CN109214164A - Computer communication security login method Internet-based and system - Google Patents

Computer communication security login method Internet-based and system Download PDF

Info

Publication number
CN109214164A
CN109214164A CN201811041995.0A CN201811041995A CN109214164A CN 109214164 A CN109214164 A CN 109214164A CN 201811041995 A CN201811041995 A CN 201811041995A CN 109214164 A CN109214164 A CN 109214164A
Authority
CN
China
Prior art keywords
code
unit
sign
access
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811041995.0A
Other languages
Chinese (zh)
Inventor
赵卫华
张永华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei GEO University
Original Assignee
Hebei GEO University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei GEO University filed Critical Hebei GEO University
Priority to CN201811041995.0A priority Critical patent/CN109214164A/en
Publication of CN109214164A publication Critical patent/CN109214164A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses computer communication security login method Internet-based and systems, it is related to computer login techniques field, it solves stealer and passes through the account information stolen and the available corresponding computer access authority of login password, cause to calculate the lower problem of the safety logged in, its key points of the technical solution are that: the following steps are included: input subscriber identity information and encrypted authentication code;Judge whether the subscriber identity information matches with the sign-on access comparative information;Generate dynamic verification code;The dynamic verification code is transformed into encryption standard code;Judge whether the encrypted authentication code matches with the encryption standard code;It issues to log in authorize and allows order;Allow computer to log in after receiving the login authorization to allow order, has the effect of improving the safety that computer communication logs in.

Description

Computer communication security login method Internet-based and system
Technical field
The present invention relates to computer login techniques fields, more specifically, it relates to which computer Internet-based communicates Safe login method and system.
Background technique
As computer application is more and more common, the quantity of computer user is constantly soaring, and application level is continuously improved. Computer has the spies such as arithmetic speed is fast, counting accuracy is high, logical operation capability is strong, memory capacity is big, the degree of automation is high Point is widely used in the fields such as internet, communication, multimedia.
Currently, to verify user identity, user needs to input account information and logs in close during computer logs in Code acquisition computer access authority.User inputs character letter during inputting account information and login password, through keyboard Breath, in the process, account information and login password are easy to be stolen by others, stealer pass through the account information stolen and Login password can get corresponding computer access authority, cause the safety for calculating login lower.
Therefore, how to improve the safety of computer login is our problems in the urgent need to address at present.
Summary of the invention
The object of the present invention is to provide computer communication security login methods Internet-based, have raising computer logical Believe the effect of the safety logged in.
Above-mentioned technical purpose of the invention has the technical scheme that computer Internet-based is logical Believe safe login method, comprising the following steps:
S1: inputting subscriber identity information and encrypted authentication code by user's sign-on access unit, and by the user identity Information is sent to first processing units and the encrypted authentication code is sent to the second processing unit;
S2: after transferring the sign-on access match information stored in storage unit by the first processing units, judge institute State whether subscriber identity information matches with the sign-on access comparative information;If being judged as YES, issued to dynamic authentication unit Dynamic verification code generates order;If being judged as NO, show that user's sign-on access fails;
S3: after receiving the dynamic verification code and generating order, dynamic authentication is generated by the dynamic authentication unit Code, and the dynamic verification code is sent to user's sign-on access unit and verifying converter unit;
S4: the dynamic verification code is transformed into encryption according to the enciphering transformation data stored in the verifying converter unit Standard code, and the encryption standard code is sent to described the second processing unit;
S5: judge whether the encrypted authentication code matches with the encryption standard code by described the second processing unit;If It is judged as YES, then issuing to log in authorize to login authorization unit allows order;If being judged as NO, login authorization failure is shown;
S6: computer is allowed to log in after receiving the login authorization to allow order.
By using above-mentioned technical proposal, dynamic verification code is transformed into encryption standard code, prevents stealer by stealing Obtained subscriber identity information can be obtained the generation of the case where corresponding computer access authority, improve what computer communication logged in Safety.
The present invention is further arranged to: the dynamic verification code is at least double figures combinatorics on words.
Computer is further improved by using above-mentioned technical proposal convenient for the difficulty that enhancing encryption standard code cracks Communicate the safety logged in.
The present invention is further arranged to: the enciphering transformation data are operational formula;Number in the dynamic verification code New number is formed after operational formula calculating;Number of the new number as the corresponding numerical digit of encryption standard code.
By using above-mentioned technical proposal, so that the calculating operation of encryption standard code is convenient.
The present invention is further arranged to: the enciphering transformation data include at least one enciphering transformation divided data;Each Enciphering transformation divided data is correspondingly arranged an access permission level;User steps on according to different encryption standard code acquisition differences is inputted Record access authority.
By using above-mentioned technical proposal, using multiple enciphering transformation divided datas, the secrecy for avoiding calculator memory from storing up is provided The case where expecting while losing.
It is a further object of the present invention to provide computer communication security login systems Internet-based, have and improve calculating The effect for the safety that machine communication logs in.
Above-mentioned technical purpose of the invention has the technical scheme that computer Internet-based is logical Believe Security Login System, including user's sign-on access unit, storage unit, first processing units, dynamic authentication unit, verifying change It changes unit, the second processing unit and logs in authorization unit;
User's sign-on access unit, for inputting subscriber identity information and encrypted authentication code, and by user's body Part information is sent to the first processing units and the encrypted authentication code is sent to described the second processing unit;
The storage unit is stored with sign-on access match information;
The first processing units judge the subscriber identity information after transferring the sign-on access match information Whether matched with the sign-on access comparative information;If being judged as YES, dynamic verification code is issued to the dynamic authentication unit Generate order;If being judged as NO, show that user's sign-on access fails;
The dynamic authentication unit, for generating dynamic verification code after receiving the dynamic verification code and generating order, And the dynamic verification code is sent to user's sign-on access unit and the verifying converter unit;
The verifying converter unit, is stored with enciphering transformation data, for that described will be moved according to the enciphering transformation data State identifying code is transformed into encryption standard code, and the encryption standard code is sent to described the second processing unit;
Described the second processing unit, for judging whether the encrypted authentication code matches with the encryption standard code;If sentencing It is yes for breaking, then issuing to log in authorize to the login authorization unit allows order;If being judged as NO, show that login authorization is lost It loses;
The login authorization unit, for allowing computer to log in after receiving the login authorization to allow order.
Dynamic verification code is transformed into encryption standard code using verifying converter unit by using above-mentioned technical proposal, is prevented Only stealer passes through the case where subscriber identity information stolen can be obtained corresponding computer access authority generation, improves The safety that computer communication logs in.
In conclusion preventing from stealing the invention has the following advantages: dynamic verification code is transformed into encryption standard code Person passes through the case where subscriber identity information stolen can be obtained corresponding computer access authority generation, improves computer Communicate the safety logged in;Convenient for the difficulty that enhancing encryption standard code cracks, the peace that computer communication logs in is further improved Quan Xing;Using multiple enciphering transformation divided datas, the case where avoiding the confidential data of calculator memory storage while losing.
Detailed description of the invention
Fig. 1 is the flow chart in the embodiment of the present invention 1;
Fig. 2 is the architecture diagram in the embodiment of the present invention 2.
In figure: 1, user's sign-on access unit;11, storage unit;12, first processing units;13, dynamic authentication unit; 14, converter unit is verified;15, the second processing unit;16, authorization unit is logged in.
Specific embodiment
Below in conjunction with attached drawing 1-2, invention is further described in detail.
Embodiment 1: computer communication security login method Internet-based, as shown in Figures 1 and 2, including following step It is rapid:
Step 1 inputs subscriber identity information and encrypted authentication code by user's sign-on access unit 1, and by user identity Information is sent to first processing units 12 and encrypted authentication code is sent to the second processing unit 15.
Step 2 is sentenced after transferring the sign-on access match information stored in storage unit 11 by first processing units 12 Whether disconnected subscriber identity information matches with sign-on access comparative information;If being judged as YES, issued to dynamic authentication unit 13 dynamic State identifying code generates order;If being judged as NO, show that user's sign-on access fails.
Step 3 generates dynamic verification code by dynamic authentication unit 13 after receiving dynamic verification code and generating order, And dynamic verification code is sent to user's sign-on access unit 1 and verifying converter unit 14.
Dynamic verification code is transformed into encryption mark according to the enciphering transformation data stored in verifying converter unit 14 by step 4 Quasi- code, and encryption standard code is sent to the second processing unit 15.
Step 5 judges whether encrypted authentication code matches with encryption standard code by the second processing unit 15;If being judged as It is that then issuing to log in authorize to login authorization unit 16 allows order;If being judged as NO, login authorization failure is shown.
Step 6 allows computer to log in after receiving login authorization to allow order.
Dynamic verification code is transformed into encryption standard code, prevents stealer from passing through the subscriber identity information stolen The case where obtaining corresponding computer access authority occurs, and improves the safety that computer communication logs in.
As shown in Figure 1, dynamic verification code is at least double figures combinatorics on words.4-digit number is used in the present embodiment.Setting Dynamic verification code is A, such as: A=1234.
As shown in Figure 1, enciphering transformation data are operational formula.The digital shape after operational formula calculates in dynamic verification code At new number.Number of the new number as the corresponding numerical digit of encryption standard code.So that the calculating operation of encryption standard code is convenient.Setting Encryption standard code is B, such as: operational formula is B=2 × A, then the B inputted is 2468.
As shown in Figure 1, enciphering transformation data include at least one enciphering transformation divided data.Each enciphering transformation divided data It is correspondingly arranged an access permission level.User obtains different sign-on access permissions according to different encryption standard codes is inputted.Benefit With multiple enciphering transformation divided datas, the confidential data that avoids calculator memory from storing up while the case where lose.
Embodiment 2: computer communication security login system Internet-based, as shown in Fig. 2, including user's sign-on access Unit 1, storage unit 11, first processing units 12, dynamic authentication unit 13, verifying converter unit 14, the second processing unit 15 With login authorization unit 16.
As shown in Fig. 2, user's sign-on access unit 1 is for inputting subscriber identity information and encrypted authentication code, and by user Identity information is sent to first processing units 12 and encrypted authentication code is sent to the second processing unit 15.
As shown in Fig. 2, storage unit 11 is stored with sign-on access match information.
As shown in Fig. 2, first processing units 12 for after transferring sign-on access match information, judge subscriber identity information with Whether sign-on access comparative information matches;If being judged as YES, dynamic verification code is issued to dynamic authentication unit 13 and generates order; If being judged as NO, show that user's sign-on access fails.
As shown in Fig. 2, dynamic authentication unit 13 is used to generate dynamic authentication after receiving dynamic verification code and generating order Code, and dynamic verification code is sent to user's sign-on access unit 1 and verifying converter unit 14.
As shown in Fig. 2, verifying converter unit 14 is stored with enciphering transformation data, being used for will dynamic according to enciphering transformation data Identifying code is transformed into encryption standard code, and encryption standard code is sent to the second processing unit 15.
As shown in Fig. 2, the second processing unit 15 is for judging whether encrypted authentication code matches with encryption standard code;If judgement Be it is yes, then to log in authorization unit 16 issue log in authorization allow order;If being judged as NO, login authorization failure is shown.
It is used to allow computer to log in after receiving login authorization to allow order as shown in Fig. 2, logging in authorization unit 16. Using verifying converter unit 14, dynamic verification code is transformed into encryption standard code, prevents stealer from passing through the user stolen Identity information can be obtained the generation of the case where corresponding computer access authority, improve the safety that computer communication logs in.
Working principle: being transformed into encryption standard code for dynamic verification code, prevents stealer from passing through the user's body stolen The case where part information can be obtained corresponding computer access authority generation improves the safety that computer communication logs in.
This specific embodiment is only explanation of the invention, is not limitation of the present invention, those skilled in the art Member can according to need the modification that not creative contribution is made to the present embodiment after reading this specification, but as long as at this All by the protection of Patent Law in the scope of the claims of invention.

Claims (5)

1. computer communication security login method Internet-based, it is characterized in that: the following steps are included:
S1: subscriber identity information and encrypted authentication code are inputted by user's sign-on access unit (1), and the user identity is believed Breath is sent to first processing units (12) and the encrypted authentication code is sent to the second processing unit (15);
S2: after transferring the sign-on access match information stored in storage unit (11) by the first processing units (12), sentence Whether the subscriber identity information that breaks matches with the sign-on access comparative information;If being judged as YES, to dynamic authentication unit (13) it issues dynamic verification code and generates order;If being judged as NO, show that user's sign-on access fails;
S3: after receiving the dynamic verification code and generating order, dynamic authentication is generated by the dynamic authentication unit (13) Code, and the dynamic verification code is sent to user's sign-on access unit (1) and verifying converter unit (14);
S4: the dynamic verification code is transformed into encryption according to the enciphering transformation data stored in verifying converter unit (14) Standard code, and the encryption standard code is sent to described the second processing unit (15);
S5: judge whether the encrypted authentication code matches with the encryption standard code by described the second processing unit (15);If It is judged as YES, then issuing to log in authorize to login authorization unit (16) allows order;If being judged as NO, show that login authorization is lost It loses;
S6: computer is allowed to log in after receiving the login authorization to allow order.
2. computer communication security login method Internet-based according to claim 1, it is characterized in that: the dynamic Identifying code is at least double figures combinatorics on words.
3. computer communication security login method Internet-based according to claim 2, it is characterized in that: the encryption Transformation data are operational formula;Number in the dynamic verification code forms new number after operational formula calculating;It is described Number of the new number as the corresponding numerical digit of encryption standard code.
4. computer communication security login method Internet-based according to claim 1, it is characterized in that: the encryption Converting data includes at least one enciphering transformation divided data;Each enciphering transformation divided data is correspondingly arranged access authority etc. Grade;User obtains different sign-on access permissions according to different encryption standard codes is inputted.
5. computer communication security login system Internet-based, it is characterized in that: the system is any one based on claim 1-4 Computer communication security login method Internet-based described in, including user's sign-on access unit (1), storage unit (11), first processing units (12), dynamic authentication unit (13), verifying converter unit (14), the second processing unit (15) and step on It records authorization unit (16);
User's sign-on access unit (1), for inputting subscriber identity information and encrypted authentication code, and by the user identity Information is sent to the first processing units (12) and the encrypted authentication code is sent to described the second processing unit (15);
The storage unit (11), is stored with sign-on access match information;
The first processing units (12) judge the subscriber identity information after transferring the sign-on access match information Whether matched with the sign-on access comparative information;If being judged as YES, dynamic is issued to the dynamic authentication unit (13) and is tested It demonstrate,proves code and generates order;If being judged as NO, show that user's sign-on access fails;
The dynamic authentication unit (13), for generating dynamic verification code after receiving the dynamic verification code and generating order, And the dynamic verification code is sent to user's sign-on access unit (1) and the verifying converter unit (14);
The verifying converter unit (14), is stored with enciphering transformation data, for that described will be moved according to the enciphering transformation data State identifying code is transformed into encryption standard code, and the encryption standard code is sent to described the second processing unit (15);
The second processing unit (15), for judging whether the encrypted authentication code matches with the encryption standard code;If sentencing It is yes for breaking, then issuing to log in authorize to the login authorization unit (16) allows order;If being judged as NO, login authorization is shown Failure;
The login authorization unit (16), for allowing computer to log in after receiving the login authorization to allow order.
CN201811041995.0A 2018-09-07 2018-09-07 Computer communication security login method Internet-based and system Pending CN109214164A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811041995.0A CN109214164A (en) 2018-09-07 2018-09-07 Computer communication security login method Internet-based and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811041995.0A CN109214164A (en) 2018-09-07 2018-09-07 Computer communication security login method Internet-based and system

Publications (1)

Publication Number Publication Date
CN109214164A true CN109214164A (en) 2019-01-15

Family

ID=64987053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811041995.0A Pending CN109214164A (en) 2018-09-07 2018-09-07 Computer communication security login method Internet-based and system

Country Status (1)

Country Link
CN (1) CN109214164A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111708996A (en) * 2020-06-15 2020-09-25 南京倍时佳信息科技有限公司 Enterprise internal management consultation information sharing system based on Internet
CN112214754A (en) * 2020-10-30 2021-01-12 重庆广播电视大学重庆工商职业学院 Computer network safety early warning system
CN112364318A (en) * 2020-11-24 2021-02-12 北京海联捷讯科技股份有限公司 Operation and maintenance big data security management method, system, terminal and storage medium
CN112702359A (en) * 2021-01-20 2021-04-23 马波 Data information safety management method, system, computer equipment and storage medium
CN113037703A (en) * 2020-12-16 2021-06-25 重庆扬成大数据科技有限公司 Agricultural informatization work management method in big data environment
CN113037702A (en) * 2020-12-16 2021-06-25 重庆扬成大数据科技有限公司 Agricultural worker login system safe working method based on big data analysis

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102164137A (en) * 2011-04-15 2011-08-24 华南理工大学 Strong authentication method based on dynamic mapping password
CN102202067A (en) * 2011-07-15 2011-09-28 席勇良 Dynamic random cipher registration method
CN103441856A (en) * 2013-09-06 2013-12-11 北京握奇智能科技有限公司 Dynamic password authentication method and device
CN104038924A (en) * 2014-06-05 2014-09-10 腾讯科技(深圳)有限公司 Method and system for achieving resource exchange information processing
CN106603241A (en) * 2016-12-11 2017-04-26 乐视控股(北京)有限公司 Unlocking method, apparatus and electronic device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102164137A (en) * 2011-04-15 2011-08-24 华南理工大学 Strong authentication method based on dynamic mapping password
CN102202067A (en) * 2011-07-15 2011-09-28 席勇良 Dynamic random cipher registration method
CN103441856A (en) * 2013-09-06 2013-12-11 北京握奇智能科技有限公司 Dynamic password authentication method and device
CN104038924A (en) * 2014-06-05 2014-09-10 腾讯科技(深圳)有限公司 Method and system for achieving resource exchange information processing
CN106603241A (en) * 2016-12-11 2017-04-26 乐视控股(北京)有限公司 Unlocking method, apparatus and electronic device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111708996A (en) * 2020-06-15 2020-09-25 南京倍时佳信息科技有限公司 Enterprise internal management consultation information sharing system based on Internet
CN111708996B (en) * 2020-06-15 2024-03-15 南京倍时佳信息科技有限公司 Enterprise internal management consultation information sharing system based on Internet
CN112214754A (en) * 2020-10-30 2021-01-12 重庆广播电视大学重庆工商职业学院 Computer network safety early warning system
CN112214754B (en) * 2020-10-30 2023-02-10 重庆广播电视大学重庆工商职业学院 Computer network safety early warning system
CN112364318A (en) * 2020-11-24 2021-02-12 北京海联捷讯科技股份有限公司 Operation and maintenance big data security management method, system, terminal and storage medium
CN113037703A (en) * 2020-12-16 2021-06-25 重庆扬成大数据科技有限公司 Agricultural informatization work management method in big data environment
CN113037702A (en) * 2020-12-16 2021-06-25 重庆扬成大数据科技有限公司 Agricultural worker login system safe working method based on big data analysis
CN113037702B (en) * 2020-12-16 2021-11-09 重庆扬成大数据科技有限公司 Agricultural worker login system safe working method based on big data analysis
CN112702359A (en) * 2021-01-20 2021-04-23 马波 Data information safety management method, system, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109214164A (en) Computer communication security login method Internet-based and system
WO2020144008A2 (en) Methods and systems for preparing and performing an object authentication
US8601553B1 (en) Techniques of imposing access control policies
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
CN104683354B (en) A kind of dynamic password system based on mark
CN101107611A (en) Private and controlled ownership sharing
US20210099304A1 (en) Composite identity authentication method and composite identity authentication system using same
CN101201886A (en) Three-he-code for recognizing commodity
JP5013931B2 (en) Apparatus and method for controlling computer login
CN105740725A (en) File protection method and system
CN106572076A (en) Web service access method, client side and server side
CN102004872A (en) Fingerprint encryption-based identity authentication system and implementation method thereof
CN104321776A (en) Offline authentication with embedded authorization attributes
CN112069527A (en) Tax control invoice protection method and system based on multiple safety protection measures
CN112905965A (en) Financial big data processing system based on block chain
CN102571874A (en) On-line audit method and device in distributed system
CN101655893B (en) Manufacture method of intelligent blog lock, Blog access control method and system thereof
CN112364323A (en) High-security storage access method and device based on user iris recognition
CN112887085A (en) Method, device and system for generating security key of SSD (solid State disk) main control chip
CN104751042A (en) Credibility detection method based on password hash and biometric feature recognition
CN111768523A (en) CTID-based NFC intelligent door lock unlocking method, system, equipment and medium
CN112364316B (en) High-security-level data access method and device based on structured light array identification
CN213814671U (en) High-security-level data access device based on structured light array recognition
JP2016116203A (en) Authentication device, information terminal device, program, and authentication method
CN111815821B (en) IC card security algorithm applied to intelligent door lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190115

RJ01 Rejection of invention patent application after publication