CN107612904A - Identity identifying method and system for intelligent monitoring management - Google Patents
Identity identifying method and system for intelligent monitoring management Download PDFInfo
- Publication number
- CN107612904A CN107612904A CN201710821808.XA CN201710821808A CN107612904A CN 107612904 A CN107612904 A CN 107612904A CN 201710821808 A CN201710821808 A CN 201710821808A CN 107612904 A CN107612904 A CN 107612904A
- Authority
- CN
- China
- Prior art keywords
- identifying code
- login
- user account
- user
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
The present invention is intended to provide a kind of identity identifying method and system for intelligent monitoring management, to solve the problems of single identifying code verification mode in prior art.The user account inputted in real time in monitoring process of user login;When user inputs user account, the identifying code added value M of the user account is obtained;And judge verified using which kind of identifying code according to identifying code added value M size;In process of user login, judge to input password and whether input validation code is correct, and according to input password and input validation code;If input password and identifying code is all correct, then user account checking initial value M increases a, if the password inputted in process of user login is correct and identifying code is incorrect, then reset identifying code, if the password bad inputted in process of user login, then user account checking initial value M reduces b, wherein 3 >=b >=a >=1.Instant invention overcomes the problems of single identifying code verification mode in technical scheme.
Description
Technical field
The present invention relates to authentication method, and in particular to a kind of identity identifying method and system for intelligent monitoring management.
Background technology
Intelligent monitoring management system is the important system of power system, because user of service is numerous, if intelligent monitoring
During management system authentication, the identifying code of use is single identifying code, then certainly exists and causes because identifying code is simple
The problem of security is low, or because identifying code aid in and influence user log in complexity, waste user time the problem of.
The content of the invention
The present invention is intended to provide a kind of identity identifying method and system for intelligent monitoring management, to solve prior art
The problems of single identifying code verification mode in scheme.
In order to realize the purpose, a kind of identity identifying method for intelligent monitoring management of the invention, client is by institute
The identifying code added value M for having user account is initialized as 1, and performs following steps:
Step S1:The user account inputted in real time in monitoring process of user login;
Step S2:When user inputs user account, the identifying code added value M of the user account is obtained;And according to checking
Code added value M size judges to be verified using which kind of identifying code;
Step S3:In process of user login, judge to input password and whether input validation code is correct, and according to input password
With input validation code;If inputting password and identifying code being all correct, user account checking initial value M increase a, if user
The password inputted in login process is correct and identifying code is incorrect, then resets identifying code, if inputted in process of user login
Password bad, then user account checking initial value M reduce b, wherein 3 >=b > a >=1.
Preferably, the a=1, the b=2, it is described to be judged according to identifying code added value M size using which kind of checking
Code, which carries out checking, to be included:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
Preferably, the a=1, the b=1, it is described to be judged according to identifying code added value M size using which kind of checking
Code, which carries out checking, to be included:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
Preferably, in process of user login, if input code error, reminds user authentication failure.
Preferably, it is described to judge which kind of identifying code to carry out checking using includes according to identifying code added value M size:If
In the absence of identifying code added value M, then this login of the user account is verified using alphabetical identifying code.
On the other hand, the present invention provides a kind of identity authorization system for intelligent monitoring management, including:
Initialization module:The identifying code added value M for initializing all user accounts is 1:
Real-time monitoring module:The user account inputted in real time in monitoring process of user login;When user inputs user account
When, obtain the identifying code added value M of the user account;And judge which kind of identifying code used according to identifying code added value M size
Verified:;
User login code module:In process of user login, if input password and identifying code are all correct, user's account
Family checking initial value M adds a, if the password inputted in process of user login is correct, identifying code is incorrect, resets identifying code,
If the password bad inputted in process of user login, user account checking initial value M subtracts b, wherein 3 >=b > a >=1.
Preferably, the a=1, the b=2, it is described to be judged according to identifying code added value M size using which kind of checking
Code, which carries out checking, to be included:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
Preferably, the a=1, the b=1, it is described to be judged according to identifying code added value M size using which kind of checking
Code, which carries out checking, to be included:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
Preferably, in process of user login, if input code error, reminds user authentication failure.
Preferably, it is described to judge which kind of identifying code to carry out checking using includes according to identifying code added value M size:If
In the absence of identifying code added value M, then this login of the user account is verified using alphabetical identifying code.
Following advantageous effects can be obtained by implementing the present invention:The present invention passes through user in implementing monitoring client
The login situation of account, according to the amount of error of Password Input in login process and the amount of error of identifying code data, automatic decision is adopted
With which kind of identifying code verification mode, with the validation difficulty of adjust automatically identifying code, and then single identifying code verification mode is overcome
The problems of:Influence user the problem of cause security low or because identifying code aids in because identifying code is simple and log in
Complexity, waste user time.
Brief description of the drawings
Fig. 1 is a kind of flow chart of identity identifying method for intelligent monitoring management of the invention;
Fig. 2 is a kind of connection diagram of identity authorization system for intelligent monitoring management of the invention.
Embodiment
For the ease of the understanding of those skilled in the art, the present invention is made further with reference to specific embodiment
It is bright:
Embodiment 1:
As shown in figure 1, the invention provides a kind of identity identifying method for intelligent monitoring management, client will be all
The identifying code added value M of user account is initialized as 1, and performs step as shown in Figure 1:
Step S1:The user account inputted in real time in monitoring process of user login;
Step S2:When user inputs user account, the identifying code added value M of the user account is obtained;And according to checking
Code added value M size judges to be verified using which kind of identifying code;
Step S3:In process of user login, if input password and identifying code are all correct, user account checking is initial
Value M adds a, if the password inputted in process of user login is correct, identifying code is incorrect, identifying code is reset, if user steps on
The password bad inputted during record, then the user account checking initial value M subtract b, wherein 3 >=b > a >=1.
As a kind of optional embodiment of the present invention, the a=1, the b=2 are described according to identifying code added value M
Size judge which kind of identifying code checking is carried out using include:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
As another optional embodiment of the present invention, the a=1, the b=1 are described according to identifying code added value
M size judges which kind of identifying code to carry out checking using includes:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
As a kind of optional embodiment of the present invention, in process of user login, if input code error, reminds and uses
Family authentification failure.
It is described to judge which kind of is used according to identifying code added value M size as a kind of optional embodiment of the present invention
Identifying code, which carries out checking, to be included:If there is no identifying code added value M, then this login of the user account uses alphabetical identifying code
Checking.
Embodiment two:
As shown in Fig. 2 a kind of identity authorization system for intelligent monitoring management, including:
Initialization module 1:The identifying code added value M for initializing all user accounts is 1:
Real-time monitoring module 2:The user account inputted in real time in monitoring process of user login;When user inputs user account
When, obtain the identifying code added value M of the user account;And judge which kind of identifying code used according to identifying code added value M size
Verified:;
User login code module 3:In process of user login, if input password and identifying code are all correct, the user
Account verification initial value M adds a, if the password inputted in process of user login is correct, identifying code is incorrect, resets checking
Code, if the password bad inputted in process of user login, user account checking initial value M subtracts b, wherein 3 >=b > a
≥1。
As a kind of optional embodiment of the identity authorization system for intelligent monitoring management, the a=1, the b=
2, it is described to judge which kind of identifying code to carry out checking using includes according to identifying code added value M size:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
As a kind of optional embodiment of the identity authorization system for intelligent monitoring management, the a=1, the b=
1, it is described to judge which kind of identifying code to carry out checking using includes according to identifying code added value M size:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
As a kind of optional embodiment of the identity authorization system for intelligent monitoring management, in process of user login,
If inputting code error, user authentication failure is reminded.
It is described attached according to identifying code as a kind of optional embodiment of the identity authorization system for intelligent monitoring management
Value added M size judges which kind of identifying code to carry out checking using includes:If there is no identifying code added value M, then user's account
This login of family is verified using alphabetical identifying code.
The specific embodiment of the present invention is the foregoing is only, but the technical characteristic of the present invention is not limited thereto, Ren Heben
The technical staff in field in the field of the invention, all cover among the scope of the claims of the present invention by the change or modification made.
Claims (10)
1. the identity identifying method for intelligent monitoring management, it is characterised in that:Client is by the identifying code of all user accounts
Added value M is initialized as 1, and performs following steps:
Step S1:The user account inputted in real time in monitoring process of user login;
Step S2:When user inputs user account, the identifying code added value M of the user account is obtained;
And judge verified using which kind of identifying code according to identifying code added value M size;
Step S3:In process of user login, judge to input password and whether input validation code is correct, and according to input password and defeated
Enter identifying code;If inputting password and identifying code being all correct, user account checking initial value M increase a, if user logs in
During the password that inputs it is correct and identifying code is incorrect, then identifying code is reset, if the password inputted in process of user login
Incorrect, then user account checking initial value M reduces b, wherein 3 >=b > a >=1.
2. it is used for the identity identifying method of intelligent monitoring management as claimed in claim 1, it is characterised in that:The a=1, institute
B=2 is stated, it is described to judge which kind of identifying code to carry out checking using includes according to identifying code added value M size:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
3. it is used for the identity identifying method of intelligent monitoring management as claimed in claim 1, it is characterised in that:The a=1, institute
B=1 is stated, it is described to judge which kind of identifying code to carry out checking using includes according to identifying code added value M size:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
4. it is used for the identity identifying method of intelligent monitoring management as claimed in claim 1, it is characterised in that:Process of user login
In, if input code error, reminds user authentication failure.
5. it is used for the identity identifying method of intelligent monitoring management as claimed in claim 1, it is characterised in that:It is described according to checking
Code added value M size judges which kind of identifying code to carry out checking using includes:If there is no identifying code added value M, then the use
Account this login in family is verified using alphabetical identifying code.
A kind of 6. identity authorization system for intelligent monitoring management, it is characterised in that:Including:
Initialization module:The identifying code added value M for initializing all user accounts is 1:
Real-time monitoring module:The user account inputted in real time in monitoring process of user login;When user inputs user account, obtain
Take the identifying code added value M of the user account;And judge tested using which kind of identifying code according to identifying code added value M size
Card:;
User login code module:In process of user login, if input password and identifying code are all correct, the user account is tested
Card initial value M adds a, if the password inputted in process of user login is correct, identifying code is incorrect, resets identifying code, if
The password bad inputted in process of user login, then the user account checking initial value M subtract b, wherein 3 >=b > a >=1.
A kind of 7. identity authorization system for intelligent monitoring management as claimed in claim 6, it is characterised in that:The a=
1, the b=2, it is described to judge which kind of identifying code to carry out checking using includes according to identifying code added value M size:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
A kind of 8. identity authorization system for intelligent monitoring management as claimed in claim 6, it is characterised in that:The a=
1, the b=1, it is described to judge which kind of identifying code to carry out checking using includes according to identifying code added value M size:
If M > 1, this login of the user account uses Digital verification code;
If -1≤M≤1, this login of the user account is verified using alphabetical identifying code;
If -8≤M≤- 1, word identifying code is verified during this login of the user account uses;
If M < -8, this login of the user account is verified using short message verification code.
A kind of 9. identity authorization system for intelligent monitoring management as claimed in claim 6, it is characterised in that:User logs in
During, if input code error, reminds user authentication failure.
A kind of 10. identity authorization system for intelligent monitoring management as claimed in claim 6, it is characterised in that:Described
Judge which kind of identifying code to carry out checking using includes according to identifying code added value M size:If there is no identifying code added value M,
Then this login of the user account is verified using alphabetical identifying code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710821808.XA CN107612904A (en) | 2017-09-13 | 2017-09-13 | Identity identifying method and system for intelligent monitoring management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710821808.XA CN107612904A (en) | 2017-09-13 | 2017-09-13 | Identity identifying method and system for intelligent monitoring management |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107612904A true CN107612904A (en) | 2018-01-19 |
Family
ID=61061954
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710821808.XA Pending CN107612904A (en) | 2017-09-13 | 2017-09-13 | Identity identifying method and system for intelligent monitoring management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107612904A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111881434A (en) * | 2020-08-03 | 2020-11-03 | 施兴明 | Identity authentication method for e-commerce platform account |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101047537A (en) * | 2006-03-30 | 2007-10-03 | 盛趣信息技术(上海)有限公司 | Log-on method for network pass |
US20090222660A1 (en) * | 2008-02-28 | 2009-09-03 | Lusheng Ji | Method and device for end-user verification of an electronic transaction |
CN103812651A (en) * | 2012-11-13 | 2014-05-21 | 深圳市腾讯计算机系统有限公司 | Password authentication method, device and system |
EP2916484A1 (en) * | 2014-03-06 | 2015-09-09 | Tata Consultancy Services Ltd. | User authentication using elliptic curve based OTP |
CN105491449A (en) * | 2016-01-29 | 2016-04-13 | 四川膨旭科技有限公司 | Selective video pop-out verifying information verify method |
CN106713241A (en) * | 2015-11-16 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Identity verification method, device and system |
CN106897590A (en) * | 2015-12-17 | 2017-06-27 | 阿里巴巴集团控股有限公司 | The method of calibration and device of figure information |
-
2017
- 2017-09-13 CN CN201710821808.XA patent/CN107612904A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101047537A (en) * | 2006-03-30 | 2007-10-03 | 盛趣信息技术(上海)有限公司 | Log-on method for network pass |
US20090222660A1 (en) * | 2008-02-28 | 2009-09-03 | Lusheng Ji | Method and device for end-user verification of an electronic transaction |
CN103812651A (en) * | 2012-11-13 | 2014-05-21 | 深圳市腾讯计算机系统有限公司 | Password authentication method, device and system |
EP2916484A1 (en) * | 2014-03-06 | 2015-09-09 | Tata Consultancy Services Ltd. | User authentication using elliptic curve based OTP |
CN106713241A (en) * | 2015-11-16 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Identity verification method, device and system |
CN106897590A (en) * | 2015-12-17 | 2017-06-27 | 阿里巴巴集团控股有限公司 | The method of calibration and device of figure information |
CN105491449A (en) * | 2016-01-29 | 2016-04-13 | 四川膨旭科技有限公司 | Selective video pop-out verifying information verify method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111881434A (en) * | 2020-08-03 | 2020-11-03 | 施兴明 | Identity authentication method for e-commerce platform account |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10693880B2 (en) | Multi-stage authentication of an electronic communication | |
US10122719B1 (en) | Wearable device-based user authentication | |
CN103813334A (en) | Right control method and right control device | |
CN106161710B (en) | A kind of user account safety management system based on smart phone | |
CN106453205A (en) | Identity verification method and identity verification device | |
WO2018103687A1 (en) | Secure payment method and system based on fingerprint identification | |
CN104821882A (en) | Network security verification method based on voice biometric features | |
CN105389497A (en) | Security verification method and system for operation interface of fingerprint recognition | |
CN103176987A (en) | Method and device for controlling database access | |
WO2017016038A1 (en) | Payment method, payment apparatus, terminal and payment system | |
CN109492356A (en) | A kind of multi-stage authentication method based on user behavior risk judgment | |
CN101645124A (en) | Method for unlocking PIN code and intelligent secret key device | |
CN107612904A (en) | Identity identifying method and system for intelligent monitoring management | |
WO2021135549A1 (en) | Service item processing permissions authorization method and apparatus, computer device, and storage medium | |
CN107645726A (en) | A kind of method and system for mobile terminal user identity certification | |
CN105847218A (en) | Method, business platform and system for controlling user right | |
CN106357657B (en) | Signing and issuing user management method and device | |
TWI525468B (en) | Twice to verify the account login to strengthen protection methods | |
CN106371772A (en) | Management method and system for multiple sets of storage equipment | |
WO2017028250A1 (en) | Method and mobile terminal for authenticating account login via voice and fingerprint | |
CN106162642B (en) | The authentication method and authentication device of SIM card | |
US11128620B2 (en) | Online verification method and system for verifying the identity of a subject | |
CN111476575A (en) | Payment method, device and equipment based on audio fingerprints | |
WO2017028138A1 (en) | Method and mobile terminal for authenticating account login with number information and fingerprint | |
CN105516069B (en) | Data processing method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180119 |