CN109981618B - Computer network safety login verification system - Google Patents
Computer network safety login verification system Download PDFInfo
- Publication number
- CN109981618B CN109981618B CN201910189925.8A CN201910189925A CN109981618B CN 109981618 B CN109981618 B CN 109981618B CN 201910189925 A CN201910189925 A CN 201910189925A CN 109981618 B CN109981618 B CN 109981618B
- Authority
- CN
- China
- Prior art keywords
- font
- server
- computer
- password
- fonts
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention provides a computer network security login verification system, which comprises a server and a computer, wherein a terminal data storage module, a font selection module and an encryption module are integrated in the computer, a terminal Ethernet interface is arranged on the computer, a server data storage module is integrated in the server, and a server Ethernet interface is arranged on the server, and the computer network security login verification system comprises the following implementation steps: self-defining a font, importing the font, selecting the font, performing password transposition, encrypting data, transmitting the data, and analyzing and verifying the data. The computer network security login verification system can effectively improve the login security and prevent passwords from being cracked.
Description
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a computer network security login verification system.
Background
The user login is a basic function of any application system, the user login security is particularly important, a static password has more potential safety hazards, an attacker has many means to obtain the static password, the management password also has higher cost, the problem can be better solved by using a hardware security product of a dynamic password lock or a USB Key, but the encryption lock cost is brought, under the condition of not increasing the hardware cost, the identity of a login user can be ensured to a certain extent by some designed skills and measures, the current network protocol carries out communication through an HTTP protocol, great potential safety hazards exist, a hacker can carry out packet capture analysis on a network data packet through an SNIFFER tool, so that the transmission of the user name and the password can be transmitted in a non-plaintext mode, and how to design a safer security login authentication system, the invention mainly solves the problem, and provides a computer network security login verification system.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a computer network security login verification system which can effectively improve the login security and prevent passwords from being cracked.
In order to achieve the purpose, the invention is realized by the following technical scheme: a computer network safety login verification system comprises a server and a computer, wherein a terminal data storage module, a font selection module and an encryption module are integrated in the computer, a terminal Ethernet interface is arranged on the computer, a server data storage module is integrated in the server, a server Ethernet interface is arranged on the server, and the computer network safety login verification system comprises the following implementation steps:
the method comprises the following steps: self-defining the font; the method comprises the steps of establishing a plurality of sets of different types of self-defined fonts in a self-defined manner by using software or a program of the self-defined fonts, generating a font file after all the fonts are established, numbering the plurality of sets of the self-defined fonts, and exporting the generated font file;
step two: importing fonts; respectively importing the established multiple sets of custom fonts into a server data storage module and a terminal data storage module of the server and the computer, and carrying out related configuration on the computer;
step three: selecting a font; the font selection module selects a font according to the sum of each number in the real-time date, selects a first set if the sum is a multiple of 2, selects a second set if the sum is a multiple of 3, selects a third set if the sum is a multiple of 4, selects a custom font corresponding to a larger number if the sum is a multiple of two numbers, and stores the user name and the password in a custom font manner and stores the time for font selection calculation after the user inputs the user name and the password;
step four: the password is transposed; the computer saves the password as a user name and the user name as a password;
step five: data encryption; then the computer encrypts the user name, the password and the stored time through an encryption module;
step six: data transmission; after encryption is completed, the computer transmits the encrypted data to the server;
step seven: analyzing and verifying; and after receiving the encrypted data, the server decrypts the encrypted data, determines which set of user-defined font is used according to the time information, restores the password and the user name into a normal font, exchanges the normal font and verifies the font.
As a preferred mode of the present invention, the server ethernet interface is connected to the terminal ethernet interface through a network cable.
As a preferred embodiment of the present invention, the type of the custom font in the step one is set according to the protection level required, and the more types are, the less the possibility of being deciphered is.
As a preferred mode of the present invention, the font selection rule in step three can also be written or replaced as required.
The invention has the beneficial effects that:
1. the computer network security login verification system stores and transmits the password and the user name in a user-defined font mode, performs secondary encryption, can prevent the password from being cracked, and effectively improves the login security.
2. The high-randomness selection mode of the user-defined font of the computer network security login verification system can further improve the security of login verification.
3. The computer network security login authentication system provided by the invention has the advantages that the user name and the password input by the user are exchanged and stored, and even if the password is leaked, a certain protection effect can be achieved.
Drawings
FIG. 1 is a functional block diagram of a computer network secure login authentication system;
FIG. 2 is a schematic flow chart of a computer network security login authentication system;
in the figure: the system comprises a server 1, a computer 2, a terminal data storage module 3, a font selection module 4, an encryption module 5, a terminal Ethernet interface 6, a server data storage module 7 and a server Ethernet interface 8.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further described with the specific embodiments.
Referring to fig. 1 to 2, the present invention provides a technical solution: a computer network security login verification system comprises a server 1 and a computer 2, wherein a terminal data storage module 3, a font selection module 4 and an encryption module 5 are integrated in the computer 2, a terminal Ethernet interface 6 is arranged on the computer 2, a server data storage module 7 is integrated in the server 1, a server Ethernet interface 8 is arranged on the server 1, and the computer network security login verification system comprises the following implementation steps:
the method comprises the following steps: self-defining the font; the method comprises the steps of establishing a plurality of sets of different types of self-defined fonts in a self-defined manner by using software or a program of the self-defined fonts, generating a font file after all the fonts are established, numbering the plurality of sets of the self-defined fonts, and exporting the generated font file;
step two: importing fonts; respectively importing the established multiple sets of custom fonts into a server data storage module 7 and a terminal data storage module 3 of the server 1 and the computer 2, and performing related configuration on the computer 2;
step three: selecting a font; the font selection module 4 selects a font according to the sum of each number in the real-time date, if the sum is a multiple of 2, the first set is selected, if the sum is a multiple of 3, the second set is selected, if the sum is a multiple of 4, the third set is selected, if the sum is a multiple of two numbers, the user-defined font corresponding to the larger number is selected, after the user inputs the user name and the password, the computer 2 stores the user name and the password in a mode of the user-defined font, and stores the time for font selection calculation;
step four: the password is transposed; the computer 2 saves the password as a user name and saves the user name as a password;
step five: data encryption; then the computer 2 encrypts the user name, the password and the stored time through an encryption module 5;
step six: data transmission; after encryption is completed, the computer 2 transmits the encrypted data to the server 1;
step seven: analyzing and verifying; the server 1 decrypts the encrypted data after receiving the encrypted data, determines which set of custom font is used according to the time information, and then restores the password and the user name to the normal font and exchanges the font for verification.
As a preferred mode of the present invention, the service-side ethernet interface 8 is connected to the terminal ethernet interface 6 through a network cable.
As a preferred embodiment of the present invention, the type of the custom font in the step one is set according to the protection level required, and the more types are, the less the possibility of being deciphered is.
As a preferred mode of the present invention, the font selection rule in step three can also be written or replaced as required.
While there have been shown and described what are at present considered the fundamental principles and essential features of the invention and its advantages, it will be apparent to those skilled in the art that the invention is not limited to the details of the foregoing exemplary embodiments, but is capable of other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.
Claims (4)
1. A computer network security login verification system comprises a server and a computer, and is characterized in that a terminal data storage module, a font selection module and an encryption module are integrated in the computer, a terminal Ethernet interface is arranged on the computer, a server data storage module is integrated in the server, a server Ethernet interface is arranged on the server, and the computer network security login verification system comprises the following implementation steps:
the method comprises the following steps: self-defining the font; the method comprises the steps of establishing a plurality of sets of different types of self-defined fonts in a self-defined manner by using software or a program of the self-defined fonts, generating a font file after all the fonts are established, numbering the plurality of sets of the self-defined fonts, and exporting the generated font file;
step two: importing fonts; respectively importing the established multiple sets of custom fonts into a server data storage module and a terminal data storage module of the server and the computer, and carrying out related configuration on the computer;
step three: selecting a font; the font selection module selects a font according to the sum of each number in the real-time date, selects a first set if the sum is a multiple of 2, selects a second set if the sum is a multiple of 3, selects a third set if the sum is a multiple of 4, selects a custom font corresponding to a larger number if the sum is a multiple of two numbers, and stores the user name and the password in a custom font manner and stores the real-time date for font selection calculation after the user inputs the user name and the password;
step four: the password is transposed; the computer saves the password as a user name and the user name as a password;
step five: data encryption; then the computer encrypts the user name, the password and the stored time through an encryption module;
step six: data transmission; after encryption is completed, the computer transmits the encrypted data to the server;
step seven: analyzing and verifying; and after receiving the encrypted data, the server decrypts the encrypted data, determines which set of user-defined font is used according to the time information, restores the password and the user name into a normal font, exchanges the normal font and verifies the font.
2. The system of claim 1, wherein the server ethernet interface is connected to the terminal ethernet interface via a network cable.
3. The system of claim 1, wherein the type of the custom font in the first step is set according to the protection level, and the more types are decoded the less likely.
4. The system of claim 1, wherein the rules for font selection in step three can also be written or replaced as required.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910189925.8A CN109981618B (en) | 2019-03-13 | 2019-03-13 | Computer network safety login verification system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910189925.8A CN109981618B (en) | 2019-03-13 | 2019-03-13 | Computer network safety login verification system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109981618A CN109981618A (en) | 2019-07-05 |
CN109981618B true CN109981618B (en) | 2021-08-17 |
Family
ID=67078691
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910189925.8A Active CN109981618B (en) | 2019-03-13 | 2019-03-13 | Computer network safety login verification system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109981618B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111865962B (en) * | 2020-07-16 | 2022-04-08 | 国网山东省电力公司青岛供电公司 | WiFi (Wireless Fidelity) secure login authentication system and method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107026814A (en) * | 2016-01-29 | 2017-08-08 | 中国移动通信集团陕西有限公司 | A kind of login validation method and device through point attendant application |
CN107395629A (en) * | 2017-08-23 | 2017-11-24 | 周口师范学院 | A kind of computer network security registration and verification method |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7930447B2 (en) * | 2008-10-17 | 2011-04-19 | International Business Machines Corporation | Listing windows of active applications of computing devices sharing a keyboard based upon requests for attention |
US9027106B2 (en) * | 2013-08-14 | 2015-05-05 | Bank Of America Corporation | Organizational attribution of user devices |
US9736143B2 (en) * | 2013-10-21 | 2017-08-15 | Adobe Systems Incorporated | Customized log-in experience |
CN103955998A (en) * | 2014-04-27 | 2014-07-30 | 汪风珍 | Reserved verification information for bankcard |
CN105207782B (en) * | 2015-11-18 | 2018-09-25 | 上海爱数信息技术股份有限公司 | A kind of auth method based on restful frameworks |
CN109462620A (en) * | 2019-01-07 | 2019-03-12 | 山东浪潮通软信息科技有限公司 | One kind realizing password method for retrieving and system based on a variety of safety verification modes |
-
2019
- 2019-03-13 CN CN201910189925.8A patent/CN109981618B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107026814A (en) * | 2016-01-29 | 2017-08-08 | 中国移动通信集团陕西有限公司 | A kind of login validation method and device through point attendant application |
CN107395629A (en) * | 2017-08-23 | 2017-11-24 | 周口师范学院 | A kind of computer network security registration and verification method |
Also Published As
Publication number | Publication date |
---|---|
CN109981618A (en) | 2019-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274503A (en) | Distributed collaboration endorsement method and distributed collaboration signature apparatus, soft shield system | |
CN107295011B (en) | Webpage security authentication method and device | |
CN105307165B (en) | Communication means, server-side and client based on mobile application | |
CN107359998B (en) | A kind of foundation and operating method of portable intelligent password management system | |
CN101789865A (en) | Dedicated server used for encryption and encryption method | |
CN113067823B (en) | Mail user identity authentication and key distribution method, system, device and medium | |
CN102036236A (en) | Method and device for authenticating mobile terminal | |
CN108199847B (en) | Digital security processing method, computer device, and storage medium | |
CN107277059A (en) | A kind of one-time password identity identifying method and system based on Quick Response Code | |
CN106506479B (en) | Method, system and the client of cipher authentication, server and smart machine | |
CN108809936B (en) | Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof | |
CN110535641A (en) | Key management method and device, computer equipment and storage medium | |
CN103327034A (en) | Safe login method, system and device | |
US10397217B2 (en) | Authentication methods and authentication apparatuses | |
CN112865965B (en) | Train service data processing method and system based on quantum key | |
CN117240625B (en) | Tamper-resistant data processing method and device and electronic equipment | |
CN107707562A (en) | A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm | |
CN110380859A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system | |
CN111224958A (en) | Data transmission method and system | |
CN107733936A (en) | A kind of encryption method of mobile data | |
CN114139176A (en) | Industrial internet core data protection method and system based on state secret | |
CN114331456A (en) | Communication method, device, system and readable storage medium | |
CN109981618B (en) | Computer network safety login verification system | |
CN116866029B (en) | Random number encryption data transmission method, device, computer equipment and storage medium | |
CN106452754B (en) | Multi-user online dynamic encryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230111 Address after: No. 13217, Floor 32, Unit 1, Building 1, Jinye Times, No. 32, Jinye Road, High-tech Zone, Xi'an City, Shaanxi Province, 710000 Patentee after: Xi'an Yineng Electronic Technology Co.,Ltd. Address before: No.18, Yudou Road, Yanta District, Xi'an City, Shaanxi Province Patentee before: XI'AN INTERNATIONAL University |