CN109214164A - Computer communication security login method Internet-based and system - Google Patents
Computer communication security login method Internet-based and system Download PDFInfo
- Publication number
- CN109214164A CN109214164A CN201811041995.0A CN201811041995A CN109214164A CN 109214164 A CN109214164 A CN 109214164A CN 201811041995 A CN201811041995 A CN 201811041995A CN 109214164 A CN109214164 A CN 109214164A
- Authority
- CN
- China
- Prior art keywords
- code
- unit
- sign
- access
- dynamic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The invention discloses computer communication security login method Internet-based and systems, it is related to computer login techniques field, it solves stealer and passes through the account information stolen and the available corresponding computer access authority of login password, cause to calculate the lower problem of the safety logged in, its key points of the technical solution are that: the following steps are included: input subscriber identity information and encrypted authentication code;Judge whether the subscriber identity information matches with the sign-on access comparative information;Generate dynamic verification code;The dynamic verification code is transformed into encryption standard code;Judge whether the encrypted authentication code matches with the encryption standard code;It issues to log in authorize and allows order;Allow computer to log in after receiving the login authorization to allow order, has the effect of improving the safety that computer communication logs in.
Description
Technical field
The present invention relates to computer login techniques fields, more specifically, it relates to which computer Internet-based communicates
Safe login method and system.
Background technique
As computer application is more and more common, the quantity of computer user is constantly soaring, and application level is continuously improved.
Computer has the spies such as arithmetic speed is fast, counting accuracy is high, logical operation capability is strong, memory capacity is big, the degree of automation is high
Point is widely used in the fields such as internet, communication, multimedia.
Currently, to verify user identity, user needs to input account information and logs in close during computer logs in
Code acquisition computer access authority.User inputs character letter during inputting account information and login password, through keyboard
Breath, in the process, account information and login password are easy to be stolen by others, stealer pass through the account information stolen and
Login password can get corresponding computer access authority, cause the safety for calculating login lower.
Therefore, how to improve the safety of computer login is our problems in the urgent need to address at present.
Summary of the invention
The object of the present invention is to provide computer communication security login methods Internet-based, have raising computer logical
Believe the effect of the safety logged in.
Above-mentioned technical purpose of the invention has the technical scheme that computer Internet-based is logical
Believe safe login method, comprising the following steps:
S1: inputting subscriber identity information and encrypted authentication code by user's sign-on access unit, and by the user identity
Information is sent to first processing units and the encrypted authentication code is sent to the second processing unit;
S2: after transferring the sign-on access match information stored in storage unit by the first processing units, judge institute
State whether subscriber identity information matches with the sign-on access comparative information;If being judged as YES, issued to dynamic authentication unit
Dynamic verification code generates order;If being judged as NO, show that user's sign-on access fails;
S3: after receiving the dynamic verification code and generating order, dynamic authentication is generated by the dynamic authentication unit
Code, and the dynamic verification code is sent to user's sign-on access unit and verifying converter unit;
S4: the dynamic verification code is transformed into encryption according to the enciphering transformation data stored in the verifying converter unit
Standard code, and the encryption standard code is sent to described the second processing unit;
S5: judge whether the encrypted authentication code matches with the encryption standard code by described the second processing unit;If
It is judged as YES, then issuing to log in authorize to login authorization unit allows order;If being judged as NO, login authorization failure is shown;
S6: computer is allowed to log in after receiving the login authorization to allow order.
By using above-mentioned technical proposal, dynamic verification code is transformed into encryption standard code, prevents stealer by stealing
Obtained subscriber identity information can be obtained the generation of the case where corresponding computer access authority, improve what computer communication logged in
Safety.
The present invention is further arranged to: the dynamic verification code is at least double figures combinatorics on words.
Computer is further improved by using above-mentioned technical proposal convenient for the difficulty that enhancing encryption standard code cracks
Communicate the safety logged in.
The present invention is further arranged to: the enciphering transformation data are operational formula;Number in the dynamic verification code
New number is formed after operational formula calculating;Number of the new number as the corresponding numerical digit of encryption standard code.
By using above-mentioned technical proposal, so that the calculating operation of encryption standard code is convenient.
The present invention is further arranged to: the enciphering transformation data include at least one enciphering transformation divided data;Each
Enciphering transformation divided data is correspondingly arranged an access permission level;User steps on according to different encryption standard code acquisition differences is inputted
Record access authority.
By using above-mentioned technical proposal, using multiple enciphering transformation divided datas, the secrecy for avoiding calculator memory from storing up is provided
The case where expecting while losing.
It is a further object of the present invention to provide computer communication security login systems Internet-based, have and improve calculating
The effect for the safety that machine communication logs in.
Above-mentioned technical purpose of the invention has the technical scheme that computer Internet-based is logical
Believe Security Login System, including user's sign-on access unit, storage unit, first processing units, dynamic authentication unit, verifying change
It changes unit, the second processing unit and logs in authorization unit;
User's sign-on access unit, for inputting subscriber identity information and encrypted authentication code, and by user's body
Part information is sent to the first processing units and the encrypted authentication code is sent to described the second processing unit;
The storage unit is stored with sign-on access match information;
The first processing units judge the subscriber identity information after transferring the sign-on access match information
Whether matched with the sign-on access comparative information;If being judged as YES, dynamic verification code is issued to the dynamic authentication unit
Generate order;If being judged as NO, show that user's sign-on access fails;
The dynamic authentication unit, for generating dynamic verification code after receiving the dynamic verification code and generating order,
And the dynamic verification code is sent to user's sign-on access unit and the verifying converter unit;
The verifying converter unit, is stored with enciphering transformation data, for that described will be moved according to the enciphering transformation data
State identifying code is transformed into encryption standard code, and the encryption standard code is sent to described the second processing unit;
Described the second processing unit, for judging whether the encrypted authentication code matches with the encryption standard code;If sentencing
It is yes for breaking, then issuing to log in authorize to the login authorization unit allows order;If being judged as NO, show that login authorization is lost
It loses;
The login authorization unit, for allowing computer to log in after receiving the login authorization to allow order.
Dynamic verification code is transformed into encryption standard code using verifying converter unit by using above-mentioned technical proposal, is prevented
Only stealer passes through the case where subscriber identity information stolen can be obtained corresponding computer access authority generation, improves
The safety that computer communication logs in.
In conclusion preventing from stealing the invention has the following advantages: dynamic verification code is transformed into encryption standard code
Person passes through the case where subscriber identity information stolen can be obtained corresponding computer access authority generation, improves computer
Communicate the safety logged in;Convenient for the difficulty that enhancing encryption standard code cracks, the peace that computer communication logs in is further improved
Quan Xing;Using multiple enciphering transformation divided datas, the case where avoiding the confidential data of calculator memory storage while losing.
Detailed description of the invention
Fig. 1 is the flow chart in the embodiment of the present invention 1;
Fig. 2 is the architecture diagram in the embodiment of the present invention 2.
In figure: 1, user's sign-on access unit;11, storage unit;12, first processing units;13, dynamic authentication unit;
14, converter unit is verified;15, the second processing unit;16, authorization unit is logged in.
Specific embodiment
Below in conjunction with attached drawing 1-2, invention is further described in detail.
Embodiment 1: computer communication security login method Internet-based, as shown in Figures 1 and 2, including following step
It is rapid:
Step 1 inputs subscriber identity information and encrypted authentication code by user's sign-on access unit 1, and by user identity
Information is sent to first processing units 12 and encrypted authentication code is sent to the second processing unit 15.
Step 2 is sentenced after transferring the sign-on access match information stored in storage unit 11 by first processing units 12
Whether disconnected subscriber identity information matches with sign-on access comparative information;If being judged as YES, issued to dynamic authentication unit 13 dynamic
State identifying code generates order;If being judged as NO, show that user's sign-on access fails.
Step 3 generates dynamic verification code by dynamic authentication unit 13 after receiving dynamic verification code and generating order,
And dynamic verification code is sent to user's sign-on access unit 1 and verifying converter unit 14.
Dynamic verification code is transformed into encryption mark according to the enciphering transformation data stored in verifying converter unit 14 by step 4
Quasi- code, and encryption standard code is sent to the second processing unit 15.
Step 5 judges whether encrypted authentication code matches with encryption standard code by the second processing unit 15;If being judged as
It is that then issuing to log in authorize to login authorization unit 16 allows order;If being judged as NO, login authorization failure is shown.
Step 6 allows computer to log in after receiving login authorization to allow order.
Dynamic verification code is transformed into encryption standard code, prevents stealer from passing through the subscriber identity information stolen
The case where obtaining corresponding computer access authority occurs, and improves the safety that computer communication logs in.
As shown in Figure 1, dynamic verification code is at least double figures combinatorics on words.4-digit number is used in the present embodiment.Setting
Dynamic verification code is A, such as: A=1234.
As shown in Figure 1, enciphering transformation data are operational formula.The digital shape after operational formula calculates in dynamic verification code
At new number.Number of the new number as the corresponding numerical digit of encryption standard code.So that the calculating operation of encryption standard code is convenient.Setting
Encryption standard code is B, such as: operational formula is B=2 × A, then the B inputted is 2468.
As shown in Figure 1, enciphering transformation data include at least one enciphering transformation divided data.Each enciphering transformation divided data
It is correspondingly arranged an access permission level.User obtains different sign-on access permissions according to different encryption standard codes is inputted.Benefit
With multiple enciphering transformation divided datas, the confidential data that avoids calculator memory from storing up while the case where lose.
Embodiment 2: computer communication security login system Internet-based, as shown in Fig. 2, including user's sign-on access
Unit 1, storage unit 11, first processing units 12, dynamic authentication unit 13, verifying converter unit 14, the second processing unit 15
With login authorization unit 16.
As shown in Fig. 2, user's sign-on access unit 1 is for inputting subscriber identity information and encrypted authentication code, and by user
Identity information is sent to first processing units 12 and encrypted authentication code is sent to the second processing unit 15.
As shown in Fig. 2, storage unit 11 is stored with sign-on access match information.
As shown in Fig. 2, first processing units 12 for after transferring sign-on access match information, judge subscriber identity information with
Whether sign-on access comparative information matches;If being judged as YES, dynamic verification code is issued to dynamic authentication unit 13 and generates order;
If being judged as NO, show that user's sign-on access fails.
As shown in Fig. 2, dynamic authentication unit 13 is used to generate dynamic authentication after receiving dynamic verification code and generating order
Code, and dynamic verification code is sent to user's sign-on access unit 1 and verifying converter unit 14.
As shown in Fig. 2, verifying converter unit 14 is stored with enciphering transformation data, being used for will dynamic according to enciphering transformation data
Identifying code is transformed into encryption standard code, and encryption standard code is sent to the second processing unit 15.
As shown in Fig. 2, the second processing unit 15 is for judging whether encrypted authentication code matches with encryption standard code;If judgement
Be it is yes, then to log in authorization unit 16 issue log in authorization allow order;If being judged as NO, login authorization failure is shown.
It is used to allow computer to log in after receiving login authorization to allow order as shown in Fig. 2, logging in authorization unit 16.
Using verifying converter unit 14, dynamic verification code is transformed into encryption standard code, prevents stealer from passing through the user stolen
Identity information can be obtained the generation of the case where corresponding computer access authority, improve the safety that computer communication logs in.
Working principle: being transformed into encryption standard code for dynamic verification code, prevents stealer from passing through the user's body stolen
The case where part information can be obtained corresponding computer access authority generation improves the safety that computer communication logs in.
This specific embodiment is only explanation of the invention, is not limitation of the present invention, those skilled in the art
Member can according to need the modification that not creative contribution is made to the present embodiment after reading this specification, but as long as at this
All by the protection of Patent Law in the scope of the claims of invention.
Claims (5)
1. computer communication security login method Internet-based, it is characterized in that: the following steps are included:
S1: subscriber identity information and encrypted authentication code are inputted by user's sign-on access unit (1), and the user identity is believed
Breath is sent to first processing units (12) and the encrypted authentication code is sent to the second processing unit (15);
S2: after transferring the sign-on access match information stored in storage unit (11) by the first processing units (12), sentence
Whether the subscriber identity information that breaks matches with the sign-on access comparative information;If being judged as YES, to dynamic authentication unit
(13) it issues dynamic verification code and generates order;If being judged as NO, show that user's sign-on access fails;
S3: after receiving the dynamic verification code and generating order, dynamic authentication is generated by the dynamic authentication unit (13)
Code, and the dynamic verification code is sent to user's sign-on access unit (1) and verifying converter unit (14);
S4: the dynamic verification code is transformed into encryption according to the enciphering transformation data stored in verifying converter unit (14)
Standard code, and the encryption standard code is sent to described the second processing unit (15);
S5: judge whether the encrypted authentication code matches with the encryption standard code by described the second processing unit (15);If
It is judged as YES, then issuing to log in authorize to login authorization unit (16) allows order;If being judged as NO, show that login authorization is lost
It loses;
S6: computer is allowed to log in after receiving the login authorization to allow order.
2. computer communication security login method Internet-based according to claim 1, it is characterized in that: the dynamic
Identifying code is at least double figures combinatorics on words.
3. computer communication security login method Internet-based according to claim 2, it is characterized in that: the encryption
Transformation data are operational formula;Number in the dynamic verification code forms new number after operational formula calculating;It is described
Number of the new number as the corresponding numerical digit of encryption standard code.
4. computer communication security login method Internet-based according to claim 1, it is characterized in that: the encryption
Converting data includes at least one enciphering transformation divided data;Each enciphering transformation divided data is correspondingly arranged access authority etc.
Grade;User obtains different sign-on access permissions according to different encryption standard codes is inputted.
5. computer communication security login system Internet-based, it is characterized in that: the system is any one based on claim 1-4
Computer communication security login method Internet-based described in, including user's sign-on access unit (1), storage unit
(11), first processing units (12), dynamic authentication unit (13), verifying converter unit (14), the second processing unit (15) and step on
It records authorization unit (16);
User's sign-on access unit (1), for inputting subscriber identity information and encrypted authentication code, and by the user identity
Information is sent to the first processing units (12) and the encrypted authentication code is sent to described the second processing unit (15);
The storage unit (11), is stored with sign-on access match information;
The first processing units (12) judge the subscriber identity information after transferring the sign-on access match information
Whether matched with the sign-on access comparative information;If being judged as YES, dynamic is issued to the dynamic authentication unit (13) and is tested
It demonstrate,proves code and generates order;If being judged as NO, show that user's sign-on access fails;
The dynamic authentication unit (13), for generating dynamic verification code after receiving the dynamic verification code and generating order,
And the dynamic verification code is sent to user's sign-on access unit (1) and the verifying converter unit (14);
The verifying converter unit (14), is stored with enciphering transformation data, for that described will be moved according to the enciphering transformation data
State identifying code is transformed into encryption standard code, and the encryption standard code is sent to described the second processing unit (15);
The second processing unit (15), for judging whether the encrypted authentication code matches with the encryption standard code;If sentencing
It is yes for breaking, then issuing to log in authorize to the login authorization unit (16) allows order;If being judged as NO, login authorization is shown
Failure;
The login authorization unit (16), for allowing computer to log in after receiving the login authorization to allow order.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811041995.0A CN109214164A (en) | 2018-09-07 | 2018-09-07 | Computer communication security login method Internet-based and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811041995.0A CN109214164A (en) | 2018-09-07 | 2018-09-07 | Computer communication security login method Internet-based and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109214164A true CN109214164A (en) | 2019-01-15 |
Family
ID=64987053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811041995.0A Pending CN109214164A (en) | 2018-09-07 | 2018-09-07 | Computer communication security login method Internet-based and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109214164A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111708996A (en) * | 2020-06-15 | 2020-09-25 | 南京倍时佳信息科技有限公司 | Enterprise internal management consultation information sharing system based on Internet |
CN112214754A (en) * | 2020-10-30 | 2021-01-12 | 重庆广播电视大学重庆工商职业学院 | Computer network safety early warning system |
CN112364318A (en) * | 2020-11-24 | 2021-02-12 | 北京海联捷讯科技股份有限公司 | Operation and maintenance big data security management method, system, terminal and storage medium |
CN112702359A (en) * | 2021-01-20 | 2021-04-23 | 马波 | Data information safety management method, system, computer equipment and storage medium |
CN113037703A (en) * | 2020-12-16 | 2021-06-25 | 重庆扬成大数据科技有限公司 | Agricultural informatization work management method in big data environment |
CN113037702A (en) * | 2020-12-16 | 2021-06-25 | 重庆扬成大数据科技有限公司 | Agricultural worker login system safe working method based on big data analysis |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102164137A (en) * | 2011-04-15 | 2011-08-24 | 华南理工大学 | Strong authentication method based on dynamic mapping password |
CN102202067A (en) * | 2011-07-15 | 2011-09-28 | 席勇良 | Dynamic random cipher registration method |
CN103441856A (en) * | 2013-09-06 | 2013-12-11 | 北京握奇智能科技有限公司 | Dynamic password authentication method and device |
CN104038924A (en) * | 2014-06-05 | 2014-09-10 | 腾讯科技(深圳)有限公司 | Method and system for achieving resource exchange information processing |
CN106603241A (en) * | 2016-12-11 | 2017-04-26 | 乐视控股(北京)有限公司 | Unlocking method, apparatus and electronic device |
-
2018
- 2018-09-07 CN CN201811041995.0A patent/CN109214164A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102164137A (en) * | 2011-04-15 | 2011-08-24 | 华南理工大学 | Strong authentication method based on dynamic mapping password |
CN102202067A (en) * | 2011-07-15 | 2011-09-28 | 席勇良 | Dynamic random cipher registration method |
CN103441856A (en) * | 2013-09-06 | 2013-12-11 | 北京握奇智能科技有限公司 | Dynamic password authentication method and device |
CN104038924A (en) * | 2014-06-05 | 2014-09-10 | 腾讯科技(深圳)有限公司 | Method and system for achieving resource exchange information processing |
CN106603241A (en) * | 2016-12-11 | 2017-04-26 | 乐视控股(北京)有限公司 | Unlocking method, apparatus and electronic device |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111708996A (en) * | 2020-06-15 | 2020-09-25 | 南京倍时佳信息科技有限公司 | Enterprise internal management consultation information sharing system based on Internet |
CN111708996B (en) * | 2020-06-15 | 2024-03-15 | 南京倍时佳信息科技有限公司 | Enterprise internal management consultation information sharing system based on Internet |
CN112214754A (en) * | 2020-10-30 | 2021-01-12 | 重庆广播电视大学重庆工商职业学院 | Computer network safety early warning system |
CN112214754B (en) * | 2020-10-30 | 2023-02-10 | 重庆广播电视大学重庆工商职业学院 | Computer network safety early warning system |
CN112364318A (en) * | 2020-11-24 | 2021-02-12 | 北京海联捷讯科技股份有限公司 | Operation and maintenance big data security management method, system, terminal and storage medium |
CN113037703A (en) * | 2020-12-16 | 2021-06-25 | 重庆扬成大数据科技有限公司 | Agricultural informatization work management method in big data environment |
CN113037702A (en) * | 2020-12-16 | 2021-06-25 | 重庆扬成大数据科技有限公司 | Agricultural worker login system safe working method based on big data analysis |
CN113037702B (en) * | 2020-12-16 | 2021-11-09 | 重庆扬成大数据科技有限公司 | Agricultural worker login system safe working method based on big data analysis |
CN112702359A (en) * | 2021-01-20 | 2021-04-23 | 马波 | Data information safety management method, system, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109214164A (en) | Computer communication security login method Internet-based and system | |
WO2020144008A2 (en) | Methods and systems for preparing and performing an object authentication | |
US8601553B1 (en) | Techniques of imposing access control policies | |
CN110149328B (en) | Interface authentication method, device, equipment and computer readable storage medium | |
CN104683354B (en) | A kind of dynamic password system based on mark | |
CN101107611A (en) | Private and controlled ownership sharing | |
US20210099304A1 (en) | Composite identity authentication method and composite identity authentication system using same | |
CN101201886A (en) | Three-he-code for recognizing commodity | |
JP5013931B2 (en) | Apparatus and method for controlling computer login | |
CN105740725A (en) | File protection method and system | |
CN106572076A (en) | Web service access method, client side and server side | |
CN102004872A (en) | Fingerprint encryption-based identity authentication system and implementation method thereof | |
CN104321776A (en) | Offline authentication with embedded authorization attributes | |
CN112069527A (en) | Tax control invoice protection method and system based on multiple safety protection measures | |
CN112905965A (en) | Financial big data processing system based on block chain | |
CN102571874A (en) | On-line audit method and device in distributed system | |
CN101655893B (en) | Manufacture method of intelligent blog lock, Blog access control method and system thereof | |
CN112364323A (en) | High-security storage access method and device based on user iris recognition | |
CN112887085A (en) | Method, device and system for generating security key of SSD (solid State disk) main control chip | |
CN104751042A (en) | Credibility detection method based on password hash and biometric feature recognition | |
CN111768523A (en) | CTID-based NFC intelligent door lock unlocking method, system, equipment and medium | |
CN112364316B (en) | High-security-level data access method and device based on structured light array identification | |
CN213814671U (en) | High-security-level data access device based on structured light array recognition | |
JP2016116203A (en) | Authentication device, information terminal device, program, and authentication method | |
CN111815821B (en) | IC card security algorithm applied to intelligent door lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190115 |
|
RJ01 | Rejection of invention patent application after publication |