CN109409069A - Computer security login method and computer security entering device - Google Patents
Computer security login method and computer security entering device Download PDFInfo
- Publication number
- CN109409069A CN109409069A CN201811289863.XA CN201811289863A CN109409069A CN 109409069 A CN109409069 A CN 109409069A CN 201811289863 A CN201811289863 A CN 201811289863A CN 109409069 A CN109409069 A CN 109409069A
- Authority
- CN
- China
- Prior art keywords
- information
- login authentication
- user
- computer security
- authentication interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of computer security login method and computer security entering devices, wherein, computer includes mainframe box, starting key is provided on the mainframe box, the starting key upper surface is embedded with fingerprint identification module, for the fingerprint identification module for acquiring the finger print information of user when user presses the starting key and according to the identity information of collected finger print information identification user, the computer security login method includes: the current user identities information for obtaining the fingerprint identification module and sending;Obtain login authentication interface associated with the current user identities information;The login authentication interface is loaded and shows, so that the user carries out login authentication.According to the technical solution of the present invention, safety when computer uses is improved.
Description
Technical field
The present invention relates to field of computer technology, in particular to a kind of computer security login method and a kind of meter
Calculation machine secure login device.
Background technique
In order to guarantee that computer login security, traditional login mode are usually display after user starts starting key
Screen directly displays fixed verifying interface, user's validation information on verifying interface, although this login authentication mode exists
The authentication of user is realized to a certain extent, but is easy to be pried through by other people to verification information, and then substantially reduce safety
Property.
Summary of the invention
The present invention is based at least one above-mentioned technical problem, proposes a kind of new computer security login scheme,
Improve safety when computer uses.
In view of this, the computer includes mainframe box the invention proposes a kind of new computer security login method,
Starting key is provided on the mainframe box, the starting key upper surface is embedded with fingerprint identification module, the fingerprint recognition
Module is for acquiring the finger print information of user when user presses the starting key and being identified according to collected finger print information
The identity information of user, the computer security login method include: the active user for obtaining the fingerprint identification module and sending
Identity information;Obtain login authentication interface associated with the current user identities information;It loads and shows that the login is tested
Interface is demonstrate,proved, so that the user carries out login authentication.
In the technical scheme, user needs to start power on button in booting, embedding during pressing power on button
The fingerprint identification module being located on power on button can acquire and identify the identity information of user, be recognized according to fingerprint identification module
Current user identities information, obtain login authentication associated with current user identities information interface, and it loaded
Show that when different user booting logs in, corresponding login authentication interface is not identical, even if other people peep for user login validation
Verification information to active user is not available yet, and substantially increases safety.
In the above-mentioned technical solutions, it is preferable that obtain login associated with the current user identities information described
Before the step of verifying interface, further includes: be pre-stored multiple subscriber identity informations and each subscriber identity information and step on
Incidence relation between record verifying interface;The acquisition login authentication interface associated with the current user identities information
Step specifically includes: according to the pre-stored incidence relation, searching login associated with the current user identities information
Verify interface.
In any of the above-described technical solution, it is preferable that further include: detecting the user in login authentication circle
When the number of validation information reaches pre-determined number on face, warning note is carried out.
In the technical solution, still authentication failed after inputting the verification information of pre-determined number illustrate to be switched in the presence of malice
Situation, carries out warning reminding at this time, excludes security risk in time convenient for related personnel.
In any of the above-described technical solution, it is preferable that the step of progress warning note includes: carry out audio alert
Prompt;And/or warning message is sent to designated terminal associated with the computer.
According to the second aspect of the invention, a kind of computer security entering device is proposed, the computer includes host
Case is provided with starting key on the mainframe box, and the starting key upper surface is embedded with fingerprint identification module, and the fingerprint is known
Other module is for acquiring the finger print information of user when user presses the starting key and being known according to collected finger print information
The identity information of other user, the computer security entering device includes: first acquisition unit, for obtaining the fingerprint recognition
The current user identities information that module is sent;Second acquisition unit, it is associated with the current user identities information for obtaining
Login authentication interface;Processing unit is tested for loading and showing the login authentication interface so that the user log in
Card.
In the technical scheme, user needs to start power on button in booting, embedding during pressing power on button
The fingerprint identification module being located on power on button can acquire and identify the identity information of user, be recognized according to fingerprint identification module
Current user identities information, obtain login authentication associated with current user identities information interface, and it loaded
Show that when different user booting logs in, corresponding login authentication interface is not identical, even if other people peep for user login validation
Verification information to active user is not available yet, and substantially increases safety.
In the above-mentioned technical solutions, it is preferable that further include: storage unit, for being pre-stored multiple subscriber identity informations, with
And the incidence relation between each subscriber identity information and login authentication interface;The second acquisition unit is used for: according to
The pre-stored incidence relation searches login authentication interface associated with the current user identities information.
In any of the above-described technical solution, it is preferable that further include: alarm unit, for detecting that the user exists
When the number of validation information reaches pre-determined number on the login authentication interface, warning note is carried out.
In the technical solution, still authentication failed after inputting the verification information of pre-determined number illustrate to be switched in the presence of malice
Situation, carries out warning reminding at this time, excludes security risk in time convenient for related personnel.
In any of the above-described technical solution, it is preferable that the alarm unit is specifically used for: carrying out audio alert prompt;
And/or warning message is sent to designated terminal associated with the computer.
By above technical scheme, safety when computer uses is improved.
Detailed description of the invention
Fig. 1 shows the schematic flow diagram of the computer security login method of embodiment according to the present invention;
Fig. 2 shows the schematic block diagrams of the computer security entering device of embodiment according to the present invention.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real
Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application
Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also
To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
Fig. 1 shows the exemplary flow of the computer security login method of embodiment according to the present invention.
As shown in Figure 1, computer includes mainframe box in the present embodiment, starting key is provided on the mainframe box, it is described
Starting key upper surface is embedded with fingerprint identification module, and the fingerprint identification module is used for when user presses the starting key
It acquires the finger print information of user and identifies the identity information of user according to collected finger print information, the computer security logs in
Method includes:
Step 102, the current user identities information that the fingerprint identification module is sent is obtained.
Step 104, login authentication interface associated with the current user identities information is obtained.
Step 106, the login authentication interface is loaded and shows, so that the user carries out login authentication.
In the technical scheme, user needs to start power on button in booting, embedding during pressing power on button
The fingerprint identification module being located on power on button can acquire and identify the identity information of user, be recognized according to fingerprint identification module
Current user identities information, obtain login authentication associated with current user identities information interface, and it loaded
Show that when different user booting logs in, corresponding login authentication interface is not identical, even if other people peep for user login validation
Verification information to active user is not available yet, and substantially increases safety.
In the above-mentioned technical solutions, it is preferable that obtain login associated with the current user identities information described
Before the step of verifying interface, further includes: be pre-stored multiple subscriber identity informations and each subscriber identity information and step on
Incidence relation between record verifying interface;The acquisition login authentication interface associated with the current user identities information
Step specifically includes: according to the pre-stored incidence relation, searching login associated with the current user identities information
Verify interface.
In any of the above-described technical solution, it is preferable that further include: detecting the user in login authentication circle
When the number of validation information reaches pre-determined number on face, warning note is carried out.
In the technical solution, still authentication failed after inputting the verification information of pre-determined number illustrate to be switched in the presence of malice
Situation, carries out warning reminding at this time, excludes security risk in time convenient for related personnel.
In any of the above-described technical solution, it is preferable that the step of progress warning note includes: carry out audio alert
Prompt;And/or warning message is sent to designated terminal associated with the computer.
Fig. 2 shows the schematic block diagrams of the computer security entering device of embodiment according to the present invention.
As shown in Fig. 2, the computer security entering device 200 includes: first acquisition unit 202, second acquisition unit
204 and processing unit 206.
Wherein, first acquisition unit 202 is used to obtain the current user identities information that the fingerprint identification module is sent;The
Two acquiring units 204 are for obtaining login authentication interface associated with the current user identities information;Processing unit 206 is used
In loading and showing the login authentication interface, so that the user carries out login authentication.
In the technical scheme, user needs to start power on button in booting, embedding during pressing power on button
The fingerprint identification module being located on power on button can acquire and identify the identity information of user, be recognized according to fingerprint identification module
Current user identities information, obtain login authentication associated with current user identities information interface, and it loaded
Show that when different user booting logs in, corresponding login authentication interface is not identical, even if other people peep for user login validation
Verification information to active user is not available yet, and substantially increases safety.
In the above-mentioned technical solutions, it is preferable that further include: storage unit 208, for being pre-stored multiple user identity letters
Breath and the incidence relation between each subscriber identity information and login authentication interface;The second acquisition unit 204 is used
In: according to the pre-stored incidence relation, search login authentication interface associated with the current user identities information.
In any of the above-described technical solution, it is preferable that further include: alarm unit 210, for detecting the user
When the number of validation information on the login authentication interface reaches pre-determined number, warning note is carried out.
In the technical solution, still authentication failed after inputting the verification information of pre-determined number illustrate to be switched in the presence of malice
Situation, carries out warning reminding at this time, excludes security risk in time convenient for related personnel.
In any of the above-described technical solution, it is preferable that the alarm unit 210 is specifically used for: carrying out audio alert and mention
Show;And/or warning message is sent to designated terminal associated with the computer.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, and technical solution of the present invention proposes a kind of new
Computer security login scheme improves safety when computer uses.
It is merely a preferred embodiment of the present invention, is not intended to restrict the invention, for the technology of this field described in upper
For personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (8)
1. computer security login method, which is characterized in that the computer includes mainframe box, is provided with out on the mainframe box
Machine key, the starting key upper surface are embedded with fingerprint identification module, and the fingerprint identification module is used to press institute in user
The finger print information of user is acquired when stating starting key and the identity information of user, the meter are identified according to collected finger print information
Calculation machine safe login method includes:
Obtain the current user identities information that the fingerprint identification module is sent;
Obtain login authentication interface associated with the current user identities information;
The login authentication interface is loaded and shows, so that the user carries out login authentication.
2. computer security login method according to claim 1, which is characterized in that in the acquisition and the current use
Before the step of family identity information associated login authentication interface, further includes:
It is pre-stored being associated between multiple subscriber identity informations and each subscriber identity information and login authentication interface
System;
The step of acquisition login authentication interface associated with the current user identities information, specifically includes:
According to the pre-stored incidence relation, login authentication interface associated with the current user identities information is searched.
3. computer security login method according to claim 1, which is characterized in that further include:
When detecting that number of the user in validation information on the login authentication interface reaches pre-determined number, carry out
Warning note.
4. computer security login method according to claim 3, which is characterized in that the step of the progress warning note
Include:
Carry out audio alert prompt;And/or
Warning message is sent to designated terminal associated with the computer.
5. a kind of computer security entering device, which is characterized in that the computer includes mainframe box, is arranged on the mainframe box
There is starting key, the starting key upper surface is embedded with fingerprint identification module, and the fingerprint identification module in user for pressing
The finger print information of user is acquired when pressing the starting key and the identity information of user, institute are identified according to collected finger print information
Stating computer security entering device includes:
First acquisition unit, the current user identities information sent for obtaining the fingerprint identification module;
Second acquisition unit, for obtaining login authentication interface associated with the current user identities information;
Processing unit, for loading and showing the login authentication interface, so that the user carries out login authentication.
6. computer security entering device according to claim 5, which is characterized in that further include:
Storage unit, for being pre-stored multiple subscriber identity informations and each subscriber identity information and login authentication circle
Incidence relation between face;
The second acquisition unit is used for:
According to the pre-stored incidence relation, login authentication interface associated with the current user identities information is searched.
7. computer security entering device according to claim 5, which is characterized in that further include:
Alarm unit, for detecting that user number of validation information on the login authentication interface reaches pre-
When determining number, warning note is carried out.
8. computer security entering device according to claim 7, which is characterized in that the alarm unit is specifically used for:
Carry out audio alert prompt;And/or
Warning message is sent to designated terminal associated with the computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811289863.XA CN109409069A (en) | 2018-10-31 | 2018-10-31 | Computer security login method and computer security entering device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811289863.XA CN109409069A (en) | 2018-10-31 | 2018-10-31 | Computer security login method and computer security entering device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109409069A true CN109409069A (en) | 2019-03-01 |
Family
ID=65471031
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811289863.XA Pending CN109409069A (en) | 2018-10-31 | 2018-10-31 | Computer security login method and computer security entering device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109409069A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102855428A (en) * | 2011-06-30 | 2013-01-02 | 联想(北京)有限公司 | Security control method of computer and computer |
CN103312796A (en) * | 2012-05-31 | 2013-09-18 | 微软公司 | Logon interface selection for calculating environment user login |
US20140109203A1 (en) * | 2000-09-05 | 2014-04-17 | Strikeforce Technologies, Inc. | Multichannel device utilizing a centralized out-of-band authentication system (cobas) |
CN103761463A (en) * | 2014-01-13 | 2014-04-30 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104363226A (en) * | 2014-11-12 | 2015-02-18 | 深圳市腾讯计算机系统有限公司 | Method, device and system for logging in operating system |
CN106454422A (en) * | 2016-07-01 | 2017-02-22 | 江苏省公用信息有限公司 | Fingerprint recognition-based IPTV program recommending method and apparatus |
CN106911963A (en) * | 2017-01-04 | 2017-06-30 | 乐视控股(北京)有限公司 | Method for information display and device in a kind of terminal device |
CN107168740A (en) * | 2017-05-15 | 2017-09-15 | 广东虹勤通讯技术有限公司 | A kind of control method of terminal and its operating system |
-
2018
- 2018-10-31 CN CN201811289863.XA patent/CN109409069A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140109203A1 (en) * | 2000-09-05 | 2014-04-17 | Strikeforce Technologies, Inc. | Multichannel device utilizing a centralized out-of-band authentication system (cobas) |
CN102855428A (en) * | 2011-06-30 | 2013-01-02 | 联想(北京)有限公司 | Security control method of computer and computer |
CN103312796A (en) * | 2012-05-31 | 2013-09-18 | 微软公司 | Logon interface selection for calculating environment user login |
CN103761463A (en) * | 2014-01-13 | 2014-04-30 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104363226A (en) * | 2014-11-12 | 2015-02-18 | 深圳市腾讯计算机系统有限公司 | Method, device and system for logging in operating system |
CN106454422A (en) * | 2016-07-01 | 2017-02-22 | 江苏省公用信息有限公司 | Fingerprint recognition-based IPTV program recommending method and apparatus |
CN106911963A (en) * | 2017-01-04 | 2017-06-30 | 乐视控股(北京)有限公司 | Method for information display and device in a kind of terminal device |
CN107168740A (en) * | 2017-05-15 | 2017-09-15 | 广东虹勤通讯技术有限公司 | A kind of control method of terminal and its operating system |
Non-Patent Citations (1)
Title |
---|
王春东: "《信息安全管理》", 30 April 2008 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240143842A1 (en) | System and method for validating authorship of an electronic signature session | |
WO2015135406A1 (en) | Method and system for authenticating biological characteristics of user | |
US7983452B2 (en) | Using a surface based computing device for verification of an identification document | |
US20180189583A1 (en) | Trusted mobile biometric enrollment | |
CN107026836B (en) | Service implementation method and device | |
WO2019090834A1 (en) | Express cabinet pickup method and apparatus based on voiceprint | |
US20160072819A1 (en) | Determination method for identifying user authority based on fingerprints in a mobile terminal and system employing the same | |
WO2018094584A1 (en) | Payment and identity authentication system based on biometric feature recognition | |
CN102622549B (en) | Electronic seal implementation system and method | |
US10644887B2 (en) | Identity validity verification method, apparatus and system | |
WO2008121730B1 (en) | Identity management system for authenticating test examination candidates and /or individuals | |
US20160197917A1 (en) | Method and apparatus for authenticating user by using information processing device | |
CN104378211A (en) | Identity authentication method and device | |
CN107908940B (en) | Fingerprint identification method and terminal equipment | |
CN105721425B (en) | information processing method and electronic equipment | |
JP2019507451A (en) | Security chip, biometric feature identification method, and biometric feature template registration method | |
CN112671806B (en) | User authentication method, user authentication equipment and user authentication system | |
CN111131202A (en) | Identity authentication method and system based on multiple information authentication | |
CN111882425B (en) | Service data processing method, device and server | |
JP5422326B2 (en) | Biometric authentication device | |
CN107992733B (en) | Intelligent terminal and safety unlocking method thereof | |
CN109409069A (en) | Computer security login method and computer security entering device | |
CN108959894A (en) | A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting | |
CN110942407B (en) | Electronic evidence collection device and management system | |
CN105404803B (en) | Operation responding device and operation response method for terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190301 |
|
RJ01 | Rejection of invention patent application after publication |