CN107563176A - Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk - Google Patents

Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk Download PDF

Info

Publication number
CN107563176A
CN107563176A CN201710707494.0A CN201710707494A CN107563176A CN 107563176 A CN107563176 A CN 107563176A CN 201710707494 A CN201710707494 A CN 201710707494A CN 107563176 A CN107563176 A CN 107563176A
Authority
CN
China
Prior art keywords
log
flash disk
usb flash
message
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710707494.0A
Other languages
Chinese (zh)
Inventor
张奎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Guangzhou Shirui Electronics Co Ltd
Original Assignee
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Guangzhou Shirui Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shiyuan Electronics Thecnology Co Ltd, Guangzhou Shirui Electronics Co Ltd filed Critical Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority to CN201710707494.0A priority Critical patent/CN107563176A/en
Publication of CN107563176A publication Critical patent/CN107563176A/en
Pending legal-status Critical Current

Links

Abstract

The present invention provides a kind of login authentication method based on USB flash disk, system, readable storage medium storing program for executing and computer, and the login authentication method includes:Under the login wait state of application, inquire about the current USB flash disk that current USB interface is accessed and whether there is log file, the log file includes including an identifier by the log-on message of encryption keys, the encryption key;If so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when the USB flash disk identifier and the identifier match, the log-on message successful decryption;The log-on message after decryption is read, and the login authentication of the application is carried out by the log-on message after decryption.Login authentication method and system in the present invention, the USB flash disk have security and confidentiality so that user can apply when logging in application conveniently and described in secure log.

Description

Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk
Technical field
The present invention be used for a kind of field of accession authorization system, more particularly to a kind of login authentication method based on USB flash disk, System, readable storage medium storing program for executing and computer.
Background technology
With the rapid development of science and technology, the number of people's online is also more and more, it is sometimes necessary to searches data, just Need to enter special website or software systems, when downloading required data, user needs register account number or directly stepped on The website or the software systems are recorded, therefore during the website or the software systems are logged in, user needs oneself input to use Name in an account book and corresponding password, it then can enter related webpage or software, meanwhile, people are generally by USB flash disk (USB Flash disk, USB flash drive) carry out data on file.
In the prior art, during system login is realized, traditional approach be by inputting account name and password login, Meanwhile also have by the way that user cipher is stored in USB flash disk, reuse the USB flash disk and logged in.
But in the prior art, the traditional approach inputs inconvenience, and middle input in public on the touchscreen Password can be not safe enough, leaks the privacy of user sometimes.In addition, when being logged in using USB flash disk, the information in the USB flash disk is not entered Row encryption, may result in privacy of user and is stolen.
The content of the invention
In view of above-mentioned condition, the purpose of the embodiment of the present invention are to provide a kind of base that effectively can prevent from stealing user profile In the login authentication method of USB flash disk.
A kind of authentication login method based on USB flash disk, including:
Under the login wait state of application, it is literary with the presence or absence of logging in inquire about the current USB flash disk that current USB interface is accessed Part, the log file include including an identifier by the log-on message of encryption keys, the encryption key;
If so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, work as institute When stating USB flash disk identifier with the identifier match, the log-on message successful decryption;
The log-on message after decryption is read, and the login of the application is carried out by the log-on message after decryption Certification.
Further, the login authentication method also includes:
Obtain the log-on message and the identifier;
The encryption key is generated according to the identifier, and according to the encryption key and AES to the login Information is encrypted;
The log-on message after encryption is write into the log file.
Further, the step of acquisition identifier includes:
The essential information of USB flash disk is obtained, the essential information includes the id information of the USB flash disk;
MD5 values are calculated according to the essential information, using the MD5 values as the identifier.
Further, in the step of log-on message is decrypted the USB flash disk identifier according to the current USB flash disk Including:
Obtain the USB flash disk identifier of log-on message to be decrypted and the current USB flash disk;
Decruption key is generated according to the USB flash disk identifier of the current USB flash disk;
The log-on message is decrypted according to the decruption key and decipherment algorithm.
Further, the log-on message read after decryption, and being carried out by the log-on message after decryption The step of login authentication of the application, includes:
Read the log-on message;
Judge the log-on message whether effectively/be verified, if so, then Successful login.
Above-mentioned login authentication method, under the login wait state of application, inquire about the current U that current USB interface is accessed Disk whether there is log file, and the log file includes the log-on message by encryption keys, the encryption key bag An identifier is included, if so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when When the USB flash disk identifier is with the identifier match, the log-on message successful decryption, the login letter after decryption is read Breath, and pass through the login authentication of the log-on message progress application after decryption.This method can be in the login based on USB flash disk During certification, the USB flash disk can have security and confidentiality, because the log-on message in the USB flash disk is by the U The identifier of disk, which is encrypted, to be acquired, and the identifier is acquired according to the attribute information of the USB flash disk, described The attribute information of USB flash disk has uniqueness, so that when being logged in by USB flash disk, avoids privacy and the important information leakage of user, Cause unsafe problem.
A kind of authentication login system based on USB flash disk, including:
Query unit, it is under the login wait state of application, inquiring about the current USB flash disk that current USB interface is accessed No log file to be present, the log file includes including a U by the log-on message of encryption keys, the encryption key The identifier of disk;
Decryption unit, for when the current USB flash disk has the log file, obtaining the USB flash disk mark of the current USB flash disk Symbol, and the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when the USB flash disk identifier During with the identifier match, the log-on message successful decryption;
Login authentication unit, for reading the log-on message after decrypting, and pass through the log-on message after decryption Carry out the login authentication of the application.
Further, in addition to:
First acquisition unit, for obtaining the log-on message and the identifier;
Ciphering unit, for generating the encryption key according to the identifier, and according to the encryption key and encryption The log-on message is encrypted algorithm;
Memory cell, for the log-on message after encryption to be write into the log file.
Further, in addition to:
Second acquisition unit, for obtaining the essential information of USB flash disk, the essential information includes the id information of the USB flash disk;
Identifier determining unit, for calculating MD5 values according to the essential information, using the MD5 values as the mark Symbol.
A kind of readable storage medium storing program for executing, computer program is stored thereon with, it is real when the computer program is executed by processor The step of existing method described above.
A kind of computer equipment, including memory, processor and storage can be run on a memory and on a processor Computer program, the computing device program is the step of realizing method described above.
Above-mentioned accession authorization system, under the login wait state of application, inquire about the current U that current USB interface is accessed Disk whether there is log file, and the log file includes the log-on message by encryption keys, the encryption key bag An identifier is included, if so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when When the USB flash disk identifier is with the identifier match, the log-on message successful decryption, the login letter after decryption is read Breath, and pass through the login authentication of the log-on message progress application after decryption.The system can be in the login based on USB flash disk During certification, the USB flash disk can have security and confidentiality, because the log-on message in the USB flash disk is by the U The identifier of disk, which is encrypted, to be acquired, and the identifier is acquired according to the attribute information of the USB flash disk, described The attribute information of USB flash disk has uniqueness, so that when being logged in by USB flash disk, avoids privacy and the important information leakage of user, Cause unsafe problem.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, for those of ordinary skill in the art Speech, without having to pay creative labor, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart for the login authentication method based on USB flash disk that first embodiment of the invention provides.
Fig. 2 is the flow chart for the login authentication method based on USB flash disk that second embodiment of the invention provides.
Fig. 3 is the structured flowchart for the accession authorization system based on USB flash disk that third embodiment of the invention provides.
Fig. 4 is the structured flowchart of accession authorization system of the another kind based on USB flash disk in third embodiment of the invention.
Fig. 5 is the structured flowchart of the decryption unit in third embodiment of the invention.
Fig. 6 is the structured flowchart of the login authentication unit in third embodiment of the invention.
Following embodiment will combine above-mentioned accompanying drawing and further illustrate the present invention.
Embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, and is retouched with reference to following State and accompanying drawing, it will be clear that these and other aspects of embodiments of the invention.In these descriptions and accompanying drawing, this is specifically disclosed Some particular implementations in the embodiment of invention, to represent to implement some modes of the principle of embodiments of the invention, but It is it should be appreciated that the scope of embodiments of the invention is not limited.On the contrary, embodiments of the invention include falling into appended weighting All changes, modification and equivalent in the range of the spirit and intension of sharp claim.
Referring to Fig. 1, the flow chart for the login authentication method showing in first embodiment of the invention, including S01 is extremely S03。
Step S01, under the login wait state of application, inquire about the current USB flash disk that current USB interface is accessed and whether there is Log file, the log file include including an identifier by the log-on message of encryption keys, the encryption key.
It is to be appreciated that when needing the application in log into thr computer, it is necessary first to which current USB flash disk is inserted into the calculating The USB interface of machine, when the current USB flash disk that the COMPUTER DETECTION accesses to current USB interface, the computer will read institute The storage information in current USB flash disk is stated, afterwards, it is necessary to judge to whether there is log file, the login in the storage information File includes including an identifier by the log-on message of encryption keys, the encryption key.
Wherein, the log-on message can be username and password, can be that effective property is used to logging in Information, for example, the cookie information of browser is exactly a kind of information of effective property, the general cookie information it is effective when Between be no more than 1 day.
Wherein, the log-on message is encrypted by AES and encryption key row, the AES include MD5 and Aes algorithm.
Step S02, if so, then being solved according to the USB flash disk identifier of the uniqueness of the current USB flash disk to the log-on message It is close, when the USB flash disk identifier and the identifier match, the log-on message successful decryption.
It should be understood that when described step in the current USB flash disk that current USB interface described in the computer inquery is accessed being present When recording file, just need that the log-on message in the log file is decrypted afterwards, at this time, it may be necessary to get described current The USB flash disk identifier of the uniqueness of USB flash disk, just need to judge whether the USB flash disk identifier matches with the identifier afterwards, if so, Then illustrate the log-on message successful decryption.
For example, during the uncommon fertile blank 5 of software is logged in, current USB flash disk is inserted in the software, the software is worked as to described Preceding USB flash disk is detected, and then the software will judge to whether there is file in the current USB flash disk, if in the presence of obtaining the U The identifier of disk, and judge whether the identifier of the USB flash disk is consistent with the identifier of the login USB flash disk, if so, then to the text Part is decrypted, if successful decryption, it is just target USB flash disk to judge the USB flash disk.
Wherein, it is necessary to the USB flash disk identifier of the current USB flash disk be obtained, according to the U of the current USB flash disk during decryption Disc identifier generates corresponding decruption key, and the log-on message is decrypted according to the decruption key and decipherment algorithm.
Wherein, the decipherment algorithm is symmetrical decipherment algorithm corresponding to the AES used in ciphering process.
Step S03, the log-on message after decryption is read, and described answer is carried out by the log-on message after decryption Login authentication.
It is to be appreciated that when the log-on message successful decryption in the current USB flash disk, it is described to step on during login Record information will be read and send to server corresponding to the application, so that the server is carried out to the log-on message Checking, after being verified, will carry out applying described in successful log.
To sum up, above-mentioned login authentication method, under the login wait state of application, inquire about what current USB interface was accessed Current USB flash disk whether there is log file, and the log file includes the log-on message by encryption keys, and the encryption is close Key includes an identifier, if so, then being solved according to the USB flash disk identifier of the uniqueness of the current USB flash disk to the log-on message It is close, when the USB flash disk identifier and the identifier match, the log-on message successful decryption, stepped on described in after reading decryption Information is recorded, and the login authentication of the application is carried out by the log-on message after decryption.This method can be based on USB flash disk During login authentication, the USB flash disk can have security and confidentiality, because the log-on message in the USB flash disk is to pass through The identifier of the USB flash disk, which is encrypted, to be acquired, and the identifier is obtained according to the attribute information of the USB flash disk Arrive, the attribute information of the USB flash disk has uniqueness, so that when being logged in by USB flash disk, avoids the privacy of user and important letter Breath leakage, causes unsafe problem.
Referring to Fig. 2, the flow chart for another login authentication method showing shown in the embodiment of the present invention.
Step S11, the essential information of USB flash disk is obtained, and the essential information is spliced into a character string, the essential information Include the id information of the USB flash disk.
It is to be appreciated that for example, the USB flash disk is USB flash disk a, the essential information not only includes the id information of the USB flash disk a, also wrapped Include manufacturer's information of the USB flash disk a etc..
Step S12, MD5 values, the identifier using the MD5 values as the USB flash disk, and root are calculated according to the essential information The encryption key is generated according to the identifier of the USB flash disk.
It whether there is the log file before, it is necessary to in the log file when inquiring in the current USB flash disk a The log-on message is encrypted, and needs to obtain encryption key in ciphering process.
Wherein, when obtaining log-on message, it is necessary to be encrypted to the log-on message, it is necessary to pass through during encryption AES and encryption key are encrypted to the log-on message, when using AES, can be counted by using MD5 algorithms Identifier of the corresponding MD5 values as the USB flash disk a is calculated, a part for the encryption key, institute are used as by the identifier The another part for stating encryption key can be by the customized character string of program.
Wherein, the AES includes MD5, AES and DES etc., wherein, MD5 (the Message Digest Algorithm 5) refer to message digest algorithm, a kind of widely used hash function of computer safety field, disappear to provide The integrity protection of breath, the AES (Advanced Encryption Standard) refer to Advanced Encryption Standard, are a kind of areas Block encryption standard.
Step S13, the log-on message is encrypted according to the encryption key and believes the login after encryption Breath storage is into the USB flash disk.
It should be understood that after the log-on message is encrypted, it is described by log-on message storage into log file Log file will be stored in the USB flash disk a, so that the log-on message can be bound with the login USB flash disk a indirectly.
Above-mentioned steps S11 to S13 is to make the process for logging in USB flash disk, and the USB flash disk that logs in is to have correctly to log in stepping on for application Information is recorded, and the log-on message is encrypted by the identifier of the uniqueness of the USB flash disk.Wherein, it is described to log in the general of USB flash disk Read it is to be understood that for example, using before logging in, the log-on message for correctly logging in the application can be encrypted And store into a file, the file can be described as log file, afterwards by log file storage into a USB flash disk, Therefore this USB flash disk is just referred to as to log in USB flash disk, and the identifier is exactly to be acquired by the login USB flash disk, and the mark It is uniqueness to know symbol.
Step S14, inquiry USB flash disk whether there is log file, and the log file includes stepping on by encryption keys Information is recorded, the encryption key includes the identifier for logging in USB flash disk.
Wherein, when the USB flash disk is inserted into computer by USB interface, the computer will read the USB flash disk In content after, and judge to whether there is the log file in the USB flash disk.
In the specific implementation, in fact it could happen that such case:For example, in the presence of a USB flash disk b, under the login wait state of application, When the USB flash disk b is inserted into computer by user, user does not know whether the USB flash disk b is that can be answered described in Successful login in advance With, therefore just there will be two kinds of situations when reading the USB flash disk b for the computer:Text is logged in first, being not present in the USB flash disk b Part, therefore the computer can not read the log file, during the USB flash disk b can not be applied described in Successful login;Second, look into Ask in the USB flash disk b and have the log file, now need further to get the identifier of the USB flash disk b and described step on The identifier in file is recorded, and judges whether the identifier in the identifier and the log file of the USB flash disk b matches.
Step S15, if so, the USB flash disk identifier of the USB flash disk is then obtained, and it is close according to USB flash disk identifier generation decryption Key, the log-on message is decrypted according to the decruption key and decipherment algorithm.
It is to be appreciated that the log-on message passes through AES and encryption keys, mistake that is corresponding, then decrypting , it is necessary to decruption key corresponding to the corresponding symmetrical decipherment algorithm of the AES and the encryption key in journey, then By the decruption key and the decipherment algorithm, the log-on message is decrypted, can passes through after successful decryption The USB flash disk carries out the login authentication of the application.
A kind of readable storage medium storing program for executing, is stored thereon with computer program, it is characterised in that the computer program is processed The step of device realizes the method described in embodiment any one when performing.
A kind of computer, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, it is characterised in that the computing device program is to realize the step of the method described in any one in embodiment Suddenly.
To sum up, above-mentioned login authentication method, inquire about the USB flash disk that current USB interface is accessed and whether there is log file, it is described Log file includes the log-on message by encryption keys, and the encryption key includes an identifier, if so, then according to institute The log-on message is decrypted the USB flash disk identifier for stating the uniqueness of USB flash disk, when the USB flash disk identifier and the identifier Timing, the log-on message successful decryption, the log-on message after decryption is read, and pass through the log-on message after decryption Carry out the login authentication of the application.This method can be during the login authentication based on USB flash disk, and the USB flash disk can have Security and confidentiality, because the log-on message in the USB flash disk is to be encrypted to acquire by the identifier of the USB flash disk, And the identifier is acquired according to the attribute information of the USB flash disk, and the attribute information of the USB flash disk has uniqueness, from And cause when being logged in by USB flash disk, privacy and the important information leakage of user is avoided, causes unsafe problem.
Another aspect of the present invention also provides a kind of accession authorization system, refers to shown in Fig. 3 to Fig. 6, implements for the present invention A kind of structural representation of the accession authorization system exemplified, the accession authorization system 10 include query unit 11, decryption list Member 12 and login authentication unit 13.
The query unit 11, under the login wait state of application, inquire about current USB interface accessed it is current USB flash disk whether there is log file, and the log file includes the log-on message by encryption keys, the encryption key bag Include an identifier;
The decryption unit 12, for if so, then being stepped on according to the USB flash disk identifier of the uniqueness of the current USB flash disk to described Record information is decrypted, when the USB flash disk identifier and the identifier match, the log-on message successful decryption;
The login authentication unit 13, for reading the log-on message after decrypting, and by stepping on described in after decryption Record the login authentication that information carries out the application.
Further, in addition to:First acquisition unit 14, ciphering unit 15 and memory cell 16.
The first acquisition unit 14, for obtaining the log-on message and the identifier;
The ciphering unit 15, for generating the encryption key according to the identifier, and according to the encryption key The log-on message is encrypted with AES;
The memory cell 16, for the log-on message after encryption to be write into the log file.
Further, in addition to second acquisition unit 17 and identifier determining unit 18.
The second acquisition unit 17, for obtaining the essential information of USB flash disk, the essential information includes the ID of the USB flash disk Information;
The identifier determining unit 18, MD5 values are calculated according to the essential information, using the MD5 values as the mark Know symbol.
Further, the decryption unit 12 includes the 3rd acquiring unit 121, generation unit 122 and decryption subelement 123。
3rd acquiring unit 121, for obtaining the USB flash disk identifier of log-on message to be decrypted and the current USB flash disk;
The generation unit 122, for generating decruption key according to the USB flash disk identifier of the current USB flash disk;
The decryption subelement 123, for being solved according to the decruption key and decipherment algorithm to the log-on message It is close.
Further, the login authentication unit 13 includes reading unit 131 and login authentication subelement 132.
The reading unit 131, for reading the log-on message;
The login authentication subelement 132, for the log-on message to be sent to server, so that the server pair The log-on message is verified.
Above-mentioned accession authorization system, under the login wait state of application, inquire about the current U that current USB interface is accessed Disk whether there is log file, and the log file includes the log-on message by encryption keys, the encryption key bag An identifier is included, if so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when When the USB flash disk identifier is with the identifier match, the log-on message successful decryption, the login letter after decryption is read Breath, and pass through the login authentication of the log-on message progress application after decryption.The system can be in the login based on USB flash disk During certification, the USB flash disk can have security and confidentiality, because the log-on message in the USB flash disk is by the U The identifier of disk, which is encrypted, to be acquired, and the identifier is acquired according to the attribute information of the USB flash disk, described The attribute information of USB flash disk has uniqueness, so that when being logged in by USB flash disk, avoids privacy and the important information leakage of user, Cause unsafe problem.
Can be with one of ordinary skill in the art will appreciate that realizing that all or part of step in above-described embodiment method is The hardware of correlation is instructed to complete by program, described program can be stored in a computer read/write memory medium, The program upon execution, comprises the following steps:
Under the login wait state of application, it is literary with the presence or absence of logging in inquire about the current USB flash disk that current USB interface is accessed Part, the log file include including an identifier by the log-on message of encryption keys, the encryption key;
If so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, work as institute When stating USB flash disk identifier with the identifier match, the log-on message successful decryption;
The log-on message after decryption is read, and the login of the application is carried out by the log-on message after decryption Certification.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system including the system of processor or other can be held from instruction The system of row system, device or equipment instruction fetch and execute instruction) use, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment Put.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any One or more embodiments or example in combine in an appropriate manner.
Embodiment described above only expresses the several embodiments of the present invention, and its description is more specific and detailed, but simultaneously Therefore the limitation to the scope of the claims of the present invention can not be interpreted as.It should be pointed out that for one of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention Protect scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (10)

  1. A kind of 1. login authentication method based on USB flash disk, it is characterised in that including:
    Under the login wait state of application, inquire about the current USB flash disk that current USB interface is accessed and whether there is log file, institute Stating log file includes including an identifier by the log-on message of encryption keys, the encryption key;
    If so, then the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when the USB flash disk When identifier is with the identifier match, the log-on message successful decryption;
    The log-on message after decryption is read, and is recognized by the login of the log-on message progress application after decryption Card.
  2. 2. login authentication method according to claim 1, it is characterised in that the login authentication method also includes:
    Obtain the log-on message and the identifier;
    The encryption key is generated according to the identifier, and according to the encryption key and AES to the log-on message It is encrypted;
    The log-on message after encryption is write into the log file.
  3. 3. login authentication method according to claim 2, it is characterised in that described the step of obtaining identifier includes:
    The essential information of USB flash disk is obtained, the essential information includes the id information of the USB flash disk;
    MD5 values are calculated according to the essential information, using the MD5 values as the identifier.
  4. 4. login authentication method according to claim 1, it is characterised in that the USB flash disk according to the current USB flash disk identifies The step of log-on message is decrypted symbol includes:
    Obtain the USB flash disk identifier of log-on message to be decrypted and the current USB flash disk;
    Decruption key is generated according to the USB flash disk identifier of the current USB flash disk;
    The log-on message is decrypted according to the decruption key and decipherment algorithm.
  5. 5. login authentication method according to claim 1, it is characterised in that the login letter read after decryption The step of ceasing, and carrying out the login authentication of the application by the log-on message after decryption includes:
    Read the log-on message;
    The log-on message is sent to server, so that the server is verified to the log-on message.
  6. A kind of 6. accession authorization system, it is characterised in that including:
    Query unit, whether deposited under the login wait state of application, inquiring about the current USB flash disk that current USB interface is accessed In log file, the log file includes the log-on message by encryption keys, and the encryption key includes a USB flash disk Identifier;
    Decryption unit, for when the current USB flash disk has the log file, obtaining the USB flash disk identifier of the current USB flash disk, And the log-on message is decrypted according to the USB flash disk identifier of the uniqueness of the current USB flash disk, when the USB flash disk identifier with During the identifier match, the log-on message successful decryption;
    Login authentication unit, carried out for reading the log-on message after decrypting, and by the log-on message after decryption The login authentication of the application.
  7. 7. accession authorization system according to claim 6, it is characterised in that also include:
    First acquisition unit, for obtaining the log-on message and the identifier;
    Ciphering unit, for generating the encryption key according to the identifier, and according to the encryption key and AES The log-on message is encrypted;
    Memory cell, for the log-on message after encryption to be write into the log file.
  8. 8. accession authorization system according to claim 7, it is characterised in that also include:
    Second acquisition unit, for obtaining the essential information of USB flash disk, the essential information includes the id information of the USB flash disk;
    Identifier determining unit, for calculating MD5 values according to the essential information, using the MD5 values as the identifier.
  9. 9. a kind of readable storage medium storing program for executing, is stored thereon with computer program, it is characterised in that the computer program is by processor The step of method as described in any one in claim 1-5 is realized during execution.
  10. 10. a kind of computer, including memory, processor and storage are on a memory and the calculating that can run on a processor Machine program, it is characterised in that the computing device program is to realize the method as described in any one in claim 1-5 The step of.
CN201710707494.0A 2017-08-17 2017-08-17 Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk Pending CN107563176A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710707494.0A CN107563176A (en) 2017-08-17 2017-08-17 Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710707494.0A CN107563176A (en) 2017-08-17 2017-08-17 Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk

Publications (1)

Publication Number Publication Date
CN107563176A true CN107563176A (en) 2018-01-09

Family

ID=60975826

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710707494.0A Pending CN107563176A (en) 2017-08-17 2017-08-17 Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk

Country Status (1)

Country Link
CN (1) CN107563176A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256309A (en) * 2018-01-10 2018-07-06 飞天诚信科技股份有限公司 Hardware logs in the implementation method and device of windows10 system above
CN109101788A (en) * 2018-06-19 2018-12-28 光大环保技术研究院(南京)有限公司 A kind of incinerator automatic combustion control system encryption device and encryption method
CN109344598A (en) * 2018-09-29 2019-02-15 北京东土科技股份有限公司 The binding of equipment room and authority control method, device, equipment and storage medium
CN109391615A (en) * 2018-09-27 2019-02-26 深圳互联先锋科技有限公司 A kind of server exempts from close login method and system
CN110084024A (en) * 2019-04-29 2019-08-02 四川长虹教育科技有限公司 Terminal device, the system and method for software login are carried out based on movable storage device
CN112100601A (en) * 2020-09-08 2020-12-18 紫光云(南京)数字技术有限公司 Internet access password management method, system and device based on secure storage U disk
CN112257055A (en) * 2020-10-28 2021-01-22 深圳市启望科文技术有限公司 Method and device for protecting sound recording file, computer equipment and storage medium
CN112580017A (en) * 2020-12-25 2021-03-30 深信服科技股份有限公司 Authentication method and device, electronic equipment and storage medium
CN113626796A (en) * 2021-08-16 2021-11-09 深圳市康冠商用科技有限公司 Permission obtaining method and device based on USB flash disk, display equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562607A (en) * 2009-05-25 2009-10-21 姚清野 Authentication method of Real-name Registration based on U disc
CN102867157A (en) * 2012-09-11 2013-01-09 东莞宇龙通信科技有限公司 Mobile terminal and data protecting method
CN103093137A (en) * 2013-01-21 2013-05-08 西北工业大学 File safe distribution method based on universal series bus (USB) flash disk
CN105871558A (en) * 2016-05-30 2016-08-17 科德数控股份有限公司 Numerical control system authority management method based on USB flash disk physical serial number

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562607A (en) * 2009-05-25 2009-10-21 姚清野 Authentication method of Real-name Registration based on U disc
CN102867157A (en) * 2012-09-11 2013-01-09 东莞宇龙通信科技有限公司 Mobile terminal and data protecting method
CN103093137A (en) * 2013-01-21 2013-05-08 西北工业大学 File safe distribution method based on universal series bus (USB) flash disk
CN105871558A (en) * 2016-05-30 2016-08-17 科德数控股份有限公司 Numerical control system authority management method based on USB flash disk physical serial number

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张剑: "《信息安全技术应用》", 31 May 2015, 20150531 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11314853B2 (en) 2018-01-10 2022-04-26 Feitian Technologies Co., Ltd. Method and apparatus for implementing logging-on of hardware to windows system with version 10 or higher
CN108256309B (en) * 2018-01-10 2020-01-03 飞天诚信科技股份有限公司 Method and device for realizing system logging in windows10 or above
CN108256309A (en) * 2018-01-10 2018-07-06 飞天诚信科技股份有限公司 Hardware logs in the implementation method and device of windows10 system above
CN109101788A (en) * 2018-06-19 2018-12-28 光大环保技术研究院(南京)有限公司 A kind of incinerator automatic combustion control system encryption device and encryption method
CN109101788B (en) * 2018-06-19 2022-06-03 光大环保技术研究院(南京)有限公司 Encryption device and encryption method for automatic combustion control system of incinerator
CN109391615A (en) * 2018-09-27 2019-02-26 深圳互联先锋科技有限公司 A kind of server exempts from close login method and system
CN109344598A (en) * 2018-09-29 2019-02-15 北京东土科技股份有限公司 The binding of equipment room and authority control method, device, equipment and storage medium
CN110084024A (en) * 2019-04-29 2019-08-02 四川长虹教育科技有限公司 Terminal device, the system and method for software login are carried out based on movable storage device
CN112100601A (en) * 2020-09-08 2020-12-18 紫光云(南京)数字技术有限公司 Internet access password management method, system and device based on secure storage U disk
CN112257055A (en) * 2020-10-28 2021-01-22 深圳市启望科文技术有限公司 Method and device for protecting sound recording file, computer equipment and storage medium
CN112580017A (en) * 2020-12-25 2021-03-30 深信服科技股份有限公司 Authentication method and device, electronic equipment and storage medium
CN112580017B (en) * 2020-12-25 2023-12-29 深信服科技股份有限公司 Authentication method and device, electronic equipment and storage medium
CN113626796A (en) * 2021-08-16 2021-11-09 深圳市康冠商用科技有限公司 Permission obtaining method and device based on USB flash disk, display equipment and storage medium
CN113626796B (en) * 2021-08-16 2022-05-03 深圳市康冠商用科技有限公司 Permission obtaining method and device based on USB flash disk, display equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107563176A (en) Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk
CN110493202B (en) Login token generation and verification method and device and server
US9673975B1 (en) Cryptographic key splitting for offline and online data protection
US8447990B2 (en) Password encryption key
Gasti et al. On the security of password manager database formats
CN102685110B (en) Universal method and system for user registration authentication based on fingerprint characteristics
US20070074038A1 (en) Method, apparatus and program storage device for providing a secure password manager
Zhao et al. All your browser-saved passwords could belong to us: A security analysis and a cloud-based new design
CN106612180A (en) Method and device for realizing session identifier synchronization
WO2014059604A1 (en) Method and device for secure access to resource
KR102137122B1 (en) Security check method, device, terminal and server
Kheshaifaty et al. Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions
CN107454048A (en) The processing method and processing device of information, the authentication method of information, apparatus and system
CN106100851B (en) Password management system, intelligent wristwatch and its cipher management method
Guirat et al. Formal verification of the W3C web authentication protocol
Seta et al. Implement time based one time password and secure hash algorithm 1 for security of website login authentication
CN112613051A (en) Data encryption storage method and device, computer equipment and storage medium
CN104881595B (en) The self-help remote unlocking method managed based on PIN code
CN114244522A (en) Information protection method and device, electronic equipment and computer readable storage medium
CN109960945B (en) Active safety protection method and system for browser
CN114329614A (en) Data desensitization method and system based on character string confusion
CN107070648A (en) A kind of cryptographic key protection method and PKI system
CN106446713A (en) Encryption method and system for database content
TWI640887B (en) User verification system implemented along with a mobile device and method thereof
TWI640928B (en) System for generating and decrypting two-dimensional codes and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180109