CN109981618B - Computer network safety login verification system - Google Patents

Computer network safety login verification system Download PDF

Info

Publication number
CN109981618B
CN109981618B CN201910189925.8A CN201910189925A CN109981618B CN 109981618 B CN109981618 B CN 109981618B CN 201910189925 A CN201910189925 A CN 201910189925A CN 109981618 B CN109981618 B CN 109981618B
Authority
CN
China
Prior art keywords
font
server
computer
password
fonts
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910189925.8A
Other languages
Chinese (zh)
Other versions
CN109981618A (en
Inventor
林荣智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Yineng Electronic Technology Co.,Ltd.
Original Assignee
Xian International University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian International University filed Critical Xian International University
Priority to CN201910189925.8A priority Critical patent/CN109981618B/en
Publication of CN109981618A publication Critical patent/CN109981618A/en
Application granted granted Critical
Publication of CN109981618B publication Critical patent/CN109981618B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention provides a computer network security login verification system, which comprises a server and a computer, wherein a terminal data storage module, a font selection module and an encryption module are integrated in the computer, a terminal Ethernet interface is arranged on the computer, a server data storage module is integrated in the server, and a server Ethernet interface is arranged on the server, and the computer network security login verification system comprises the following implementation steps: self-defining a font, importing the font, selecting the font, performing password transposition, encrypting data, transmitting the data, and analyzing and verifying the data. The computer network security login verification system can effectively improve the login security and prevent passwords from being cracked.

Description

Computer network safety login verification system
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a computer network security login verification system.
Background
The user login is a basic function of any application system, the user login security is particularly important, a static password has more potential safety hazards, an attacker has many means to obtain the static password, the management password also has higher cost, the problem can be better solved by using a hardware security product of a dynamic password lock or a USB Key, but the encryption lock cost is brought, under the condition of not increasing the hardware cost, the identity of a login user can be ensured to a certain extent by some designed skills and measures, the current network protocol carries out communication through an HTTP protocol, great potential safety hazards exist, a hacker can carry out packet capture analysis on a network data packet through an SNIFFER tool, so that the transmission of the user name and the password can be transmitted in a non-plaintext mode, and how to design a safer security login authentication system, the invention mainly solves the problem, and provides a computer network security login verification system.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a computer network security login verification system which can effectively improve the login security and prevent passwords from being cracked.
In order to achieve the purpose, the invention is realized by the following technical scheme: a computer network safety login verification system comprises a server and a computer, wherein a terminal data storage module, a font selection module and an encryption module are integrated in the computer, a terminal Ethernet interface is arranged on the computer, a server data storage module is integrated in the server, a server Ethernet interface is arranged on the server, and the computer network safety login verification system comprises the following implementation steps:
the method comprises the following steps: self-defining the font; the method comprises the steps of establishing a plurality of sets of different types of self-defined fonts in a self-defined manner by using software or a program of the self-defined fonts, generating a font file after all the fonts are established, numbering the plurality of sets of the self-defined fonts, and exporting the generated font file;
step two: importing fonts; respectively importing the established multiple sets of custom fonts into a server data storage module and a terminal data storage module of the server and the computer, and carrying out related configuration on the computer;
step three: selecting a font; the font selection module selects a font according to the sum of each number in the real-time date, selects a first set if the sum is a multiple of 2, selects a second set if the sum is a multiple of 3, selects a third set if the sum is a multiple of 4, selects a custom font corresponding to a larger number if the sum is a multiple of two numbers, and stores the user name and the password in a custom font manner and stores the time for font selection calculation after the user inputs the user name and the password;
step four: the password is transposed; the computer saves the password as a user name and the user name as a password;
step five: data encryption; then the computer encrypts the user name, the password and the stored time through an encryption module;
step six: data transmission; after encryption is completed, the computer transmits the encrypted data to the server;
step seven: analyzing and verifying; and after receiving the encrypted data, the server decrypts the encrypted data, determines which set of user-defined font is used according to the time information, restores the password and the user name into a normal font, exchanges the normal font and verifies the font.
As a preferred mode of the present invention, the server ethernet interface is connected to the terminal ethernet interface through a network cable.
As a preferred embodiment of the present invention, the type of the custom font in the step one is set according to the protection level required, and the more types are, the less the possibility of being deciphered is.
As a preferred mode of the present invention, the font selection rule in step three can also be written or replaced as required.
The invention has the beneficial effects that:
1. the computer network security login verification system stores and transmits the password and the user name in a user-defined font mode, performs secondary encryption, can prevent the password from being cracked, and effectively improves the login security.
2. The high-randomness selection mode of the user-defined font of the computer network security login verification system can further improve the security of login verification.
3. The computer network security login authentication system provided by the invention has the advantages that the user name and the password input by the user are exchanged and stored, and even if the password is leaked, a certain protection effect can be achieved.
Drawings
FIG. 1 is a functional block diagram of a computer network secure login authentication system;
FIG. 2 is a schematic flow chart of a computer network security login authentication system;
in the figure: the system comprises a server 1, a computer 2, a terminal data storage module 3, a font selection module 4, an encryption module 5, a terminal Ethernet interface 6, a server data storage module 7 and a server Ethernet interface 8.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further described with the specific embodiments.
Referring to fig. 1 to 2, the present invention provides a technical solution: a computer network security login verification system comprises a server 1 and a computer 2, wherein a terminal data storage module 3, a font selection module 4 and an encryption module 5 are integrated in the computer 2, a terminal Ethernet interface 6 is arranged on the computer 2, a server data storage module 7 is integrated in the server 1, a server Ethernet interface 8 is arranged on the server 1, and the computer network security login verification system comprises the following implementation steps:
the method comprises the following steps: self-defining the font; the method comprises the steps of establishing a plurality of sets of different types of self-defined fonts in a self-defined manner by using software or a program of the self-defined fonts, generating a font file after all the fonts are established, numbering the plurality of sets of the self-defined fonts, and exporting the generated font file;
step two: importing fonts; respectively importing the established multiple sets of custom fonts into a server data storage module 7 and a terminal data storage module 3 of the server 1 and the computer 2, and performing related configuration on the computer 2;
step three: selecting a font; the font selection module 4 selects a font according to the sum of each number in the real-time date, if the sum is a multiple of 2, the first set is selected, if the sum is a multiple of 3, the second set is selected, if the sum is a multiple of 4, the third set is selected, if the sum is a multiple of two numbers, the user-defined font corresponding to the larger number is selected, after the user inputs the user name and the password, the computer 2 stores the user name and the password in a mode of the user-defined font, and stores the time for font selection calculation;
step four: the password is transposed; the computer 2 saves the password as a user name and saves the user name as a password;
step five: data encryption; then the computer 2 encrypts the user name, the password and the stored time through an encryption module 5;
step six: data transmission; after encryption is completed, the computer 2 transmits the encrypted data to the server 1;
step seven: analyzing and verifying; the server 1 decrypts the encrypted data after receiving the encrypted data, determines which set of custom font is used according to the time information, and then restores the password and the user name to the normal font and exchanges the font for verification.
As a preferred mode of the present invention, the service-side ethernet interface 8 is connected to the terminal ethernet interface 6 through a network cable.
As a preferred embodiment of the present invention, the type of the custom font in the step one is set according to the protection level required, and the more types are, the less the possibility of being deciphered is.
As a preferred mode of the present invention, the font selection rule in step three can also be written or replaced as required.
While there have been shown and described what are at present considered the fundamental principles and essential features of the invention and its advantages, it will be apparent to those skilled in the art that the invention is not limited to the details of the foregoing exemplary embodiments, but is capable of other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (4)

1. A computer network security login verification system comprises a server and a computer, and is characterized in that a terminal data storage module, a font selection module and an encryption module are integrated in the computer, a terminal Ethernet interface is arranged on the computer, a server data storage module is integrated in the server, a server Ethernet interface is arranged on the server, and the computer network security login verification system comprises the following implementation steps:
the method comprises the following steps: self-defining the font; the method comprises the steps of establishing a plurality of sets of different types of self-defined fonts in a self-defined manner by using software or a program of the self-defined fonts, generating a font file after all the fonts are established, numbering the plurality of sets of the self-defined fonts, and exporting the generated font file;
step two: importing fonts; respectively importing the established multiple sets of custom fonts into a server data storage module and a terminal data storage module of the server and the computer, and carrying out related configuration on the computer;
step three: selecting a font; the font selection module selects a font according to the sum of each number in the real-time date, selects a first set if the sum is a multiple of 2, selects a second set if the sum is a multiple of 3, selects a third set if the sum is a multiple of 4, selects a custom font corresponding to a larger number if the sum is a multiple of two numbers, and stores the user name and the password in a custom font manner and stores the real-time date for font selection calculation after the user inputs the user name and the password;
step four: the password is transposed; the computer saves the password as a user name and the user name as a password;
step five: data encryption; then the computer encrypts the user name, the password and the stored time through an encryption module;
step six: data transmission; after encryption is completed, the computer transmits the encrypted data to the server;
step seven: analyzing and verifying; and after receiving the encrypted data, the server decrypts the encrypted data, determines which set of user-defined font is used according to the time information, restores the password and the user name into a normal font, exchanges the normal font and verifies the font.
2. The system of claim 1, wherein the server ethernet interface is connected to the terminal ethernet interface via a network cable.
3. The system of claim 1, wherein the type of the custom font in the first step is set according to the protection level, and the more types are decoded the less likely.
4. The system of claim 1, wherein the rules for font selection in step three can also be written or replaced as required.
CN201910189925.8A 2019-03-13 2019-03-13 Computer network safety login verification system Active CN109981618B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910189925.8A CN109981618B (en) 2019-03-13 2019-03-13 Computer network safety login verification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910189925.8A CN109981618B (en) 2019-03-13 2019-03-13 Computer network safety login verification system

Publications (2)

Publication Number Publication Date
CN109981618A CN109981618A (en) 2019-07-05
CN109981618B true CN109981618B (en) 2021-08-17

Family

ID=67078691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910189925.8A Active CN109981618B (en) 2019-03-13 2019-03-13 Computer network safety login verification system

Country Status (1)

Country Link
CN (1) CN109981618B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865962B (en) * 2020-07-16 2022-04-08 国网山东省电力公司青岛供电公司 WiFi (Wireless Fidelity) secure login authentication system and method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107026814A (en) * 2016-01-29 2017-08-08 中国移动通信集团陕西有限公司 A kind of login validation method and device through point attendant application
CN107395629A (en) * 2017-08-23 2017-11-24 周口师范学院 A kind of computer network security registration and verification method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7930447B2 (en) * 2008-10-17 2011-04-19 International Business Machines Corporation Listing windows of active applications of computing devices sharing a keyboard based upon requests for attention
US9027106B2 (en) * 2013-08-14 2015-05-05 Bank Of America Corporation Organizational attribution of user devices
US9736143B2 (en) * 2013-10-21 2017-08-15 Adobe Systems Incorporated Customized log-in experience
CN103955998A (en) * 2014-04-27 2014-07-30 汪风珍 Reserved verification information for bankcard
CN105207782B (en) * 2015-11-18 2018-09-25 上海爱数信息技术股份有限公司 A kind of auth method based on restful frameworks
CN109462620A (en) * 2019-01-07 2019-03-12 山东浪潮通软信息科技有限公司 One kind realizing password method for retrieving and system based on a variety of safety verification modes

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107026814A (en) * 2016-01-29 2017-08-08 中国移动通信集团陕西有限公司 A kind of login validation method and device through point attendant application
CN107395629A (en) * 2017-08-23 2017-11-24 周口师范学院 A kind of computer network security registration and verification method

Also Published As

Publication number Publication date
CN109981618A (en) 2019-07-05

Similar Documents

Publication Publication Date Title
CN109274503A (en) Distributed collaboration endorsement method and distributed collaboration signature apparatus, soft shield system
CN107295011B (en) Webpage security authentication method and device
CN105307165B (en) Communication means, server-side and client based on mobile application
CN107359998B (en) A kind of foundation and operating method of portable intelligent password management system
CN101789865A (en) Dedicated server used for encryption and encryption method
CN113067823B (en) Mail user identity authentication and key distribution method, system, device and medium
CN102036236A (en) Method and device for authenticating mobile terminal
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN107277059A (en) A kind of one-time password identity identifying method and system based on Quick Response Code
CN106506479B (en) Method, system and the client of cipher authentication, server and smart machine
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN110535641A (en) Key management method and device, computer equipment and storage medium
CN103327034A (en) Safe login method, system and device
US10397217B2 (en) Authentication methods and authentication apparatuses
CN112865965B (en) Train service data processing method and system based on quantum key
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN107707562A (en) A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm
CN110380859A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system
CN111224958A (en) Data transmission method and system
CN107733936A (en) A kind of encryption method of mobile data
CN114139176A (en) Industrial internet core data protection method and system based on state secret
CN114331456A (en) Communication method, device, system and readable storage medium
CN109981618B (en) Computer network safety login verification system
CN116866029B (en) Random number encryption data transmission method, device, computer equipment and storage medium
CN106452754B (en) Multi-user online dynamic encryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230111

Address after: No. 13217, Floor 32, Unit 1, Building 1, Jinye Times, No. 32, Jinye Road, High-tech Zone, Xi'an City, Shaanxi Province, 710000

Patentee after: Xi'an Yineng Electronic Technology Co.,Ltd.

Address before: No.18, Yudou Road, Yanta District, Xi'an City, Shaanxi Province

Patentee before: XI'AN INTERNATIONAL University