CN110298946B - Login verification method and system for rail transit comprehensive monitoring system - Google Patents

Login verification method and system for rail transit comprehensive monitoring system Download PDF

Info

Publication number
CN110298946B
CN110298946B CN201910541598.8A CN201910541598A CN110298946B CN 110298946 B CN110298946 B CN 110298946B CN 201910541598 A CN201910541598 A CN 201910541598A CN 110298946 B CN110298946 B CN 110298946B
Authority
CN
China
Prior art keywords
user
card
login
access
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910541598.8A
Other languages
Chinese (zh)
Other versions
CN110298946A (en
Inventor
汪波
周勇
蒋春华
杨志奋
孙阳松
赵瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Siwill Intelligent Co ltd
Original Assignee
Hefei Siwill Intelligent Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Siwill Intelligent Co ltd filed Critical Hefei Siwill Intelligent Co ltd
Priority to CN201910541598.8A priority Critical patent/CN110298946B/en
Publication of CN110298946A publication Critical patent/CN110298946A/en
Application granted granted Critical
Publication of CN110298946B publication Critical patent/CN110298946B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The invention provides a login verification method of a rail transit comprehensive monitoring system, which comprises the following steps: configuring an access card and binding a user with the access card; the configuration information of each access control card comprises a user name, a user password and a card number; and reading the information of the access card, acquiring a user password and a user name bound by the access card, and automatically filling a login interface to finish user login. The login verification method of the rail transit integrated monitoring system provided by the invention provides a login mode of card swiping login, and the system is logged in by swiping an access control card, so that the operation is convenient, the time for logging in the system is reduced, the efficiency is improved, the use by a user is convenient, the user experience is improved, and even if the user forgets a user password, the user can directly swipe the access control card to log in the system.

Description

Login verification method and system for rail transit comprehensive monitoring system
Technical Field
The invention relates to the technical field of traffic monitoring, in particular to a login verification method and system of a rail transit comprehensive monitoring system.
Background
At present, the domestic rail transit construction shows the development of well-jet type, and various major cities are vigorously developing the rail transit construction, and the comprehensive monitoring system becomes indispensable content in the current rail transit construction. With the increasing status of the ISCS (Integrated Supervisory Control System, urban rail transit Integrated monitoring System) in rail transit construction, the ISCS can be more functionally adapted to the needs of operation and management, and can be more conveniently operated and managed in operation, thereby increasing the efficiency and level of operation and management.
At present, the rail transit comprehensive monitoring system realizes login by manually inputting a user name and a user password. Firstly, a user is newly built by an administrator user in a control center and corresponding authority is distributed, then, an operator can use the newly built user to log in the comprehensive monitoring system, a user name and a user password are required to be input during each login, certain time is required to be spent, the login is inconvenient, in addition, if the operator forgets the user password, the user cannot log in the system, the use by the user is inconvenient, and the efficiency of operation management is reduced.
Disclosure of Invention
Based on the technical problems in the background art, the invention provides a login verification method and system for a rail transit comprehensive monitoring system.
The invention provides a login verification method of a rail transit comprehensive monitoring system, which comprises the following steps:
configuring an access card and binding a user with the access card; the configuration information of each access control card comprises a user name, a user password and a card number;
and reading the information of the access card, acquiring a user password and a user name bound by the access card, and automatically filling a login interface to finish user login.
Preferably, the specific mode of configuring the access card and binding the user with the access card is as follows:
configuring an access control card number, and encrypting the access control card number according to a preset card number encryption model to generate a card number ciphertext;
extracting partial cipher text data from the card number cipher text as a dynamic key according to a preset data extraction format;
combining the dynamic secret key with a preset solid secret key to form an encryption secret key;
acquiring a user to be bound of an access card, and acquiring a user password of the user to be bound;
encrypting the user password by the encryption key to generate a password ciphertext;
and using the card number ciphertext as a key value, forming mapping data with the user name of the user to be bound and the password ciphertext and storing the mapping data.
Preferably, the card number encryption model is an irreversible encryption algorithm model;
preferably, the card number encryption model adopts SHA256 algorithm.
Preferably, the specific way of reading the access card information to log in the user is as follows:
reading the number of the access control card, and encrypting the access control card according to the card number encryption model to generate a verification ciphertext;
according to the data extraction format, extracting a new dynamic secret key from the verification secret text, and combining the new dynamic secret key with the solid secret key to form a decoding secret key;
acquiring mapping data corresponding to the verification ciphertext from the stored data, and extracting a user name and a password ciphertext from the mapping data;
decoding the cipher text by the decoding secret key to obtain a user password; and completing automatic login according to the user name and the user password.
Preferably, in the configuration process of the access control cards, one user binds one or more access control cards, and one access control card binds one user.
A login verification system of a rail transit integrated monitoring system comprises: the system comprises a user management module, an entrance guard card binding module, a card swiping verification module, a superior server and an inferior server;
the user management module is used for managing user information;
the entrance guard card binding module is connected with the user management module and used for distributing entrance guard cards to users and binding the entrance guard cards with the users to generate entrance guard card configuration information;
the upper-level server is respectively connected with the user management module and the access control card binding module; the superior server is used for storing user information and access control card configuration information;
the upper-level server is also used for synchronously sharing the user information and the access control card configuration information to the corresponding lower-level server for storage through data synchronization;
the card swiping verification module is connected with the subordinate server, a user of the card swiping verification module reads the entrance guard card information, and acquires a corresponding user name and a corresponding user password from the subordinate server according to the entrance guard card information to complete user login.
Preferably, one user binds one or more access control cards, and each access control card binds one user; the entrance guard card configuration information includes: a user name, a user password, and a card number.
Preferably, the user information includes a user name, a user password, and user authority.
Preferably, the entrance guard card binding module and each card swiping verification module are respectively connected with a card swiping device.
Preferably, the upper-level server is connected with the entrance guard card binding module through the Ethernet, and the card swiping verification module is connected with the lower-level server through the Ethernet.
The login verification method of the rail transit integrated monitoring system provided by the invention provides a login mode of card swiping login, and the system is logged in by swiping an access control card, so that the operation is convenient, the time for logging in the system is reduced, the efficiency is improved, the use by a user is convenient, the user experience is improved, and even if the user forgets a user password, the user can directly swipe the access control card to log in the system.
According to the login verification method of the rail transit integrated monitoring system, when the access control card is configured, double-layer encryption of information is achieved through the card number ciphertext and the password ciphertext. In the configuration process of the access control card and the finally obtained mapping data, the plaintext information of the card number and the user password is invisible, and the data safety is fully ensured.
According to the login verification system of the rail transit comprehensive monitoring system, the login channel which can be quickly logged in and verified by swiping a card is increased in the original manual input login mode by arranging the entrance guard card binding module and the card swiping verification module, and meanwhile, the verification mode of manually inputting a user name and a user password is not influenced, so that the system login is more flexible and convenient.
Drawings
Fig. 1 is a flowchart of a login verification method of a rail transit integrated monitoring system according to the present invention;
FIG. 2 is a flowchart illustrating a specific process of configuring an access card and binding a user with the access card in the method shown in FIG. 1;
FIG. 3 is a flowchart illustrating a specific process of reading information of an access card for user login in the method shown in FIG. 1;
fig. 4 is a schematic structural diagram of a login verification system of the rail transit integrated monitoring system according to the present invention.
Detailed Description
Referring to fig. 1, the login verification method for the rail transit integrated monitoring system provided by the invention comprises the following steps:
configuring an access card and binding a user with the access card; the configuration information of each access control card comprises a user name, a user password and a card number; one user binds one or more access control cards, and one access control card binds one user;
and reading the information of the access card, acquiring a user password and a user name bound by the access card, and automatically filling a login interface to finish user login.
In the embodiment, the entrance guard card is bound with the user, so that the identity of the user can be confirmed through the entrance guard card, and the user login is completed. In addition, in the embodiment, the user password and the user name are bound through the access card, so that the user still logs in through the user and the user password actually when logging in, and only the manually input user password is modified into the access card for identification, and the user name and the user password are automatically input. Therefore, the login authentication method can be used for improving the application range of the login authentication method and reducing the system modification cost by simply modifying the conventional login system and adding the entrance guard card identification function.
In this embodiment, the specific way of configuring the access card and binding the user with the access card includes:
configuring an access control card number, encrypting the access control card number according to a preset card number encryption model to generate a card number ciphertext, and storing the card number ciphertext;
extracting partial cipher text data from the card number cipher text as a dynamic key according to a preset data extraction format;
combining the dynamic secret key with a preset solid secret key to form an encryption secret key;
acquiring a user to be bound of an access card, and acquiring a user password of the user to be bound;
encrypting the user password by the encryption key to generate a password ciphertext;
and using the card number ciphertext as a key value, forming mapping data with the user name of the user to be bound and the password ciphertext and storing the mapping data.
In the embodiment, when the access control card is configured, the information is doubly encrypted through the card number ciphertext and the password ciphertext. In the embodiment, the clear text information of the card number and the user password is invisible in the configuration process of the access control card and the mapping data finally obtained, so that the data security is fully ensured.
In this embodiment, the card number encryption model is an irreversible encryption algorithm model to further ensure data security. Specifically, the card number encryption model may use the SHA256 algorithm.
In this embodiment, the specific way of reading the information of the access card to log in the user is as follows:
reading the number of the access control card, and encrypting the access control card according to the card number encryption model to generate a verification ciphertext;
according to the data extraction format, extracting a new dynamic secret key from the verification secret text, and combining the new dynamic secret key with the solid secret key to form a decoding secret key;
acquiring mapping data corresponding to the verification ciphertext from the stored data, and extracting a user name and a password ciphertext from the mapping data;
decoding the cipher text by the decoding secret key to obtain a user password; and completing automatic login according to the user name and the user password.
In this embodiment, a reversible encryption algorithm, specifically, an AES algorithm, is used to encrypt the user password by using the encryption key, so that the user password can be obtained by decrypting the password ciphertext when logging in through the access card.
Specifically, in the embodiment, when a user logs in through the access control card, the verification ciphertext is obtained according to the card number encryption model, so that the verification ciphertext can be matched with the card number ciphertext; in a similar way, the new dynamic secret key is also ensured to be matched with the dynamic secret key obtained when the access control card information is configured, so that the matching between the decoding secret key and the encryption secret key is further ensured, and the feasibility of obtaining the user password through decoding the decoding secret key is further ensured.
In the embodiment, the information data is encrypted layer by layer when the entrance guard card information is configured, and the data decryption is performed in the reverse order when the entrance guard card information is configured when the entrance guard card logs in, so that the safety and the reliability of the entrance guard card login are ensured, and the information leakage is avoided.
Specifically, in this embodiment, the password ciphertext is decoded by using the decoding key, and after the user password is obtained, when automatic login is completed according to the user name and the user password, it is further limited that when the user name and the user password are automatically filled, both the user name and the user password are encrypted and displayed.
The invention also provides a login verification system of the rail transit comprehensive monitoring system, which comprises the following steps: the system comprises a user management module, an entrance guard card binding module, a card swiping verification module, a superior server and an inferior server.
The user management module is used for managing user information.
The entrance guard card binding module is connected with the user management module and used for distributing entrance guard cards for users and binding the entrance guard cards with the users to generate entrance guard card configuration information.
The superior server is respectively connected with the user management module and the access control card binding module. The superior server is used for storing user information and access control card configuration information.
And the superior server is also used for synchronously sharing the user information and the access control card configuration information to the corresponding inferior server for storage through data synchronization.
The card swiping verification module is connected with the subordinate server, a user of the card swiping verification module reads the entrance guard card information, and acquires a corresponding user name and a corresponding password from the subordinate server according to the entrance guard card information to complete user login.
In this embodiment, the entrance guard card binding module can be connected with a plurality of card swiping verification modules. Specifically, the entrance guard card binding module can be arranged in the control center ISCS, and each station-level ISCS controlled by the control center ISCS is provided with a card swiping verification module. The superior server adopts a control center ISCS server, and the inferior server adopts a station level ISCS server. Therefore, in the embodiment, the access control card is configured for the user in the area through the control center ISCS, the control center ISCS server stores the user information of all users in the area and the configuration information of the access control card, and synchronizes the user information and the configuration information of the access control card to the corresponding station-level ISCS. So, when the user logs in through the entrance guard card, station level ISCS only needs to call user information and entrance guard card configuration information from the local station level ISCS server through the card swiping verification module to carry out login verification, which is beneficial to improving data processing efficiency and ensures data security of each station level ISCS.
Specifically, in the present embodiment, the user management module is also provided in the control center ISCS. Therefore, the control center ISCS can create a user and distribute user authority through the user management module, and the entrance guard card can be configured through the entrance guard card binding module. In this embodiment, one user binds one or more access cards, and each access card binds one user. The entrance guard card configuration information includes: a user name, a user password, and a card number. The user information includes a user name, a user password, and user permissions.
In the embodiment, the entrance guard card is bound with the user name and the password, the station-level ISCS workstation can acquire the card swiping information of the entrance guard card through the card swiping verification module, and then the user name and the password bound by the entrance guard card are acquired from the local station-level ISCS, so that the user name and the password are filled into a station-level ISCS login window, and automatic login is realized.
When the system is specifically implemented, the control center ISCS can also be provided with a card swiping verification module, so that a user can conveniently log in the control center ISCS through an access card. And when logging in the control center ISCS through the access control card, calling the user name and the password bound by the access control card through the control center ISCS server.
In this embodiment, the entrance guard card binding module and each card swiping verification module are respectively connected with a card swiping device, so as to facilitate information configuration and reading of the entrance guard card.
In this embodiment, the entrance guard card binding module is connected to the upper server through the ethernet, and the card swiping verification module is connected to the lower server through the ethernet. Thus, the data transmission efficiency can be further improved.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention are equivalent to or changed within the technical scope of the present invention.

Claims (5)

1. A login verification method of a rail transit integrated monitoring system is characterized by comprising the following steps:
configuring an access card and binding a user with the access card; the configuration information of each access control card comprises a user name, a user password and a card number;
reading the information of the access control card, acquiring a user password and a user name bound by the access control card, and automatically filling a login interface to complete user login;
the concrete mode of configuring the access control card and binding the user with the access control card is as follows:
configuring an access control card number, and encrypting the access control card number according to a preset card number encryption model to generate a card number ciphertext;
extracting partial cipher text data from the card number cipher text as a dynamic key according to a preset data extraction format;
combining the dynamic secret key with a preset solid secret key to form an encryption secret key;
acquiring a user to be bound of an access card, and acquiring a user password of the user to be bound;
encrypting the user password by the encryption key to generate a password ciphertext;
and using the card number ciphertext as a key value, forming mapping data with the user name of the user to be bound and the password ciphertext and storing the mapping data.
2. The login verification method of the rail transit integrated monitoring system according to claim 1, wherein the card number encryption model is an irreversible encryption algorithm model.
3. The login verification method of the rail transit integrated monitoring system as claimed in claim 2, wherein the card number encryption model adopts SHA256 algorithm.
4. The login verification method of the rail transit integrated monitoring system according to claim 1, wherein the specific way of reading the information of the access card to log in the user is as follows:
reading the number of the access control card, and encrypting the access control card according to the card number encryption model to generate a verification ciphertext;
according to the data extraction format, extracting a new dynamic secret key from the verification secret text, and combining the new dynamic secret key with the solid secret key to form a decoding secret key;
acquiring mapping data corresponding to the verification ciphertext from the stored data, and extracting a user name and a password ciphertext from the mapping data;
decoding the cipher text by the decoding secret key to obtain a user password; and completing automatic login according to the user name and the user password.
5. The login verification method of the rail transit integrated monitoring system according to claim 1, wherein one user binds one or more access cards, and one access card binds one user in the access card configuration process.
CN201910541598.8A 2019-06-21 2019-06-21 Login verification method and system for rail transit comprehensive monitoring system Active CN110298946B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910541598.8A CN110298946B (en) 2019-06-21 2019-06-21 Login verification method and system for rail transit comprehensive monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910541598.8A CN110298946B (en) 2019-06-21 2019-06-21 Login verification method and system for rail transit comprehensive monitoring system

Publications (2)

Publication Number Publication Date
CN110298946A CN110298946A (en) 2019-10-01
CN110298946B true CN110298946B (en) 2021-08-17

Family

ID=68028511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910541598.8A Active CN110298946B (en) 2019-06-21 2019-06-21 Login verification method and system for rail transit comprehensive monitoring system

Country Status (1)

Country Link
CN (1) CN110298946B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050052949A (en) * 2003-12-01 2005-06-07 에스케이 텔레콤주식회사 System and method for providing log service with memory card
CN101162996A (en) * 2007-11-16 2008-04-16 李巩令 Multiple dynamic cipher device authorization identifying system and identifying method thereof
CN205186189U (en) * 2015-09-23 2016-04-27 王雅群 Urban rail transit carriage passenger flow early warning system
CN108038392A (en) * 2017-12-29 2018-05-15 靖州鑫兴智能科技有限公司 A kind of smart card encryption method
CN109377603A (en) * 2018-09-27 2019-02-22 利智华(北京)智能科技有限公司 A kind of distribution the whole network access control system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895513A (en) * 2009-05-20 2010-11-24 广州盛华信息技术有限公司 Log-in authentication system for service website and implementation method
CN101902328B (en) * 2009-05-27 2016-08-03 林廷 A kind of method utilizing dynamic password verification user identity

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050052949A (en) * 2003-12-01 2005-06-07 에스케이 텔레콤주식회사 System and method for providing log service with memory card
CN101162996A (en) * 2007-11-16 2008-04-16 李巩令 Multiple dynamic cipher device authorization identifying system and identifying method thereof
CN205186189U (en) * 2015-09-23 2016-04-27 王雅群 Urban rail transit carriage passenger flow early warning system
CN108038392A (en) * 2017-12-29 2018-05-15 靖州鑫兴智能科技有限公司 A kind of smart card encryption method
CN109377603A (en) * 2018-09-27 2019-02-22 利智华(北京)智能科技有限公司 A kind of distribution the whole network access control system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"怎么利用智能卡作为登入电脑系统的方式";百度知道;《https://zhidao.baidu.com/question/2272663756433624908.html》;20190324;第1页 *

Also Published As

Publication number Publication date
CN110298946A (en) 2019-10-01

Similar Documents

Publication Publication Date Title
CN105376216B (en) A kind of remote access method, proxy server and client
CN1818920B (en) Systems and methods for managing multiple keys for file encryption and decryption
EP2442601B1 (en) Method and system for automatically logging in client
CN111787530B (en) Block chain digital identity management method based on SIM card
CN104184743A (en) Three-layer authentication system and method oriented to cloud computing platform
CN106937274A (en) A kind of Profile changing methods and device based on EUICC
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN107833317A (en) Control of bluetooth access control system and method
CN103544746A (en) Electronic access control system of dynamic bar code
CN1939028A (en) Accessing protected data on network storage from multiple devices
CN104852925A (en) Method for leakproof, secure storage and backup of data of mobile smart terminal
CN103023925A (en) NFC (near field communication) personal account information management system and method for implementing same
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
CN103186720B (en) A kind of digital copyright management method, equipment and system
CN103686716A (en) Android access control system for enhancing confidentiality and integrality
CN103458400A (en) Key management method for voice encryption communication system
CN103124266A (en) Mobile terminal, method and system for logging in through mobile terminal and cloud server
CN102196422A (en) Method for preventing leakage of lost file of handheld communication terminal
KR20140046474A (en) Communication method utilizing fingerprint information for authentication
CN106060073B (en) Channel key machinery of consultation
CN104283961A (en) Community management cloud service integration platform and method
CN104270516A (en) Decryption method and mobile terminal
CN109889669A (en) A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm
CN107517217A (en) A kind of multiple-factor wireless key fill system based on fingerprint recognition
CN108347353A (en) Network collocating method, apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant