (the Message Digest
Algorithm 5) refer to message digest algorithm, a kind of widely used hash function of computer safety field, disappear to provide
The integrity protection of breath, the AES (Advanced Encryption Standard) refer to Advanced Encryption Standard, are a kind of areas
Block encryption standard.
Step S13, the log-on message is encrypted according to the encryption key and believes the login after encryption
Breath storage is into the USB flash disk.
It should be understood that after the log-on message is encrypted, it is described by log-on message storage into log file
Log file will be stored in the USB flash disk a, so that the log-on message can be bound with the login USB flash disk a indirectly.
Above-mentioned steps S11 to S13 is to make the process for logging in USB flash disk, and the USB flash disk that logs in is to have correctly to log in stepping on for application
Information is recorded, and the log-on message is encrypted by the identifier of the uniqueness of the USB flash disk.Wherein, it is described to log in the general of USB flash disk
Read it is to be understood that for example, using before logging in, the log-on message for correctly logging in the application can be encrypted
And store into a file, the file can be described as log file, afterwards by log file storage into a USB flash disk,
Therefore this USB flash disk is just referred to as to log in USB flash disk, and the identifier is exactly to be acquired by the login USB flash disk, and the mark
It is uniqueness to know symbol.
Step S14, inquiry USB flash disk whether there is log file, and the log file includes stepping on by encryption keys
Information is recorded, the encryption key includes the identifier for logging in USB flash disk.
Wherein, when the USB flash disk is inserted into computer by USB interface, the computer will read the USB flash disk
In content after, and judge to whether there is the log file in the USB flash disk.
In the specific implementation, in fact it could happen that such case:For example, in the presence of a USB flash disk b, under the login wait state of application,
When the USB flash disk b is inserted into computer by user, user does not know whether the USB flash disk b is that can be answered described in Successful login in advance
With, therefore just there will be two kinds of situations when reading the USB flash disk b for the computer:Text is logged in first, being not present in the USB flash disk b
Part, therefore the computer can not read the log file, during the USB flash disk b can not be applied described in Successful login;Second, look into
Ask in the USB flash disk b and have the log file, now need further to get the identifier of the USB flash disk b and described step on
The identifier in file is recorded, and judges whether the identifier in the identifier and the log file of the USB flash disk b matches.
Step S15, if so, the USB flash disk identifier of the USB flash disk is then obtained, and it is close according to USB flash disk identifier generation decryption
Key, the log-on message is decrypted according to the decruption key and decipherment algorithm.
It is to be appreciated that the log-on message passes through AES and encryption keys, mistake that is corresponding, then decrypting
, it is necessary to decruption key corresponding to the corresponding symmetrical decipherment algorithm of the AES and the encryption key in journey, then
By the decruption key and the decipherment algorithm, the log-on message is decrypted, can passes through after successful decryption
The USB flash disk carries out the login authentication of the application.
A kind of readable storage medium storing program for executing, is stored thereon with computer program, it is characterised in that the computer program is processed
The step of device realizes the method described in embodiment any one when performing.
A kind of computer, including memory, processor and storage are on a memory and the meter that can run on a processor
Calculation machine program, it is characterised in that the computing device program is to realize the step of the method described in any one in embodiment
Suddenly.
To sum up, above-mentioned login authentication method, inquire about the USB flash disk that current USB interface is accessed and whether there is log file, it is described
Log file includes the log-on message by encryption keys, and the encryption key includes an identifier, if so, then according to institute
The log-on message is decrypted the USB flash disk identifier for stating the uniqueness of USB flash disk, when the USB flash disk identifier and the identifier
Timing, the log-on message successful decryption, the log-on message after decryption is read, and pass through the log-on message after decryption
Carry out the login authentication of the application.This method can be during the login authentication based on USB flash disk, and the USB flash disk can have
Security and confidentiality, because the log-on message in the USB flash disk is to be encrypted to acquire by the identifier of the USB flash disk,
And the identifier is acquired according to the attribute information of the USB flash disk, and the attribute information of the USB flash disk has uniqueness, from
And cause when being logged in by USB flash disk, privacy and the important information leakage of user is avoided, causes unsafe problem.
Another aspect of the present invention also provides a kind of accession authorization system, refers to shown in Fig. 3 to Fig. 6, implements for the present invention
A kind of structural representation of the accession authorization system exemplified, the accession authorization system 10 include query unit 11, decryption list
Member 12 and login authentication unit 13.
The query unit 11, under the login wait state of application, inquire about current USB interface accessed it is current
USB flash disk whether there is log file, and the log file includes the log-on message by encryption keys, the encryption key bag
Include an identifier;
The decryption unit 12, for if so, then being stepped on according to the USB flash disk identifier of the uniqueness of the current USB flash disk to described
Record information is decrypted, when the USB flash disk identifier and the identifier match, the log-on message successful decryption;
The login authentication unit 13, for reading the log-on message after decrypting, and by stepping on described in after decryption
Record the login authentication that information carries out the application.
Further, in addition to:First acquisition unit 14, ciphering unit 15 and memory cell 16.
The first acquisition unit 14, for obtaining the log-on message and the identifier;
The ciphering unit 15, for generating the encryption key according to the identifier, and according to the encryption key
The log-on message is encrypted with AES;
The memory cell 16, for the log-on message after encryption to be write into the log file.
Further, in addition to second acquisition unit 17 and identifier determining unit 18.
The second acquisition unit 17, for obtaining the essential information of USB flash disk, the essential information includes the ID of the USB flash disk
Information;
The identifier determining unit 18, MD5 values are calculated according to the essential information, using the MD5 values as the mark
Know symbol.
Further, the decryption unit 12 includes the 3rd acquiring unit 121, generation unit 122 and decryption subelement
123。
3rd acquiring unit 121, for obtaining the USB flash disk identifier of log-on message to be decrypted and the current USB flash disk;
The generation unit 122, for generating decruption key according to the USB flash disk identifier of the current USB flash disk;
The decryption subelement 123, for being solved according to the decruption key and decipherment algorithm to the log-on message
It is close.
Further, the login authentication unit 13 includes reading unit 131 and login authentication subelement 132.
The reading unit 131, for reading the log-on message;
The login authentication subelement 132, for the log-on message to be sent to server, so that the server pair
The log-on message is verified.
Above-mentioned accession authorization system, under the login wait state of application, inquire about the current U that current USB interface is accessed
Disk whether there is log file, and the log file includes the log-on message by encryption keys, the encryption key bag
An identifier is included, if so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when
When the USB flash disk identifier is with the identifier match, the log-on message successful decryption, the login letter after decryption is read
Breath, and pass through the login authentication of the log-on message progress application after decryption.The system can be in the login based on USB flash disk
During certification, the USB flash disk can have security and confidentiality, because the log-on message in the USB flash disk is by the U
The identifier of disk, which is encrypted, to be acquired, and the identifier is acquired according to the attribute information of the USB flash disk, described
The attribute information of USB flash disk has uniqueness, so that when being logged in by USB flash disk, avoids privacy and the important information leakage of user,
Cause unsafe problem.
Can be with one of ordinary skill in the art will appreciate that realizing that all or part of step in above-described embodiment method is
The hardware of correlation is instructed to complete by program, described program can be stored in a computer read/write memory medium,
The program upon execution, comprises the following steps:
Under the login wait state of application, it is literary with the presence or absence of logging in inquire about the current USB flash disk that current USB interface is accessed
Part, the log file include including an identifier by the log-on message of encryption keys, the encryption key;
If so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, work as institute
When stating USB flash disk identifier with the identifier match, the log-on message successful decryption;
The log-on message after decryption is read, and the login of the application is carried out by the log-on message after decryption
Certification.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system including the system of processor or other can be held from instruction
The system of row system, device or equipment instruction fetch and execute instruction) use, or combine these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass
Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment
Put.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not
Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any
One or more embodiments or example in combine in an appropriate manner.
Embodiment described above only expresses the several embodiments of the present invention, and its description is more specific and detailed, but simultaneously
Therefore the limitation to the scope of the claims of the present invention can not be interpreted as.It should be pointed out that for one of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention
Protect scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (10)
- A kind of 1. login authentication method based on USB flash disk, it is characterised in that including:Under the login wait state of application, inquire about the current USB flash disk that current USB interface is accessed and whether there is log file, institute Stating log file includes including an identifier by the log-on message of encryption keys, the encryption key;If so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when the USB flash disk When identifier is with the identifier match, the log-on message successful decryption;The log-on message after decryption is read, and is recognized by the login of the log-on message progress application after decryption Card.
- 2. login authentication method according to claim 1, it is characterised in that the login authentication method also includes:Obtain the log-on message and the identifier;The encryption key is generated according to the identifier, and according to the encryption key and AES to the log-on message It is encrypted;The log-on message after encryption is write into the log file.
- 3. login authentication method according to claim 2, it is characterised in that described the step of obtaining identifier includes:The essential information of USB flash disk is obtained, the essential information includes the id information of the USB flash disk;MD5 values are calculated according to the essential information, using the MD5 values as the identifier.
- 4. login authentication method according to claim 1, it is characterised in that the USB flash disk according to the current USB flash disk identifies The step of log-on message is decrypted symbol includes:Obtain the USB flash disk identifier of log-on message to be decrypted and the current USB flash disk;Decruption key is generated according to the USB flash disk identifier of the current USB flash disk;The log-on message is decrypted according to the decruption key and decipherment algorithm.
- 5. login authentication method according to claim 1, it is characterised in that the login letter read after decryption The step of ceasing, and carrying out the login authentication of the application by the log-on message after decryption includes:Read the log-on message;The log-on message is sent to server, so that the server is verified to the log-on message.
- A kind of 6. accession authorization system, it is characterised in that including:Query unit, whether deposited under the login wait state of application, inquiring about the current USB flash disk that current USB interface is accessed In log file, the log file includes the log-on message by encryption keys, and the encryption key includes a USB flash disk Identifier;Decryption unit, for when the current USB flash disk has the log file, obtaining the USB flash disk identifier of the current USB flash disk, And the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when the USB flash disk identifier with During the identifier match, the log-on message successful decryption;Login authentication unit, carried out for reading the log-on message after decrypting, and by the log-on message after decryption The login authentication of the application.
- 7. accession authorization system according to claim 6, it is characterised in that also include:First acquisition unit, for obtaining the log-on message and the identifier;Ciphering unit, for generating the encryption key according to the identifier, and according to the encryption key and AES The log-on message is encrypted;Memory cell, for the log-on message after encryption to be write into the log file.
- 8. accession authorization system according to claim 7, it is characterised in that also include:Second acquisition unit, for obtaining the essential information of USB flash disk, the essential information includes the id information of the USB flash disk;Identifier determining unit, for calculating MD5 values according to the essential information, using the MD5 values as the identifier.
- 9. a kind of readable storage medium storing program for executing, is stored thereon with computer program, it is characterised in that the computer program is by processor The step of method as described in any one in claim 1-5 is realized during execution.
- 10. a kind of computer, including memory, processor and storage are on a memory and the calculating that can run on a processor Machine program, it is characterised in that the computing device program is to realize the method as described in any one in claim 1-5 The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710707494.0A CN107563176A (en) | 2017-08-17 | 2017-08-17 | Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710707494.0A CN107563176A (en) | 2017-08-17 | 2017-08-17 | Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107563176A true CN107563176A (en) | 2018-01-09 |
Family
ID=60975826
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710707494.0A Pending CN107563176A (en) | 2017-08-17 | 2017-08-17 | Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107563176A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108256309A (en) * | 2018-01-10 | 2018-07-06 | 飞天诚信科技股份有限公司 | Hardware logs in the implementation method and device of windows10 system above |
CN109101788A (en) * | 2018-06-19 | 2018-12-28 | 光大环保技术研究院(南京)有限公司 | A kind of incinerator automatic combustion control system encryption device and encryption method |
CN109344598A (en) * | 2018-09-29 | 2019-02-15 | 北京东土科技股份有限公司 | The binding of equipment room and authority control method, device, equipment and storage medium |
CN109391615A (en) * | 2018-09-27 | 2019-02-26 | 深圳互联先锋科技有限公司 | A kind of server exempts from close login method and system |
CN110084024A (en) * | 2019-04-29 | 2019-08-02 | 四川长虹教育科技有限公司 | Terminal device, the system and method for software login are carried out based on movable storage device |
CN112100601A (en) * | 2020-09-08 | 2020-12-18 | 紫光云(南京)数字技术有限公司 | Internet access password management method, system and device based on secure storage U disk |
CN112257055A (en) * | 2020-10-28 | 2021-01-22 | 深圳市启望科文技术有限公司 | Method and device for protecting sound recording file, computer equipment and storage medium |
CN112580017A (en) * | 2020-12-25 | 2021-03-30 | 深信服科技股份有限公司 | Authentication method and device, electronic equipment and storage medium |
CN113626796A (en) * | 2021-08-16 | 2021-11-09 | 深圳市康冠商用科技有限公司 | Permission obtaining method and device based on USB flash disk, display equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101562607A (en) * | 2009-05-25 | 2009-10-21 | 姚清野 | Authentication method of Real-name Registration based on U disc |
CN102867157A (en) * | 2012-09-11 | 2013-01-09 | 东莞宇龙通信科技有限公司 | Mobile terminal and data protecting method |
CN103093137A (en) * | 2013-01-21 | 2013-05-08 | 西北工业大学 | File safe distribution method based on universal series bus (USB) flash disk |
CN105871558A (en) * | 2016-05-30 | 2016-08-17 | 科德数控股份有限公司 | Numerical control system authority management method based on USB flash disk physical serial number |
-
2017
- 2017-08-17 CN CN201710707494.0A patent/CN107563176A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101562607A (en) * | 2009-05-25 | 2009-10-21 | 姚清野 | Authentication method of Real-name Registration based on U disc |
CN102867157A (en) * | 2012-09-11 | 2013-01-09 | 东莞宇龙通信科技有限公司 | Mobile terminal and data protecting method |
CN103093137A (en) * | 2013-01-21 | 2013-05-08 | 西北工业大学 | File safe distribution method based on universal series bus (USB) flash disk |
CN105871558A (en) * | 2016-05-30 | 2016-08-17 | 科德数控股份有限公司 | Numerical control system authority management method based on USB flash disk physical serial number |
Non-Patent Citations (1)
Title |
---|
张剑: "《信息安全技术应用》", 31 May 2015, 20150531 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11314853B2 (en) | 2018-01-10 | 2022-04-26 | Feitian Technologies Co., Ltd. | Method and apparatus for implementing logging-on of hardware to windows system with version 10 or higher |
CN108256309B (en) * | 2018-01-10 | 2020-01-03 | 飞天诚信科技股份有限公司 | Method and device for realizing system logging in windows10 or above |
CN108256309A (en) * | 2018-01-10 | 2018-07-06 | 飞天诚信科技股份有限公司 | Hardware logs in the implementation method and device of windows10 system above |
CN109101788A (en) * | 2018-06-19 | 2018-12-28 | 光大环保技术研究院(南京)有限公司 | A kind of incinerator automatic combustion control system encryption device and encryption method |
CN109101788B (en) * | 2018-06-19 | 2022-06-03 | 光大环保技术研究院(南京)有限公司 | Encryption device and encryption method for automatic combustion control system of incinerator |
CN109391615A (en) * | 2018-09-27 | 2019-02-26 | 深圳互联先锋科技有限公司 | A kind of server exempts from close login method and system |
CN109344598A (en) * | 2018-09-29 | 2019-02-15 | 北京东土科技股份有限公司 | The binding of equipment room and authority control method, device, equipment and storage medium |
CN110084024A (en) * | 2019-04-29 | 2019-08-02 | 四川长虹教育科技有限公司 | Terminal device, the system and method for software login are carried out based on movable storage device |
CN112100601A (en) * | 2020-09-08 | 2020-12-18 | 紫光云(南京)数字技术有限公司 | Internet access password management method, system and device based on secure storage U disk |
CN112257055A (en) * | 2020-10-28 | 2021-01-22 | 深圳市启望科文技术有限公司 | Method and device for protecting sound recording file, computer equipment and storage medium |
CN112580017A (en) * | 2020-12-25 | 2021-03-30 | 深信服科技股份有限公司 | Authentication method and device, electronic equipment and storage medium |
CN112580017B (en) * | 2020-12-25 | 2023-12-29 | 深信服科技股份有限公司 | Authentication method and device, electronic equipment and storage medium |
CN113626796A (en) * | 2021-08-16 | 2021-11-09 | 深圳市康冠商用科技有限公司 | Permission obtaining method and device based on USB flash disk, display equipment and storage medium |
CN113626796B (en) * | 2021-08-16 | 2022-05-03 | 深圳市康冠商用科技有限公司 | Permission obtaining method and device based on USB flash disk, display equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107563176A (en) | Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk | |
CN110493202B (en) | Login token generation and verification method and device and server | |
US9673975B1 (en) | Cryptographic key splitting for offline and online data protection | |
US8447990B2 (en) | Password encryption key | |
Gasti et al. | On the security of password manager database formats | |
CN102685110B (en) | Universal method and system for user registration authentication based on fingerprint characteristics | |
US20070074038A1 (en) | Method, apparatus and program storage device for providing a secure password manager | |
Zhao et al. | All your browser-saved passwords could belong to us: A security analysis and a cloud-based new design | |
CN106612180A (en) | Method and device for realizing session identifier synchronization | |
WO2014059604A1 (en) | Method and device for secure access to resource | |
KR102137122B1 (en) | Security check method, device, terminal and server | |
Kheshaifaty et al. | Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions | |
CN107454048A (en) | The processing method and processing device of information, the authentication method of information, apparatus and system | |
CN106100851B (en) | Password management system, intelligent wristwatch and its cipher management method | |
Guirat et al. | Formal verification of the W3C web authentication protocol | |
Seta et al. | Implement time based one time password and secure hash algorithm 1 for security of website login authentication | |
CN112613051A (en) | Data encryption storage method and device, computer equipment and storage medium | |
CN104881595B (en) | The self-help remote unlocking method managed based on PIN code | |
CN114244522A (en) | Information protection method and device, electronic equipment and computer readable storage medium | |
CN109960945B (en) | Active safety protection method and system for browser | |
CN114329614A (en) | Data desensitization method and system based on character string confusion | |
CN107070648A (en) | A kind of cryptographic key protection method and PKI system | |
CN106446713A (en) | Encryption method and system for database content | |
TWI640887B (en) | User verification system implemented along with a mobile device and method thereof | |
TWI640928B (en) | System for generating and decrypting two-dimensional codes and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180109 |