CN113179246A - Working method for carrying out government affair data fusion safety through four-in-one network - Google Patents
Working method for carrying out government affair data fusion safety through four-in-one network Download PDFInfo
- Publication number
- CN113179246A CN113179246A CN202110298070.XA CN202110298070A CN113179246A CN 113179246 A CN113179246 A CN 113179246A CN 202110298070 A CN202110298070 A CN 202110298070A CN 113179246 A CN113179246 A CN 113179246A
- Authority
- CN
- China
- Prior art keywords
- character
- small
- user name
- government affair
- login user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Human Computer Interaction (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a working method for carrying out government affair data fusion safety through four-in-one network, which comprises the following steps: and S1, logging in the government affair data network by using the intelligent handheld mobile terminal. The government affair cloud platform can be safely logged in under the protection condition.
Description
Technical Field
The invention relates to the technical field of four-in-one networks, in particular to a working method for government affair data fusion safety through four-in-one networks.
Background
The four-in-one can enter into the other three websites after logging in through one website. Patent application No. 2020110515724 entitled "a device login method, apparatus, and system," discloses sending a token request to a security device, where the token request carries a user name and authentication information for logging in to the security device; receiving a login token sent by the security device, wherein the login token is sent by the security device after the security device successfully verifies the security cloud platform based on the user name and verification information; and sending a login request to the security equipment, wherein the login request carries the login token, so that the security equipment can log in a management interface of the security equipment by using the user name and a login password corresponding to the user name after the received login token is verified by the security equipment. Therefore, even if the security device modifies the login password, the cloud security platform can accurately log in the management interface.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a working method for performing government affair data fusion safety through four-in-one network.
In order to achieve the above object, the present invention provides a working method for government affair data fusion security through four-in-one network, comprising the following steps:
s1, logging in the four-in-one government affair data network by using the intelligent handheld mobile terminal; .
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, inputting a government affair login user name and a government affair login password by using the intelligent handheld mobile terminal;
and S12, processing the government affair login user name and the government affair login password, and sending the processed government affair login user name and the government affair login password to the cloud platform of the government affairs.
In a preferred embodiment of the present invention, the method of inputting a government affairs login user name in step S11 includes the steps of:
s111, judging whether the user name triggering command of government affair login is received:
if receiving the trigger command of inputting the government affair login user name, executing step S112;
if the input government affair login user name triggering command is not received, returning to the step S111;
s112, displaying a government affair login user name character input display frame on the intelligent handheld mobile terminal, wherein the government affair login user name character input display frame comprises government affair login user name character keys, all government affair login user name character keys are all characters input by the government affair login user name characters, and characters displayed on each government affair login user name character key are different and comprise one or any combination of numbers, capital letters and lowercase letters; the numbers comprise one or any combination of 0, 1, 2, 3, … … and 9, the capital letters comprise one or any combination of A, B, C, D, … … and Z, and the small letters comprise one or any combination of a, b, c, d, … … and Z; let α be 2;
s113, counting the number of all government affair login user name character keys in a display frame for inputting the government affair login user name character and recording as beta after receiving the input of the 1 st government affair login user name character; the 1 st key of the government affair login user name character, the 2 nd key of the government affair login user name character, the 3 rd key of the government affair login user name character, … … and the beta key of the government affair login user name character are respectively arranged;
s114, obtaining characters displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, … … and a beta key of the government affair login user name character, and carrying out the following operations:
εδ,2=MD2(χδ)
=MD1(MD1(χδ)),
=MD(MD(χδ))
wherein, MD2() A hashing algorithm denoted as performing MD5 2 times;
MD1() A hashing algorithm representing performing MD 51 time;
MD () represents a hashing algorithm that performs MD 5;
χδthe character which is displayed on the delta th key of the character of the government affair login user name is shown; δ — 1, 2, 3, … …, β;
εδ,2character x displayed on delta key of character of user name for government affairs loginδPerforming 2 times of operation to obtain an operation value;
s115, all the calculation values are changed from small to large or from large to largeSmall arrangement to obtain χ1′、χ2′、χ3′、……、χβ'; wherein, χ1' arranging the operation value at the 1 st bit from small to large or from large to small for all operation values, χ2' arranging the operation value at the 2 nd bit from small to large or from large to small for all operation values, χ3' the operation value at the 3 rd bit is arranged from small to large or from large to small for all the operation values, … …, χβ' arranging the operation values at the beta-th bit from small to large or from large to small for all the operation values;
s116, arranging all the operation values in the 1 st bit of the operation values according to the descending or descending order1The corresponding character is displayed on the No. 1 key of the government affair registration user name character, and all the operation values are arranged in the No. 2 operation value x from small to large or from large to small2The corresponding character is displayed on the 2 nd key of the government affair login user name character, and all the calculated values are arranged in the 3 rd bit calculated value x from small to large or from large to small3' the corresponding character is displayed on the No. 3 key of the government affairs login user name character, … …, all the calculated values are arranged according to the calculated value x which is at the beta-th position from small to large or from large to smallβ' the corresponding character is displayed on the beta-th key of the government affair login user name character;
s117, upon receiving the α -th government affair login user name character input, performs the following operations:
wherein, MDα+1() A hashing algorithm denoted α +1 times MD 5;
MD1() A hashing algorithm representing performing MD 51 time;
MDα() A hashing algorithm representing performing MD5 a times;
MDα-1() A hashing algorithm denoted alpha-1 times MD 5;
MDα-2() A hashing algorithm denoted alpha-2 times MD 5;
MD () represents a hashing algorithm that performs MD 5;
χδa character indicating that displayed on the δ -th key of the government affairs login user name character in step S114; δ — 1, 2, 3, … …, β;
εδ,α+1character x displayed on delta key of character of user name for government affairs loginδCarrying out alpha +1 times of operation to obtain a result value;
s118, arranging all the operation values from small to large or from large to small to obtain the χ1″、χ2″、χ3″、……、χβ"; wherein, χ1"is the result value in bit 1 arranged from small to large or from large to small for all result values, χ2"arranging the result values in the 2 nd bit from small to large or from large to small for all the result values, χ3"is the result value at the 3 rd bit arranged from small to large or from large to small for all the result values, … …, χβ"all result values are arranged from small to large or from large to small in the beta position;
s119, arranging the result values X at the 1 st bit from small to large or from large to small1The corresponding character is displayed on the 1 st key of the government affair registration user name character, and all result values are arranged in the 2 nd order of the result value χ from small to large or from large to small2The corresponding character is displayed on the 2 nd key of the government affair login user name character, and all result values are arranged in the 3 rd bit result value x from small to large or from large to small3"the corresponding character is displayed on the No. 3 button of the government affairs login user name character, … …, all the result values are arranged in the beta-th order of the result value χ from small to large or from large to smallβ"the corresponding character is displayed inThe government affairs login user name character beta key; α +1, return to step S117; until the government affair login user name character is input.
In a preferred embodiment of the present invention, step S110 is included before step S111, and step S110 includes steps S1101 to S1104;
s1101, arranging all characters input by the characters of the government affair login user name, sequentially numbering the characters, and marking the characters as A1、A2、A3、……、Aβ;A1A 1 st digit character indicating the arrangement of all characters input from the characters of the government affairs registration user name, A2A 2 nd digit character indicating the arrangement of all characters input from the characters of the government affairs registration user name, A3The 3 rd digit character representing the arrangement of all characters entered as the characters of the government registration user name, … …, AβA beta-bit character representing that all characters input by the characters of the government affair login user name are arranged;
s1102, performing the following operations on the arranged characters:
wherein, MD1() A hashing algorithm representing performing MD 51 time;
MD () represents a hashing algorithm that performs MD 5;
Aβ′a beta' -th digit character representing a result of arranging all characters input from the characters of the government affair login user name; β' ═ 1, 2, 3, … …, β;
a' th bit character A representing the character of the government affairs login user name after all the characters are arrangedβ′Performing 1 operation to obtain a display value;
s1103, arranging all the display values from small to large or from large to small to obtain χ1″′、χ2″′、χ3″′、……、χβ"; wherein, χ1"' is the display value of 1 st digit, χ2"' is the display value of 2 nd bit, χ, arranged from small to large or from large to small for all display values3"' is the display value at the 3 rd position in which all display values are arranged from small to large or from large to small, … …, χβ"' is the display value of the beta-th bit arranged from small to large or from large to small of all the display values;
s1104, arranging all display values from small to large or from large to small to display value χ in 1 st bit1The character corresponding to' is displayed on the No. 1 key of the government affairs login user name character, all display values are arranged in the No. 2 display value χ from small to large or from large to small2The character corresponding to' is displayed on the 2 nd key of the government affairs login user name character, and all display values are arranged in the 3 rd bit display value χ from small to large or from large to small3The character corresponding to' is displayed on the No. 3 key of the government affairs login user name character, … …, all the display values are arranged in the beta-th display value x from small to large or from large to smallβThe corresponding character of ""' is displayed on the beta-th key of the government affairs login user name character.
In a preferred embodiment of the present invention, in steps S115 and/or S118 and/or S1103, all the calculated values thereof are arranged from small to large.
In a preferred embodiment of the present invention, the actual input character is replaced with another identical or different character in the government entry username entry box, the other identical or different character being all characters not including the government entry username character entry.
In conclusion, due to the adoption of the technical scheme, the government affair cloud platform can be safely logged in under the protection condition.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
FIG. 2 is a schematic representation of the present invention.
FIG. 3 is a schematic representation of the present invention.
FIG. 4 is a schematic representation of the present invention.
FIG. 5 is a schematic representation of the present invention.
FIG. 6 is a schematic representation of the present invention.
FIG. 7 is a schematic representation of the present invention.
FIG. 8 is a schematic representation of the present invention.
FIG. 9 is a schematic representation of the present invention.
FIG. 10 is a schematic representation of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention discloses a working method for carrying out government affair data fusion safety through four-in-one network, which comprises the following steps as shown in figure 1:
and S1, logging in the government affair data network by using the intelligent handheld mobile terminal.
The method further comprises a step S2, after the verification is passed, the file in the government affair cloud platform is configured.
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, inputting a government affair login user name and a government affair login password by using the intelligent handheld mobile terminal;
and S12, processing the government affair login user name and the government affair login password, and sending the processed government affair login user name and the government affair login password to the cloud platform of the government affairs.
In a preferred embodiment of the present invention, the method of inputting a government affairs login user name in step S11 includes the steps of:
s111, judging whether the user name triggering command of government affair login is received:
if receiving the trigger command of inputting the government affair login user name, executing step S112;
if the input government affair login user name triggering command is not received, returning to the step S111;
s112, displaying a government affair login user name character input display frame on the intelligent handheld mobile terminal, wherein the government affair login user name character input display frame comprises government affair login user name character keys, all government affair login user name character keys are all characters input by the government affair login user name characters, and characters displayed on each government affair login user name character key are different and comprise one or any combination of numbers, capital letters and lowercase letters; the numbers comprise one or any combination of 0, 1, 2, 3, … … and 9, the capital letters comprise one or any combination of A, B, C, D, … … and Z, and the small letters comprise one or any combination of a, b, c, d, … … and Z; let α be 2;
s113, if a character is displayed on a key after receiving the character input of the 1 st government affair login user name, if the key is triggered, the character displayed by the key is received, counting the number of all the government affair login user name character keys in the character input display frame of the government affair login user name, and recording the number as beta; the first key is a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, … … and a beta key of the government affair login user name character;
s114, obtaining characters displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, … … and a beta key of the government affair login user name character, and carrying out the following operations:
εδ,2=MD2(χδ)
=MD1(MD1(χδ)),
=MD(MD(χδ))
wherein, MD2() A hashing algorithm denoted as performing MD5 2 times;
MD1() A hashing algorithm representing performing MD 51 time;
MD () represents a hashing algorithm that performs MD 5;
χδthe character which is displayed on the delta th key of the character of the government affair login user name is shown; δ — 1, 2, 3, … …, β;
εδ,2character x displayed on delta key of character of user name for government affairs loginδPerforming 2 times of operation to obtain an operation value;
s115, arranging all the operation values from small to large or from large to small to obtain the χ1′、χ2′、χ3′、……、χβ'; wherein, χ1' arranging the operation value at the 1 st bit from small to large or from large to small for all operation values, χ2' arranging the operation value at the 2 nd bit from small to large or from large to small for all operation values, χ3' the operation value at the 3 rd bit is arranged from small to large or from large to small for all the operation values, … …, χβ' arranging the operation values at the beta-th bit from small to large or from large to small for all the operation values;
s116, arranging all the operation values in the 1 st bit of the operation values according to the descending or descending order1The corresponding character is displayed on the No. 1 key of the government affair registration user name character, and all the operation values are arranged in the No. 2 operation value x from small to large or from large to small2The corresponding character is displayed on the 2 nd key of the government affair login user name character, and all the calculated values are arranged in the 3 rd bit calculated value x from small to large or from large to small3The' corresponding character is displayed on the government login username character No. 3 button, … …,arranging all the operation values in the beta-th bit according to the sequence from small to large or from large to smallβ' the corresponding character is displayed on the beta-th key of the government affair login user name character; from small to large as χ1′、χ2′、 χ3′、……、χβ-2′、χβ-1′、χβ' in turn equals εβ,2、εβ-1,2、εβ-2,2、……、ε3,2、ε2,2、ε1,2The characters are arranged from small to big in sequenceβDisplayed on the beta-th key, character χβ-1Displayed on the beta-1 th key, character chiβ-2Is displayed on the beta-2 key, … …, character x3Displayed on the 3 rd key, character x2Displayed on the 2 nd key, character χ1Displayed on the 1 st key.
S117 displaying a certain character on the key, receiving the character displayed on the key if the key is triggered, and performing the following operations after receiving the alpha government affair login user name character input:
wherein, MDα+1() A hashing algorithm denoted α +1 times MD 5;
MD1() A hashing algorithm representing performing MD 51 time;
MDα() A hashing algorithm representing performing MD5 a times;
MDα-1() A hashing algorithm denoted alpha-1 times MD 5;
MDα-2() A hashing algorithm denoted alpha-2 times MD 5;
MD () represents a hashing algorithm that performs MD 5;
χδindicates the name of the government affairs login user in step S114Characters displayed on the qwerty key; δ — 1, 2, 3, … …, β;
εδ,α+1character x displayed on delta key of character of user name for government affairs loginδCarrying out alpha +1 times of operation to obtain a result value;
s118, arranging all the operation values from small to large or from large to small to obtain the χ1″、χ2″、χ3″、……、χβ"; wherein, χ1"is the result value in bit 1 arranged from small to large or from large to small for all result values, χ2"arranging the result values in the 2 nd bit from small to large or from large to small for all the result values, χ3"is the result value at the 3 rd bit arranged from small to large or from large to small for all the result values, … …, χβ"all result values are arranged from small to large or from large to small in the beta position;
s119, arranging the result values X at the 1 st bit from small to large or from large to small1The corresponding character is displayed on the 1 st key of the government affair registration user name character, and all result values are arranged in the 2 nd order of the result value χ from small to large or from large to small2The corresponding character is displayed on the 2 nd key of the government affair login user name character, and all result values are arranged in the 3 rd bit result value x from small to large or from large to small3"the corresponding character is displayed on the No. 3 button of the government affairs login user name character, … …, all the result values are arranged in the beta-th order of the result value χ from small to large or from large to smallβ"the corresponding character is displayed on the beta-th key of the government affair login user name character; α +1, return to step S117; until the government affair login user name character is input. From small to large as χ1″、χ2″、χ3″、……、χβ-2″、χβ-1″、χβ"in order equals εβ,3、εβ-1,3、εβ-2,3、……、ε3,3、ε2,3、ε1,3Then characterχβDisplaying the characters X on the beta-th key in turn from small to bigβ-1Displayed on the beta-1 th key, character chiβ-2Is displayed on the beta-2 key, … …, character x3Displayed on the 3 rd key, character x2Displayed on the 2 nd key, character χ1Displayed on the 1 st key.
In a preferred embodiment of the present invention, step S110 is included before step S111, and step S110 includes steps S1101 to S1104;
s1101, arranging all characters input by the characters of the government affair login user name, sequentially numbering the characters, and marking the characters as A1、A2、A3、……、Aβ;A1A 1 st digit character indicating the arrangement of all characters input from the characters of the government affairs registration user name, A2A 2 nd digit character indicating the arrangement of all characters input from the characters of the government affairs registration user name, A3The 3 rd digit character representing the arrangement of all characters entered as the characters of the government registration user name, … …, AβA beta-bit character representing that all characters input by the characters of the government affair login user name are arranged;
s1102, performing the following operations on the arranged characters:
wherein, MD1() A hashing algorithm representing performing MD 51 time;
MD () represents a hashing algorithm that performs MD 5;
Aβ′a beta' -th digit character representing a result of arranging all characters input from the characters of the government affair login user name; β' ═ 1, 2, 3, … …, β;
a' th bit character A representing the character of the government affairs login user name after all the characters are arrangedβ′Performing 1 operation to obtain a display value;
s1103, arranging all the display values from small to large or from large to small to obtain χ1″′、χ2″′、χ3″′、……、χβ"; wherein, χ1"' is the display value of 1 st digit, χ2"' is the display value of 2 nd bit, χ, arranged from small to large or from large to small for all display values3"' is the display value at the 3 rd position in which all display values are arranged from small to large or from large to small, … …, χβ"' is the display value of the beta-th bit arranged from small to large or from large to small of all the display values;
s1104, arranging all display values from small to large or from large to small to display value χ in 1 st bit1The character corresponding to' is displayed on the No. 1 key of the government affairs login user name character, all display values are arranged in the No. 2 display value χ from small to large or from large to small2The character corresponding to' is displayed on the 2 nd key of the government affairs login user name character, and all display values are arranged in the 3 rd bit display value χ from small to large or from large to small3The character corresponding to' is displayed on the No. 3 key of the government affairs login user name character, … …, all the display values are arranged in the beta-th display value x from small to large or from large to smallβThe corresponding character of ""' is displayed on the beta-th key of the government affairs login user name character. From small to large as χ1″′、 χ2″′、χ3″′、……、χβ-2″′、χβ-1″′、χβIs equal toThe character a is sequentially changed from small to largeβDisplayed on the beta-th key, character Aβ-1Displayed on the beta-1 th key, character Aβ-2Displayed on the beta-2 key, … …, character A3Displayed on the 3 rd key, character A2Displayed on the 2 nd key, character A1Is displayed on the 1 st keyThe above.
A specific embodiment is given below, and the 1 st key of the government affair login user name character, the 2 nd key of the government affair login user name character, the 3 rd key of the government affair login user name character, the 4 th key of the government affair login user name character and the 5 th key of the government affair login user name character are sequentially arranged from left to right; the characters of the government login user name are all A, B, C, D, E, and the name of the government login user is BBCE.
In the first step, A, B, C, D, E is arranged as: B. a, D, C, E, respectively; namely A1、A2、A3、A4、A5In turn, B, A, D, C, E; a. the1=B,A2=A,A3=D,A4=C,A5=E。
thirdly, arranging all the display values from small to large to obtain chi1″′、χ2″′、χ3″′、……、χβ' in turn corresponds to
The fourth step is that the first step is that,the corresponding characters are C, E, A, B, D in sequence, and the characters C, E, A, B, D are displayed on the 1 st key of the government affairs login user name character, the 2 nd key of the government affairs login user name character, the 3 rd key of the government affairs login user name character, the 4 th key of the government affairs login user name character and the 5 th key of the government affairs login user name character, as shown in fig. 2.
Fifthly, if receiving the input of the 1 st government affair login user name character (namely B), performing the following operations:
all the calculated values are arranged from small to large to obtain the x1″、χ2″、χ3″、……、χβ"sequentially correspond to ε4,2、ε5,2、ε2,2、 ε1,2、ε3,2。
Sixth step, ε4,2、ε5,2、ε2,2、ε1,2、ε3,2The corresponding characters are B, D, E, C, A in sequence, and the characters B, D, E, C, A are displayed on the 1 st key of the government affairs login user name character, the 2 nd key of the government affairs login user name character, the 3 rd key of the government affairs login user name character, the 4 th key of the government affairs login user name character and the 5 th key of the government affairs login user name character, as shown in fig. 3.
Seventhly, if the input of the 2 nd government affair login user name character (namely B) is received, the following operations are carried out:
all the calculated values are arranged from small to large to obtain the x1″、χ2″、χ3″、……、χβ"sequentially correspond to ε3,3、ε2,3、ε5,3、 ε4,3、ε1,3。
Eighth step, ε3,3、ε2,3、ε5,3、ε4,3、ε1,3The corresponding characters are A, E, D, B, C in sequence, and the characters A, E, D, B, C are displayed on the 1 st key of the government affairs login user name character, the 2 nd key of the government affairs login user name character, the 3 rd key of the government affairs login user name character, the 4 th key of the government affairs login user name character and the 5 th key of the government affairs login user name character, as shown in fig. 4.
Ninthly, if the input of the 3 rd government affair login user name character (namely C) is received, the following operations are carried out:
all the calculated values are arranged from small to large to obtain the x1″、χ2″、χ3″、……、χβ"sequentially correspond to ε4,4、ε1,4、ε3,4、 ε5,4、ε2,4。
Tenth step, ε4,4、ε1,4、ε3,4、ε5,4、ε2,4The corresponding characters are B, C, A, D, E in sequence, and the characters B, C, A, D, E are displayed on the 1 st key of the government affairs login user name character, the 2 nd key of the government affairs login user name character, the 3 rd key of the government affairs login user name character, the 4 th key of the government affairs login user name character and the 5 th key of the government affairs login user name character, as shown in fig. 5.
As a tenth step, if the 4 th government affair login user name character (i.e. E) is received, the following operations are performed:
all the calculated values are arranged from small to large to obtain the x1″、χ2″、χ3″、……、χβ"sequentially correspond to ε4,5、ε3,5、ε2,5、 ε1,5、ε5,5。
A twelfth step of e4,5、ε3,5、ε2,5、ε1,5、ε5,5The corresponding characters in sequence are B, A, E, C, D, and the characters B, A, E, C, D are displayed corresponding to the 1 st key of the government affairs login user name character, the 2 nd key of the government affairs login user name character, the 3 rd key of the government affairs login user name character, the 4 th key of the government affairs login user name character and the 5 th key of the government affairs login user name character, as shown in fig. 6. The characters displayed by the input keys are different, and safety protection is enhanced.
And step thirteen, finishing the input of the characters of the user name for logging in the 4-bit government affairs.
In a preferred embodiment of the present invention, in steps S115, S118, and S1103, all the calculation values thereof are arranged from small to large;
or/and replacing the actual entered characters with other identical or different characters in the government entry username entry box, the other identical or different characters being all characters not including the government entry username character entry.
Another specific embodiment is given below, and the 1 st key of the government affair login user name character, the 2 nd key of the government affair login user name character, the 3 rd key of the government affair login user name character, the 4 th key of the government affair login user name character and the 5 th key of the government affair login user name character are sequentially arranged from left to right; all characters entered by the characters of the government registration user name are A, B, C, D, E, the government registration user name is BBCE, and the displayed government registration user name is replaced with.
In the first step, A, B, C, D, E is arranged as: B. a, D, C, E, respectively; namely A1、A2、A3、A4、A5In turn, B, A, D, C, E; a. the1=B,A2=A,A3=D,A4=C,A5=E。
thirdly, arranging all the display values from small to large to obtain chi1″′、χ2″′、χ3″′、……、χβ' in turn corresponds to
The fourth step is that the first step is that,the corresponding characters are C, E, A, B, D in sequence, and the characters C, E, A, B, D are displayed on the 1 st key of the government affairs login user name character, the 2 nd key of the government affairs login user name character, the 3 rd key of the government affairs login user name character, the 4 th key of the government affairs login user name character and the 5 th key of the government affairs login user name character, as shown in fig. 1.
Fifthly, if receiving the input of the 1 st government affair login user name character (namely B, which shows x), the following operations are carried out:
ε1,2=297e7ca127d2eef674c119331fe30dff,
ε2,2=1925294ef4492da4b990901ebab5396e,
ε3,2=7fc56270e7a70fa81a5935b72eacbe29,
ε4,2=01b7c90b02081ae53119957e0697b081,
ε5,2=0c554e24da6263f40dbc6aabe26f354d,
all the calculated values are arranged from small to large to obtain the x1″、χ2″、χ3″、……、χβ"sequentially correspond to ε4,2、ε5,2、ε2,2、 ε1,2、ε3,2。
Sixth step, ε4,2、ε5,2、ε2,2、ε1,2、ε3,2The corresponding characters are B, D, E, C, A in sequence, and the characters B, D, E, C, A are displayed on the 1 st key of the government affairs login user name character, the 2 nd key of the government affairs login user name character, the 3 rd key of the government affairs login user name character, the 4 th key of the government affairs login user name character and the 5 th key of the government affairs login user name character, as shown in fig. 7.
Seventhly, after receiving the input of the 2 nd government affair login user name character (namely B, showing), the following operations are carried out:
ε1,3=dc79ebf62a4e1174b800dede4387db83,
ε2,3=085604d6283a0e8684d73e9b97444c90,
ε3,3=01484f32e1eae8c021a3bd2fb3d1062f,
ε4,3=d1670092d8ba29909a5522d369f6b87c,
ε5,3=0e578f3df143ddbf9bea0b80a26fcfdc,
all the calculated values are arranged from small to large to obtain the x1″、χ2″、χ3″、……、χβ"sequentially correspond to ε3,3、ε2,3、ε5,3、 ε4,3、ε1,3。
Eighth step, ε3,3、ε2,3、ε5,3、ε4,3、ε1,3Correspond to in turnThe characters are A, E, D, B, C, and the characters A, E, D, B, C are displayed corresponding to the 1 st key of the government login user name character, the 2 nd key of the government login user name character, the 3 rd key of the government login user name character, the 4 th key of the government login user name character and the 5 th key of the government login user name character, as shown in fig. 8.
Ninth, after receiving the input of the 3 rd government affair login user name character (namely, C, which is displayed), the following operations are carried out:
ε1,4=287e1bad918671acbed1fee599cd505e,
ε2,4=74545c8c2974ec7b75e37e1f4638e632,
ε3,4=5eed7cf4fa6ac7f52226d3af23b5be2b,
ε4,4=1597dd3950b6ec77f0962b26ea6ca4a5,
ε5,4=71827e65d14efba2a7d2afc6f22240e5,
all the calculated values are arranged from small to large to obtain the x1″、χ2″、χ3″、……、χβ"sequentially correspond to ε4,4、ε1,4、ε3,4、 ε5,4、ε2,4。
Tenth step, ε4,4、ε1,4、ε3,4、ε5,4、ε2,4The corresponding characters are B, C, A, D, E in sequence, and the characters B, C, A, D, E are displayed on the 1 st key of the government affairs login user name character, the 2 nd key of the government affairs login user name character, the 3 rd key of the government affairs login user name character, the 4 th key of the government affairs login user name character and the 5 th key of the government affairs login user name character, as shown in fig. 9.
As a tenth step, upon receiving the 4 th government entry username character (i.e., E, shown), the following operations are performed:
ε1,5=f38ea8b5a97c3bf1f9f123a40659cec1,
ε2,5=71aa778898173c34d7d2faf7302500c2,
ε3,5=34df0b4fb03ed989d3d2a61e1b45ee67,
ε4,5=2cc52748677ae83a4badc0cfc620c82b,
ε5,5=f7d556efacd347eb42d2f9bc19d25180,
all the calculated values are arranged from small to large to obtain the x1″、χ2″、χ3″、……、χβ"sequentially correspond to ε4,5、ε3,5、ε2,5、 ε1,5、ε5,5。
A twelfth step of e4,5、ε3,5、ε2,5、ε1,5、ε5,5The corresponding characters in sequence are B, A, E, C, D, and the characters B, A, E, C, D are displayed corresponding to the 1 st key of the government affairs login user name character, the 2 nd key of the government affairs login user name character, the 3 rd key of the government affairs login user name character, the 4 th key of the government affairs login user name character and the 5 th key of the government affairs login user name character, as shown in fig. 10.
And step thirteen, finishing the input of the characters of the user name for logging in the 4-bit government affairs.
In a preferred embodiment of the present invention, the method of inputting the government affairs login password in step S11 includes the steps of:
s111, judging whether the receiving of the government affair login password triggering command:
if receiving the trigger command of inputting the government affair login password, executing the step S112;
if the trigger command of inputting the government affair login password is not received, returning to the step S111;
s112, displaying a government affair login password character input display frame on the intelligent handheld mobile terminal, wherein the government affair login password character input display frame comprises government affair login password character keys, all the government affair login password character keys are all characters input by the government affair login password characters, and characters displayed on each government affair login password character key are different and comprise one or any combination of numbers, capital letters and lowercase letters; the numbers comprise one or any combination of 0, 1, 2, 3, … … and 9, the capital letters comprise one or any combination of A, B, C, D, … … and Z, and the lowercase letters comprise one or any combination of a, b, c, d, … … and Z; let ζ be 2;
s113, counting the number of all government affair login password character keys in a display frame for inputting the government affair login password characters and recording the number as psi after receiving the input of the 1 st government affair login password character; the first key is a government affairs login password character No. 1 key, a government affairs login password character No. 2 key, a government affairs login password character No. 3 key, … … and a government affairs login password character No. psi key;
s114, obtaining characters displayed on a 1 st key of a government affair login password character, a 2 nd key of the government affair login password character, a 3 rd key of the government affair login password character, … … and a psi th key of the government affair login password character, and performing the following operations:
wherein, MD2() A hashing algorithm denoted as performing MD5 2 times;
MD1() A hashing algorithm representing performing MD 51 time;
MD () represents a hashing algorithm that performs MD 5;
τξa character indicating a character displayed on a xi key of a government affair login password character; ξ ═ 1, 2, 3, … …, ψ;
character tau displayed on the xi key of the character of the government affairs login passwordξPerforming 2 times of operation to obtain an operation value;
s115, all the operation values are arranged from small to large or from large to small to obtain tau1′、τ2′、τ3′、……、τβ'; wherein, tau1' the operation value at bit 1 is arranged from small to large or from large to small for all operation values, τ2' all the operation values are arranged in the order of small to large or large to small in the order of second2-bit operation value, tau3' the operation value at the 3 rd bit is arranged from small to large or from large to small for all the operation values, … …, tauψ' arranging operation values at the psi-th bit from small to large or from large to small for all operation values;
s116, arranging all the operation values from small to large or from large to small to be in the operation value tau of the 1 st bit1' the corresponding character is displayed on the 1 st key of the government affair entry password character, and all the calculated values are arranged into the 2 nd bit calculated value tau from small to large or from large to small2' the corresponding character is displayed on the No. 2 key of the government affairs login password character, all the calculated values are arranged from small to large or from large to small to be at the calculated value tau of the No. 3 bit3' the corresponding character is displayed on the No. 3 key of the government affairs login password character, … …, all the operation values are arranged from small to large or from large to small in the operation value tau at the phi positionψ' the corresponding character is displayed on the psi th key of the government affair login password character;
s117, upon receiving input of the ζ th government affair login password character, performs the following operations:
wherein, MDζ+1() A hashing algorithm representing performing ζ +1 times MD 5;
MD1() A hashing algorithm representing performing MD 51 time;
MDζ() A hashing algorithm representing performing ζ times MD 5;
MDζ-1() A hashing algorithm representing performing ζ -1 times MD 5;
MDζ-2() A hashing algorithm representing performing ζ -2 times MD 5;
MD () represents a hashing algorithm that performs MD 5;
τξa character indicating that displayed on the ξ -th key of the government affairs login password character in step S114; ξ ═ 1, 2, 3, … …, ψ;
character tau displayed on the xi key of the character of the government affairs login passwordξCarrying out zeta +1 operation to obtain a result value;
s118, arranging all the operation values from small to large or from large to small to obtain tau1″、τ2″、τ3″、……、τψ"; wherein, tau1"all result values are arranged from small to large or from large to small in the 1 st bit, τ2"the result value in the 2 nd bit is arranged from small to large or from large to small for all the result values, τ3"is the result value at the 3 rd bit arranged from small to large or from large to small for all result values, … …, τψ"arranging the result values at the ψ -th bit for all the result values from small to large or from large to small;
s119, arranging the result values tau at the 1 st bit from small to large or from large to small1The corresponding character is displayed on the 1 st key of the government affair registration password character, and all result values are arranged from small to large or from large to small to be in the 2 nd bit result value tau2"the corresponding character is displayed on the 2 nd key of the government affair login password character, all the result values are arranged from small to large or from large to small in the result value tau at the 3 rd bit3"the corresponding character is displayed on the No. 3 key of the government affairs login password character, … …, all the result values are arranged from small to large or from large to small in the result value tau at the phi positionψ"the corresponding character is displayed on the psi key of the government affairs login password character; ζ +1, return to step S117; until the government affair login password character is input.
In a preferred embodiment of the present invention, step S110 is included before step S111, and step S110 includes steps S1101 to S1104;
s1101, arranging all characters input by the government affair login password characters, sequentially numbering the characters, and marking as B1、B2、B3、……、Bβ;B1A 1 st digit character, B, representing the arrangement of all characters entered as a result of the government affairs login password character22 nd digit character, B, indicating the arrangement of all characters entered by the government affairs login password character3A 3 rd digit character … …, B indicating the arrangement of all characters entered as a government entry password characterβA beta-bit character representing that all characters input by the government registration password character are arranged;
s1102, performing the following operations on the arranged characters:
wherein, MD1() A hashing algorithm representing performing MD 51 time;
MD () represents a hashing algorithm that performs MD 5;
Bβ″a beta-th' bit character representing that all characters input by the government affair login password character are arranged; β ″ ═ 1, 2, 3, … …, β;
a beta-digit character B indicating that all characters input by the government affairs login password character are arrangedβ″Performing 1 operation to obtain a presentation value;
s1103, arranging all the presentation values from small to large or from large to small to obtain tau1″′、τ2″′、τ3″′、……、τβ"; wherein, tau1"' is the presentation value at bit 1, τ, with all presentation values arranged from small to large or from large to small2"' is the presentation value in bit 2, arranged from small to large or from large to small for all presentation values, τ3"' is the presentation value at position 3, with all presentation values arranged from small to large or from large to small, … …, τβ"' is the presentation value at the beta-th position of all presentation values arranged from small to large or from large to small;
s1104, arranging all the presentation values in a 1 st bit presentation value tau from small to large or from large to small1The character corresponding to' is displayed on the No. 1 key of the government affairs login password character, and all the presentation values are arranged from small to large or from large to small to be in the 2 nd presentation value tau2The character corresponding to' is displayed on the 2 nd key of the government affairs login password character, and all the presentation values are arranged from small to large or from large to small to be at the 3 rd bit presentation value tau3The corresponding character of ""' is displayed on the No. 3 key of the government affairs login password character, … …, all the presentation values are arranged from small to large or from large to small in the presentation value tau at the beta positionβThe corresponding character of ""' is displayed on the beta-th key of the government affairs login password character.
In a preferred embodiment of the present invention, in steps S115, S118, and S1103, all of the calculation values thereof are arranged from large to small;
or/and replacing the actual input character with another same or different character in the government login password input box, wherein the other same or different character is the whole character which does not comprise the input of the government login password character.
In a preferred embodiment of the present invention, in step S12, the following operations are performed on the acquired government affairs login user name:
εGALU=MD(GALU),
wherein, MD () represents a hashing algorithm for performing MD 5;
GALU represents a government login user name;
εGALUrepresenting the government affair login user name GALU which is processed to obtain the processed government affair login user name;
or/and in step S12, the following operations are carried out on the acquired government affair login password:
εGALP=MD(GALP),
wherein, MD () represents a hashing algorithm for performing MD 5;
GALP denotes the government login password;
εGALPthe GALP is processed to obtain the processed government affairs login password.
Or/and in step S2, the verification method comprises the following steps:
the first step, the government affair cloud platform judges whether the received government affair login user name exists in the government affair cloud platform:
if the received government affair login user name exists in the government affair cloud platform, listing the government affair login password corresponding to the government affair login user name in a form of a government affair login password library, wherein the government affair login password library comprises mu government affair login passwords, and mu is a positive integer greater than or equal to 2, and executing the next step;
if the received government affair login user name does not exist in the government affair cloud platform, the government affair cloud platform sends feedback information, and the feedback information indicates that the government affair login user name does not exist in the government affair cloud platform and applies for registering the government affair login user name;
secondly, judging whether the government affair login password exists in a government affair login password library:
if the government affair login password exists in the government affair login password library, the verification is passed;
and if the government affair login password does not exist in the government affair login password library, the verification fails and feedback information is sent, and the feedback information is that the government affair login password is wrong, and the correct government affair login password is required to be input again. A plurality of government affair login passwords are used for corresponding to a government affair login user name, so that multi-password login is realized, and the method is fast and efficient.
In a preferred embodiment of the present invention, step S2 includes the following steps:
s21, sending a control command for changing the government affair cloud platform log information file to the government affair cloud platform by using the intelligent handheld mobile terminal;
s22, the government affair cloud platform judges whether the government affair cloud platform receives a control command for changing the log information file of the government affair cloud platform:
if the government affair cloud platform receives a control command for changing the log information file of the government affair cloud platform, executing the next step;
if the government affair cloud platform does not receive the control command for changing the log information file of the government affair cloud platform, returning to the step S22;
s23, acquiring the government affair cloud platform log information file, and copying and pasting the acquired government affair cloud platform log information file to generate a copy of the government affair cloud platform log information file; a log safety lock is arranged on the generated government affair cloud platform log information file copy, under the condition of the log safety lock, other processes cannot access the government affair cloud platform log information file copy, and other processes do not comprise a control command process for changing the government affair cloud platform log information file, so that the integrity and the safety of the government affair cloud platform log information file copy can be ensured;
s24, changing the generated copy of the government affair cloud platform log information file by using the control command of the government affair cloud platform log information file to obtain a changed copy of the government affair cloud platform log information file; and cancel its log security lock;
and S25, replacing the government affair cloud platform log information file with the government affair cloud platform log information file change copy obtained in the step S24, and changing the government affair cloud platform log information file.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (6)
1. A working method for carrying out government affair data fusion safety through four-in-one network is characterized by comprising the following steps:
and S1, logging in the four-in-one government affair data network by using the intelligent handheld mobile terminal.
2. The working method for government affair data fusion security through four-in-one network according to claim 1, wherein the step S1 comprises the steps of:
s11, inputting a government affair login user name and a government affair login password by using the intelligent handheld mobile terminal;
and S12, processing the government affair login user name and the government affair login password, and sending the processed government affair login user name and the government affair login password to the government affair cloud platform.
3. The working method for government affair data fusion security through four-in-one networking according to claim 2, wherein the method for inputting the government affair login user name in step S11 comprises the steps of:
s111, judging whether the user name triggering command of government affair login is received:
if receiving the trigger command of inputting the government affair login user name, executing step S112;
if the input government affair login user name triggering command is not received, returning to the step S111;
s112, displaying a government affair login user name character input display frame on the intelligent handheld mobile terminal, wherein the government affair login user name character input display frame comprises government affair login user name character keys, all government affair login user name character keys are all characters input by the government affair login user name characters, and characters displayed on each government affair login user name character key are different and comprise one or any combination of numbers, capital letters and lowercase letters; the numbers comprise one or any combination of 0, 1, 2, 3, … … and 9, the capital letters comprise one or any combination of A, B, C, D, … … and Z, and the lowercase letters comprise one or any combination of a, b, c, d, … … and Z; let α be 2;
s113, counting the number of all government affair login user name character keys in a display frame for inputting the government affair login user name character and recording as beta after receiving the input of the 1 st government affair login user name character; the 1 st key of the government affair login user name character, the 2 nd key of the government affair login user name character, the 3 rd key of the government affair login user name character, … … and the beta key of the government affair login user name character are respectively arranged;
s114, obtaining characters displayed on a 1 st key of a government affair login user name character, a 2 nd key of the government affair login user name character, a 3 rd key of the government affair login user name character, … … and a beta key of the government affair login user name character, and carrying out the following operations:
εδ,2=MD2(χδ)
=MD1(MD1(χδ)),
=MD(MD(χδ))
wherein, MD2() A hashing algorithm denoted as performing MD5 2 times;
MD1() A hashing algorithm representing performing MD 51 time;
MD () represents a hashing algorithm that performs MD 5;
χδthe character which is displayed on the delta th key of the character of the government affair login user name is shown; δ — 1, 2, 3, … …, β;
εδ,2character x displayed on delta key of character of user name for government affairs loginδPerforming 2 times of operation to obtain an operation value;
s115, arranging all the operation values from small to large or from large to small to obtain the χ1′、χ2′、χ3′、……、χβ'; wherein, χ1' arranging the operation value at the 1 st bit from small to large or from large to small for all operation values, χ2' arranging the operation value in the 2 nd bit from small to large or from large to small for all operation values, χ3' the operation value at the 3 rd bit is arranged from small to large or from large to small for all the operation values, … …, χβ' arranging the operation values at the beta-th bit from small to large or from large to small for all the operation values;
s116, arranging all the operation values in the 1 st bit of the operation values according to the descending or descending order1' the corresponding character is displayed on the No. 1 key of the government affairs login user name character, and all the calculation values are displayedArranging the operation value x at the 2 nd bit from small to large or from large to small2The corresponding characters are displayed on the No. 2 key of the government affair login user name characters, and all the calculated values are arranged in the No. 3 calculated value x from small to large or from large to small3' the corresponding character is displayed on the No. 3 key of the government affairs login user name character, … …, all the calculated values are arranged according to the calculated value x in the beta position from small to large or from large to smallβ' the corresponding character is displayed on the beta-th key of the government affair login user name character;
s117, upon receiving the α -th government affair login user name character input, performs the following operations:
wherein, MDα+1() A hashing algorithm denoted α +1 times MD 5;
MD1() A hashing algorithm representing performing MD 51 time;
MDα() A hashing algorithm representing performing MD5 a times;
MDα-1() A hashing algorithm denoted alpha-1 times MD 5;
MDα-2() A hashing algorithm denoted alpha-2 times MD 5;
MD () represents a hashing algorithm that performs MD 5;
χδa character indicating that displayed on the δ -th key of the government affairs login user name character in step S114; δ — 1, 2, 3, … …, β;
εδ,α+1character x displayed on delta key of character of user name for government affairs loginδCarrying out alpha +1 times of operation to obtain a result value;
s118, arranging all the operation values from small to large or from large to small to obtain the χ1″、χ2″、χ3″、……、χβ"; wherein, χ1"is the result value in bit 1 arranged from small to large or from large to small for all result values, χ2"is the result value in the 2 nd bit arranged from small to large or from large to small for all result values, χ3"is the result value at the 3 rd bit arranged from small to large or from large to small for all the result values, … …, χβ"all result values are arranged from small to large or from large to small in the beta position;
s119, arranging the result values X at the 1 st bit from small to large or from large to small1"the corresponding character is displayed on the No. 1 key of the government affairs login user name character, all the result values are arranged in the No. 2 result value χ from small to large or from large to small2"the corresponding character is displayed on the 2 nd key of the government affair login user name character, all the result values are arranged in the 3 rd bit result value χ from small to large or from large to small3"the corresponding character is displayed on the No. 3 button of the government affairs login user name character, … …, all the result values are arranged from small to large or from large to small in the result value χ of the beta positionβ"the corresponding character is displayed on the beta-th key of the government affair login user name character; α +1, return to step S117; until the government affair login user name character is input.
4. The working method for government affair data fusion security through four-in-one networking according to claim 3, wherein step S111 is preceded by step S110, and step S110 comprises steps S1101 to S1104;
s1101, arranging all characters input by the characters of the government affair login user name, sequentially numbering the characters, and marking the characters as A1、A2、A3、……、Aβ;A1A 1 st digit character indicating the arrangement of all characters input from the characters of the government affairs registration user name, A2A 2 nd digit character indicating that all characters input from the characters of the government affairs login user name are arranged,A3the 3 rd digit character representing the arrangement of all characters entered as the characters of the government registration user name, … …, AβA beta-bit character representing that all characters input by the characters of the government affair login user name are arranged;
s1102, performing the following operations on the arranged characters:
wherein, MD1() A hashing algorithm representing performing MD 51 time;
MD () represents a hashing algorithm that performs MD 5;
Aβ′a beta' -th digit character representing a result of arranging all characters input from the characters of the government affair login user name; β' ═ 1, 2, 3, … …, β;
a' th bit character A representing the character of the government affairs login user name after all the characters are arrangedβ′Performing 1 operation to obtain a display value;
s1103, arranging all the display values from small to large or from large to small to obtain χ1″′、χ2″′、χ3″′、……、χβ"; wherein, χ1"' is the display value of 1 st digit, χ2"' is the display value of 2 nd bit, χ, arranged from small to large or from large to small for all display values3"' is the display value in the 3 rd digit of all display values arranged from small to large or from large to small, … …, χβ"' is the display value of the beta-th bit arranged from small to large or from large to small of all the display values;
s1104, arranging all display values from small to large or from large to small to display value χ in 1 st bit1The corresponding character of' is displayed on the government affair login user nameArranging all display values in a 2 nd display value x from small to large or from large to small on a 1 st key of the character2The character corresponding to' is displayed on the 2 nd key of the government affair login user name character, and all display values are arranged in the 3 rd bit display value χ from small to large or from large to small3The character corresponding to' is displayed on the No. 3 key of the government affairs login user name character, … …, all the display values are arranged from small to large or from large to small to be in the display value x of the beta positionβThe corresponding character of ""' is displayed on the beta-th key of the government affairs login user name character.
5. The working method for government affair data fusion security through four-in-one networking according to claim 4, wherein all the calculation values are arranged from small to large in steps S115 and/or S118 and/or S1103.
6. The working method for government affair data fusion security through four-in-one networking according to claim 4, wherein other same or different characters are used in the government affair login user name input box to replace the actually input characters, and the other same or different characters are all characters excluding the character input of the government affair login user name.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110298070.XA CN113179246B (en) | 2021-03-19 | 2021-03-19 | Working method for carrying out government affair data fusion safety through four-in-one network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110298070.XA CN113179246B (en) | 2021-03-19 | 2021-03-19 | Working method for carrying out government affair data fusion safety through four-in-one network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113179246A true CN113179246A (en) | 2021-07-27 |
CN113179246B CN113179246B (en) | 2022-08-26 |
Family
ID=76922464
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110298070.XA Active CN113179246B (en) | 2021-03-19 | 2021-03-19 | Working method for carrying out government affair data fusion safety through four-in-one network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113179246B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114640471A (en) * | 2022-03-21 | 2022-06-17 | 重庆市规划和自然资源信息中心 | Centralized government affair office client safety operation and maintenance method based on domestic operating system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050234909A1 (en) * | 2004-04-15 | 2005-10-20 | International Business Machines Corporation | Method, computer program product, and data processing system for source verifiable audit logging |
CN103327034A (en) * | 2013-07-18 | 2013-09-25 | 百度在线网络技术(北京)有限公司 | Safe login method, system and device |
CN106230842A (en) * | 2016-08-05 | 2016-12-14 | 张家口乐淘商贸有限公司 | A kind of data processing method of ecommerce government system |
US20170221063A1 (en) * | 2013-12-20 | 2017-08-03 | Palantir Technologies Inc. | Automated database analysis to detect malfeasance |
CN107317743A (en) * | 2017-05-11 | 2017-11-03 | 安徽讯呼信息科技有限公司 | A kind of government affairs information service system based on internet |
CN108924104A (en) * | 2018-06-21 | 2018-11-30 | 甘肃万维信息技术有限责任公司 | A kind of method of E-Government encryption and decryption |
CN108964877A (en) * | 2018-06-29 | 2018-12-07 | 火币(广州)区块链科技有限公司 | A method of based on to password using hash algorithm encrypt anticollision |
CN109034810A (en) * | 2018-09-03 | 2018-12-18 | 北京飞纳泰科信息技术有限公司 | Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology |
CN111026798A (en) * | 2019-12-05 | 2020-04-17 | 苏州中车建设工程有限公司 | Electromechanical equipment database system and control method thereof |
-
2021
- 2021-03-19 CN CN202110298070.XA patent/CN113179246B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050234909A1 (en) * | 2004-04-15 | 2005-10-20 | International Business Machines Corporation | Method, computer program product, and data processing system for source verifiable audit logging |
CN103327034A (en) * | 2013-07-18 | 2013-09-25 | 百度在线网络技术(北京)有限公司 | Safe login method, system and device |
US20170221063A1 (en) * | 2013-12-20 | 2017-08-03 | Palantir Technologies Inc. | Automated database analysis to detect malfeasance |
CN106230842A (en) * | 2016-08-05 | 2016-12-14 | 张家口乐淘商贸有限公司 | A kind of data processing method of ecommerce government system |
CN107317743A (en) * | 2017-05-11 | 2017-11-03 | 安徽讯呼信息科技有限公司 | A kind of government affairs information service system based on internet |
CN108924104A (en) * | 2018-06-21 | 2018-11-30 | 甘肃万维信息技术有限责任公司 | A kind of method of E-Government encryption and decryption |
CN108964877A (en) * | 2018-06-29 | 2018-12-07 | 火币(广州)区块链科技有限公司 | A method of based on to password using hash algorithm encrypt anticollision |
CN109034810A (en) * | 2018-09-03 | 2018-12-18 | 北京飞纳泰科信息技术有限公司 | Dynamic Hash code keyboard based on recognition of face Yu In vivo detection technology |
CN111026798A (en) * | 2019-12-05 | 2020-04-17 | 苏州中车建设工程有限公司 | Electromechanical equipment database system and control method thereof |
Non-Patent Citations (2)
Title |
---|
METE EMINAGAOGLU、ECE CINI、GIZEM SERT、DERYA ZOR: ""A Two-Factor Authentication System with QR Codes for Web and Mobile Applications"", 《2014 FIFTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES》 * |
卢亮: ""基于嵌入式STM32的半虚拟键盘"", 《信息科技》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114640471A (en) * | 2022-03-21 | 2022-06-17 | 重庆市规划和自然资源信息中心 | Centralized government affair office client safety operation and maintenance method based on domestic operating system |
Also Published As
Publication number | Publication date |
---|---|
CN113179246B (en) | 2022-08-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107423632B (en) | Customizable sensitive data desensitization method and system | |
EP3337084B1 (en) | Cryptographic data processing method, cryptographic data processing apparatus, and program | |
US9716699B2 (en) | Password management system | |
AU2012253411B2 (en) | System and method for web-based security authentication | |
US9323944B2 (en) | Conforming passwords to a password policy | |
US20130298223A1 (en) | Methods and computing devices for password verification | |
WO2017035823A1 (en) | Password generation with key and derivation parameter | |
US11398902B2 (en) | Systems and methods for non-deterministic multi-party, multi-user sender-receiver authentication and non-repudiatable resilient authorized access to secret data | |
US20120246483A1 (en) | Authentication System With Time Attributes | |
CN113179246B (en) | Working method for carrying out government affair data fusion safety through four-in-one network | |
US20200252392A1 (en) | Authentication Based on Shared Secret Seed Updates for One-Time Passcode Generation | |
Tian et al. | Achieving flatness: Graph labeling can generate graphical honeywords | |
CN113132354B (en) | Working method for carrying out file processing optimization configuration by remotely logging in government affair data network | |
CN105447374A (en) | Computer implemented systems and methods for generating and recovering an authorization code | |
CN107623664A (en) | A kind of cipher-code input method and device | |
KR100734592B1 (en) | Method of certifing secret number | |
CN111342959B (en) | Password security setting and identification method, system, equipment and storage medium | |
CN114282688B (en) | Two-party decision tree training method and system | |
CN113162916B (en) | Working method for executing smart city operation instruction through big data platform | |
Kalio et al. | A framework for securing data warehouse using hybrid approach | |
CN117874825B (en) | LU decomposition-based user privacy protection method, device, equipment and medium | |
US20240236079A1 (en) | Portal Control of Web Site Credentials Using Asymmetric Public/Private Key Encryption Without User Selection or User Password Management | |
JP6414755B2 (en) | Authentication device, authentication method, and electronic device | |
CN116821938A (en) | Information safety protection platform based on Internet of things | |
JPH0480854A (en) | Password control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |