CN113312534B - Engineering survey intelligent management platform - Google Patents

Engineering survey intelligent management platform Download PDF

Info

Publication number
CN113312534B
CN113312534B CN202110588711.5A CN202110588711A CN113312534B CN 113312534 B CN113312534 B CN 113312534B CN 202110588711 A CN202110588711 A CN 202110588711A CN 113312534 B CN113312534 B CN 113312534B
Authority
CN
China
Prior art keywords
character
account
password
code
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110588711.5A
Other languages
Chinese (zh)
Other versions
CN113312534A (en
Inventor
吕超武
高兵
王玨
陈华富
漆玉祥
方兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway 11th Bureau Group Co Ltd
Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd
Original Assignee
China Railway 11th Bureau Group Co Ltd
Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Railway 11th Bureau Group Co Ltd, Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd filed Critical China Railway 11th Bureau Group Co Ltd
Priority to CN202110588711.5A priority Critical patent/CN113312534B/en
Publication of CN113312534A publication Critical patent/CN113312534A/en
Application granted granted Critical
Publication of CN113312534B publication Critical patent/CN113312534B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention provides an engineering measurement intelligent management platform, which comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, wherein a user logs in the server end by using the mobile phone equipment end; the working method for logging in the server by the user through the mobile phone equipment comprises the following steps: s1, acquiring the input login account and login password at the mobile phone device end; s2, obtaining the login security account or/and the login security password; s3, obtaining the security account number or/and the security password; s4, generating an account number QR code or/and a password QR code; s5, obtaining the account number combination code and the password combination code; and S6, sending the account combination code or/and the password combination code obtained in the step S5 and the safety account corresponding to the account combination code or/and the safety password corresponding to the password combination code to a server. The invention can ensure the login safety of the platform and improve the experience of the user.

Description

Engineering survey intelligent management platform
Technical Field
The invention relates to the technical field of platform safety, in particular to an engineering measurement intelligent management platform.
Background
The intelligent engineering is a digital management platform created for the field of engineering projects, and realizes the whole process visual management and control of contract signing, cost control, product purchasing, logistics delivery, site construction, quality inspection, customer acceptance and payment. The platform adopts the mobile and intelligent scientific and technological means, optimizes project operation flow, shortens project construction period, improves multi-department cooperative work efficiency, and improves enterprise management and control capability and external service capability in all aspects. However, the platform login security is crucial, and the patent application No. 2020113508826 entitled "a method, system, terminal and storage medium for security reinforcement based on system login process" discloses obtaining a start control instruction and starting a GRUB bootstrap module; the GRUB guiding module judges whether to call a double-factor authentication module; if the dual-factor authentication module is called, acquiring authentication information input by a user, and judging whether the authentication passes; if the authentication is passed, entering an authentication interface configured by the GRUB guide module, and configuring authentication information to an authentication storage area; an automatic login process of the operating system is started. Reading authentication information of the authentication storage area; and entering an operating system desktop, and finishing login. The method for reinforcing the safety based on the system login process customizes the GRUB, increases the two-factor authentication in the boot process, and expands the two-factor authentication mechanism to the system boot process. Thus, the safety of the guide part in the login process is ensured.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides an engineering measurement intelligent management platform.
In order to achieve the above object, the invention provides an engineering measurement intelligent management platform, which comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, wherein a user logs in the server end by using the mobile phone equipment end; the working method for logging in the server by the user through the mobile phone equipment comprises the following steps:
s1, acquiring the input login account and login password at the mobile phone device end;
s2, respectively carrying out security processing on the login account or/and the login password acquired in the step S1 to obtain a login security account or/and a login security password;
s3, respectively carrying out security processing on the login security account or/and the login security password obtained in the step S2 to obtain the security account or/and the security password;
s4, respectively generating an account number QR code or/and a password QR code for the secured account number or/and the secured password obtained in the step S2;
s5, combining the login safe account obtained in the step S2 with the QR code of the account generated in the step S4 to obtain an account combination code; or/and combining the login security password obtained in the step S2 with the password QR code generated in the step S4 to obtain a password combination code;
and S6, sending the account combination code or/and the password combination code obtained in the step S5 and the safety account corresponding to the account combination code or/and the safety password corresponding to the password combination code to a server.
In conclusion, by adopting the technical scheme, the login safety of the platform can be ensured, and the experience of the user is improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
Fig. 2 is a schematic diagram of a QR code of an account according to the present invention.
Fig. 3 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 4 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 5 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 6 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 7 is a schematic diagram of a QR connection code of an account according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention discloses an engineering measurement intelligent management platform which comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, wherein a user logs in the server end by using the mobile phone equipment end; the working method for logging in the server by the user through the mobile phone equipment comprises the following steps: as shown in fig. 1.
S1, acquiring the input login account and login password at the mobile phone device end;
s2, respectively carrying out security processing on the login account or/and the login password acquired in the step S1 to obtain a login security account or/and a login security password;
s3, respectively carrying out security processing on the login security account or/and the login security password obtained in the step S2 to obtain the security account or/and the security password;
s4, respectively generating an account number QR code or/and a password QR code for the secured account number or/and the secured password obtained in the step S2;
s5, combining the login safe account obtained in the step S2 with the QR code of the account generated in the step S4 to obtain an account combination code; or/and combining the login security password obtained in the step S2 with the password QR code generated in the step S4 to obtain a password combination code;
and S6, sending the account combination code or/and the password combination code obtained in the step S5 and the safety account corresponding to the account combination code or/and the safety password corresponding to the password combination code to a server side for verification.
The method comprises the steps of aiming at a login account only, a login password only, a login account and a login password; aiming at the login account only, the method comprises the following steps:
s1, acquiring the input login account and login password at the mobile phone device end;
s2, performing login account security processing on the login account acquired in the step S1 to obtain a login security account;
s3, performing login safe account safety processing on the login safe account obtained in the step S2 to obtain the safe account;
s4, generating an account number QR code for the secured account number obtained in the step S2;
s5, combining the login safe account obtained in the step S2 with the QR code of the account generated in the step S4 to obtain an account combination code;
and S6, sending the account combination code obtained in the step S5, the input password and the safe account corresponding to the account combination code to a server side for verification.
Only aiming at the login password, the method comprises the following steps:
s1, acquiring the input login account and login password at the mobile phone device end;
s2, carrying out login password security processing on the login password obtained in the step S1 to obtain a login security password;
s3, carrying out login security password security processing on the login security password obtained in the step S2 to obtain a security password;
s4, generating a password (QR) code for the security password obtained in the step S2;
s5, combining the login security password obtained in the step S2 with the password QR code generated in the step S4 to obtain a password combination code;
and S6, sending the password combination code obtained in the step S5 and the input account number and the security password corresponding to the password combination code to a server side for verification of correctness.
Aiming at a login account and a login password, the method comprises the following steps:
s1, acquiring the input login account and login password at the mobile phone device end;
s2, respectively carrying out security processing on the login account and the login password acquired in the step S1 to obtain a login security account and a login security password;
s3, respectively carrying out security processing on the login security account and the login security password obtained in the step S2 to obtain the security account and the security password;
s4, respectively generating an account QR code and a password QR code for the secured account and the secured password obtained in the step S2;
s5, combining the login safe account obtained in the step S2 with the QR code of the account generated in the step S14 to obtain an account combination code; combining the login security password obtained in the step S2 with the password QR code generated in the step S4 to obtain a password combination code;
and S6, sending the account combination code and the password combination code obtained in the step S5, and the safety account corresponding to the account combination code and the safety password corresponding to the password combination code to a server side for verification.
In a preferred embodiment of the present invention, in step S2, the method for performing login account security processing on the acquired login account to obtain a login security account includes:
Figure BDA0003088575030000021
wherein the content of the first and second substances,
Figure BDA0003088575030000022
representing a security algorithm;
securitynumber represents a login account;
logins securitynumber represents a login secured account number;
the method for carrying out login password security processing on the obtained login password to obtain the login security password comprises the following steps:
Figure BDA0003088575030000023
security number represents a login password;
loginsafetynumber denotes a login security password.
In a preferred embodiment of the present invention, in step S3, the method for performing a secure process on the obtained login secured account to obtain the secured account thereof includes:
Figure BDA0003088575030000032
wherein the content of the first and second substances,
Figure BDA0003088575030000033
representing a security algorithm;
logins securitynumber represents a login secured account number;
loginstecurynymber' represents a secured account number;
the method for performing login security password security processing on the obtained login security password to obtain the security password comprises the following steps:
Figure BDA0003088575030000034
loginsafetynumber represents a login security password;
loginsafetynumber' denotes a security password.
In a preferred embodiment of the present invention, in step S5, the method for combining the obtained login security account with the generated account QR code to obtain the account combination code thereof includes the following steps:
s51, converting the login safety account number into a login safety account number binary system;
s52, judging the relationship between the total number of digits of the binary system of the login safety account and the total number of black cells in the QR code of the account:
Figure BDA0003088575030000031
wherein,' x represents the total number of digits of the binary system of the login safety account;
"y represents the total number of black cells in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents the rounding function;
"z represents the total number of account number QR codes;
s53, if 'z is larger than or equal to 2, sequentially connecting' z account QR codes from left to right to obtain account QR connecting codes; if' z is 1, only one account QR code is available, and the account QR code is an account QR connection code; sequentially coding black units and white units in the QR connecting code of the account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an A th unit, and A ═ z × "alpha- 2 Wherein,' alpha represents the size of the account QR code;
s54, encoding characters in a binary system of the login safety account from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 'y' th character of the account; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the' y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the ' y ' th character of the account to a ' y arrangement code in sequence;
s55, extracting the arrangement code mapped by the character corresponding to the 'y' th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of unmapped characters before the cut-off codes;
s56, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, the … … and the cut-off code into lines to obtain binary character strings;
and S57, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
In a preferred embodiment of the present invention, in step S5, the method for combining the obtained login security password with the generated password QR code to obtain the password combination code thereof includes the steps of:
s51, converting the login security password into a login security password binary system;
s52, judging the relationship between the total number of digits of the login security password binary system and the total number of black cells in the password QR code:
Figure BDA0003088575030000041
wherein,' x represents the total number of digits of the login security password binary system;
"y represents the total number of black cells in the password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"z represents the total number of the cryptographic QR code;
s53, if the ' z ' is more than or equal to 2, sequentially connecting the ' z password QR codes from left to right to obtain password QR connecting codes thereof; if' z is 1, only one password QR code is available, and the password QR code is a password QR connecting code; the black unit and the white unit in the QR code connecting code are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a 'A' unit, and 'A' zx 'alpha' is respectively coded 2 Wherein,' α represents the size of the password QR code;
s54, encoding characters in the login security password binary system from left to right, wherein the characters are respectively the 1 st character, the 2 nd character, the 3 rd character, … … and the' -y character of the password; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the first Y password permutation codes to obtain the Y password permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the Y th character of the password to the Y password arrangement code in sequence;
s55, extracting the password arrangement code mapped by the character corresponding to the Y-th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s56, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, the … … and the password cut-off code into lines to obtain binary character strings;
and S57, converting the binary character string into hexadecimal character string to obtain the cipher combination code.
In a preferred embodiment of the present invention, in step S5, the method for the server to verify the correctness of the account number binding code includes the following steps:
s51, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received safe account;
s52, judging the relationship between the total digits of the binary account number combination code and the total number of black cells and white cells in the QR code of the server-side account number:
Figure BDA0003088575030000051
wherein, the' K represents the total digits of the binary account number combination code;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"J represents the total number of server-side account QR codes;
s53, if 'J is larger than or equal to 2, the QR codes of the' J server-side account numbers are selectedConnecting in sequence from left to right to obtain a QR (quick response) connection code of a server-side account; if' J ═ 1, only one server-side account number QR code is present, and the server-side account number QR code is a server-side account number QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of the server-side account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a V th unit, and V is ═ J × "delta ^ respectively 2 The method comprises the following steps that a 'delta' represents the size of a QR code of a server-side account;
s54, encoding characters in the binary account number binding codes according to the sequence from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 'K' character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 'K' character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 'K' unit in sequence;
s55, extracting codes of black units in the 1 st unit, the 2 nd unit, the 3 rd unit, the … … th unit and the 'K' unit;
s56, arranging the extracted codes of the black units in a descending order, writing the characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s57, converting the server binary character string into the binary character string which is the same as the login safety account number in the step S2 to obtain the server account number; in the present embodiment, the present invention further includes:
executing the following operations on the server account:
Figure BDA0003088575030000052
wherein the content of the first and second substances,
Figure BDA0003088575030000053
representing a security algorithm;
"logins churitynumber represents a server-side account number;
locinsecuritynumber represents an account security value;
judging whether the account security value' Loginsecurynymber is consistent with the received security account or not:
if the account security value' loginstecuryngumber is consistent with the received secured account, executing step S158;
if the account security value' logins is inconsistent with the received security account, the process returns to step S151, and if the number of returns reaches the threshold value of the number of returns of the account, the login is not passed.
S58, judging whether the server account number is consistent with a preset account number preset at the server side:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
In a preferred embodiment of the present invention, in step S158, the method for calculating the server-side password comprises the following steps:
s581, the server end converts the received password combination code into a binary password combination code; generating a server-side password (QR) code from the received security password;
s582, judging the relation between the total digits of the binary password combination code and the total number of black units and white units in the server-side password QR code:
Figure BDA0003088575030000061
wherein,' K represents the total number of bits of the binary cipher-code combination code;
the' L represents the total number of black units and white units in the QR code at the server side;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents the rounding function;
' J represents the total number of the password QR codes at the server side;
s583, if the ' J ' is larger than or equal to 2, sequentially connecting the ' J server-side password QR codes from left to right to obtain server-side password QR connecting codes; if 'J' (1), only one server-side password QR code is available, and the server-side password QR code is a server-side password QR connecting code; sequentially coding a black unit and a white unit in the QR connecting code at the server end from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a V th unit, and the V is 'J x' delta 2 Wherein,' delta represents the size of the server-side password QR code;
s584, coding the characters in the binary password combination code from left to right, wherein the characters are respectively a password 1 st character, a password 2 nd character, a password 3 rd character, … … and a password K; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the K-th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the K-th unit in sequence;
s585, extracting the codes of black units in the 1 st unit, the 2 nd unit, the 3 rd unit, … … th unit and the 'K' unit;
s586, arranging the extracted codes of the black units in a sequence from small to large, writing characters mapped by the arranged codes of the black units into lines, and obtaining a server-side binary character string;
s587, the server side binary string is converted to be the same as the login security password system in the step S2, and the server side password is obtained. In the present embodiment, the present invention further includes:
the following operations are performed on the server-side password:
Figure BDA0003088575030000062
wherein the content of the first and second substances,
Figure BDA0003088575030000063
representing a security algorithm;
"security number represents a server-side password;
"Loginsafetynumber represents a password security value;
judging whether the password security value' Loginsetynumber is consistent with the received security password:
if the password security value' Loginsetynumber is consistent with the received security password, executing to judge whether the password of the server side is consistent with a preset password associated with a preset account preset at the server side;
if the password security value' logins afetynumber is inconsistent with the received security password, returning to the step S1581, and if the number of times of returning reaches the password returning set number threshold, failing to log in.
For example, in the first step, the login account number input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account of the input login account;
Figure BDA0003088575030000071
in this embodiment, a security algorithm
Figure BDA0003088575030000075
The MD5 algorithm is adopted to obtain 32-bit lower case 16-system numerical values.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088575030000072
fourthly, an account QR code is generated for the obtained secured account 188f3647551830c11fbd2d43563f1867, as shown in fig. 2.
Fifth, the login secured account number 315be36db8ad7b3e3a7bb0839d6fa839 is converted into a login secured account number binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001.
Sixthly, judging the relationship between the total digits of the login security account binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 and the total number of black cells in the QR code of the account:
due to the fact that
Figure BDA0003088575030000073
Thus, it is possible to provide
Figure BDA0003088575030000074
Seventhly, because' z is 1, the account QR code is an account QR connection code, as shown in fig. 2; if' z is 2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 3; if' z is 4, sequentially connecting the QR codes of the 4 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 4.
Eighthly, coding black units and white units in the account QR connection code shown in fig. 2 from left to right and from top to bottom in sequence, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit in sequence, and the size of the account QR code is 29.
The ninth step, because the data is more, only take the first line example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 12 th, 14 th, 18 th, 19 th, 23 th, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the first behavior example is taken in the ninth step, 1 to 18 bits of the binary system of the secured account number, that is, 110001010110111110, the corresponding hexadecimal system is 315be, and 315be is taken as the preset account number stored in the server).
Step ten, mapping characters 0 on the 8 th unit, the 9 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 15 th unit, the 16 th unit, the 17 th unit, the 20 th unit, the 21 st unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 nd cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 0, the character mapped on cell 21 is 0, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0.
The eleventh step, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into a line to obtain a binary character string 11000100000100000110000111110.
In the twelfth step, the binary string 11000100000100000110000111110 is converted into hexadecimal string 18820c3e, and the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088575030000081
in this embodiment, a security algorithm
Figure BDA0003088575030000085
The MD5 algorithm is adopted to obtain 32-bit lower case 16-system numerical values.
Fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088575030000082
in the fifteenth step, a password QR code is generated for the obtained security password 188f3647551830c11fbd2d43563f1867, as shown in fig. 2.
Sixthly, the login security password 315be36db8ad7b3e3a7bb0839d6fa839 is converted into a login security password binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001.
Seventeenth step, judging the relationship between the total digits of the login security password binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 and the total number of black cells in the password QR code:
due to the fact that
Figure BDA0003088575030000083
Thus, it is possible to provide
Figure BDA0003088575030000084
Eighteenth, since "z ═ 1, the password QR code is a password QR concatenated code, as shown in fig. 2; if' z is 2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 3; if' z is 4, sequentially connecting 4 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 4.
Nineteenth step, coding the black unit and the white unit in the password QR connecting code shown in fig. 2 from left to right and from top to bottom in sequence, which are the 1 st unit, the 2 nd unit, the 3 rd unit, … …, and the 841 rd unit in sequence, respectively, and the size of the password QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher code; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the first behavior example is taken in the twentieth step, 1 to 18 bits of the binary system of the security password, that is, 110001010110111110, which corresponds to a hexadecimal number of 315be, and 315be is taken as the preset password stored in the server).
Twenty-first, mapping character 0 to the 8 th, 9 th, 10 th, 11 th, 13 th, 15 th, 16 th, 17 th, 20 th, 21 st and 22 nd units; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 nd cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 0, the character mapped on cell 21 is 0, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0.
In the twenty-second step, the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code are written into a row, and the binary character string is 11000100000100000110000111110.
The twentieth step converts the binary string 11000100000100000110000111110 into a hexadecimal string 18820c3e, and then obtains the password combination code.
And twenty-fourth step, the account combination code 18820c3e, the secured account 188f3647551830c11fbd2d43563f1867, the password combination code 18820c3e and the login security password 188f3647551830c11fbd2d43563f1867 are sent to the server side.
The twenty-fifth step, the account combination code received by the server is 18820c3e, and the secured account number received by the server is 188f3647551830c11fbd2d43563f 1867;
the twenty-sixth step, the server side converts the received account number combination code 18820c3e into a binary account number combination code 11000100000100000110000111110; and generating a server-side account QR code from the received secured account 188f3647551830c11fbd2d43563f1867, as shown in fig. 2.
Twenty-seventh step, because
Figure BDA0003088575030000091
Thus, it is possible to provide
Figure BDA0003088575030000092
In the twenty-eighth step, because' J ═ 1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 2; if' J is 2, sequentially connecting the QR codes of the 2 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 3; if' J is 4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 4.
And twenty-ninth step, sequentially coding black units and white units in the server-side account number QR connection code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit … … and a unit 841, and the size of the server-side account number QR code is 29.
Thirty, encoding characters in the binary account number combined code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 1, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, the character corresponding to the 15 th character is 0, the character corresponding to the 16 th character of the account is 0, the character corresponding to the 17 th character is 0, and the character corresponding to the 18 th character is 1, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 0, the character corresponding to the 21 st character of the account is 0, the character corresponding to the 22 th character of the account is 0, the character corresponding to the 23 rd character of the account is 0, the character corresponding to the 24 th character of the account is 1, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 1, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 0.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain 110001010110111110 binary character strings at the server end.
And thirty-third step, converting the server-side binary character string 110001010110111110 into hexadecimal, and obtaining the server-side account number 315 be.
And thirty-fourth step, judging whether the server side account 315be is consistent with a preset account preset at the server side:
calculating a server side password because the server side account 315be is consistent with a preset account 315be preset in the server side;
thirty-fifth step, the server side converts the received password combination code 18820c3e into a binary password combination code 11000100000100000110000111110; and generating a server-side password (QR) code from the received security password 188f3647551830c11fbd2d43563f1867, as shown in FIG. 2.
Thirty-sixth step, because
Figure BDA0003088575030000101
Thus, the device
Figure BDA0003088575030000102
Thirty-seventh step, since "J ═ 1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 2; if 'J' is 2, connecting 2 server-side password QR codes from left to right in sequence to obtain a server-side password QR connecting code; as shown in fig. 3; if 'J' (4), sequentially connecting 4 server-side password QR codes from left to right to obtain server-side password QR connecting codes thereof; as shown in fig. 4.
And thirty-eighth step, sequentially coding the black unit and the white unit in the server-side password QR connecting code from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding the characters in the binary password combination code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 1, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the character corresponding to the 16 th character of the password is 0, the character corresponding to the 17 th character of the password is 0, the character corresponding to the 18 th character is 1, the 19 th character of the password corresponds to the character 1, the 20 th character of the password corresponds to the character 0, the 21 st character of the password corresponds to the character 0, the 22 nd character of the password corresponds to the character 0, the 23 rd character of the password corresponds to the character 0, the 24 th character of the password corresponds to the character 1, the 25 th character of the password corresponds to the character 1, the 26 th character of the password corresponds to the character 1, the 27 th character of the password corresponds to the character 1, the 28 th character of the password corresponds to the character 1, and the 29 th character of the password corresponds to the character 0.
Step forty, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And a fortieth step, writing the characters mapped by the codes of the arranged black units into lines to obtain 110001010110111110 serving as a binary character string.
In the fortieth step, the server side binary string 110001010110111110 is converted into hexadecimal, resulting in a server side password of 315 be.
The forty-third step, determining whether the server password 315be is consistent with a preset password preset at the server:
the login is passed because the server password 315be is consistent with the preset password 315be associated with the preset account preset at the server.
In a preferred embodiment of the present invention, a working method for a user to log in a server side by using a mobile phone device side includes the following steps:
s1, acquiring the input login account and login password at the mobile phone device end;
s2, respectively carrying out security processing on the login account or/and the login password acquired in the step S1 to obtain a login security account or/and a login security password;
s3, respectively carrying out security processing on the login security account or/and the login security password obtained in the step S2 to obtain the security account or/and the security password;
s4, respectively generating an account number QR code or/and a password QR code for the login security account number or/and the login security password obtained in the step S2;
s5, combining the secured account obtained in the step S3 with the QR code of the account generated in the step S4 to obtain an account combination code; or/and combining the security password obtained in the step S3 with the password QR code generated in the step S4 to obtain a password combination code;
and S6, sending the account combination code or/and the password combination code obtained in the step S5 and the login security account corresponding to the account combination code or/and the login security password corresponding to the password combination code to a server side for verification.
The method comprises the steps of aiming at a login account only, a login password only, a login account and a login password; aiming at the login account only, the method comprises the following steps:
s1, acquiring the input login account and login password at the mobile phone device end;
s2, performing login account security processing on the login account acquired in the step S1 to obtain a login security account;
s3, performing login safe account safety processing on the login safe account obtained in the step S2 to obtain the safe account;
s4, generating an account number QR code for the login safe account number obtained in the step S2;
s5, combining the secured account obtained in the step S3 with the QR code of the account generated in the step S4 to obtain an account combination code;
and S6, sending the account combination code obtained in the step S5, the input login password and the login safe account corresponding to the account combination code to a server side for verification.
Only aiming at the login password, the method comprises the following steps:
s1, acquiring the input login account and login password at the mobile phone device end;
s2, carrying out login password security processing on the login password obtained in the step S1 to obtain a login security password;
s3, carrying out login security password security processing on the login security password obtained in the step S2 to obtain a security password;
s4, generating a password (QR) code for the login security password obtained in the step S2;
s5, combining the security password obtained in the step S13 with the password QR code generated in the step S4 to obtain a password combination code;
and S6, sending the password combination code obtained in the step S5 and the login security password corresponding to the input login account and the password combination code to a server side for verification.
Aiming at a login account and a login password, the method comprises the following steps:
s1, acquiring the input login account and login password at the mobile phone device end;
s2, respectively carrying out security processing on the login account and the login password acquired in the step S1 to obtain a login security account and a login security password;
s3, respectively carrying out security processing on the login security account and the login security password obtained in the step S2 to obtain the security account and the security password;
s4, respectively generating an account QR code and a password QR code for the login security account and the login security password obtained in the step S2;
s5, combining the secured account obtained in the step S3 with the QR code of the account generated in the step S4 to obtain an account combination code; combining the security password obtained in the step S3 with the password QR code generated in the step S4 to obtain a password combination code;
and S6, sending the account combination code and the password combination code obtained in the step S5, and the login security account corresponding to the account combination code and the login security password corresponding to the password combination code to a server side for verification.
In a preferred embodiment of the present invention, in step S5, the method for combining the obtained secured account with the generated account QR code to obtain the account combination code thereof includes the following steps:
s51, converting the safety account number into a safety account number binary system;
s52, judging the relationship between the total number of binary digits of the safety account number and the total number of black cells in the QR code of the account number:
Figure BDA0003088575030000111
wherein x represents the total number of binary digits of the safety account number;
y represents the total number of black units in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z represents the total number of the QR codes of the account;
s53, if z is larger than or equal to 2, sequentially connecting the Z account number QR codes from left to right to obtain account number QR connecting codes; if z ═1, only one account QR code is available, and the account QR code is an account QR connection code; black units and white units in the QR connecting code of the account are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an A-th unit, wherein A is z multiplied by alpha 2 Wherein, alpha represents the size of the QR code of the account;
s54, encoding characters in a binary system of the safety account from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account to a y arrangement code in sequence;
s55, extracting the arrangement code mapped by the character corresponding to the y-th character of the account number to obtain a stop code; mapping characters 0 or 1 to other units of unmapped characters before the cut-off codes;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into lines to obtain binary character strings;
and S57, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
In a preferred embodiment of the present invention, in step S5, the method for combining the obtained security password with the generated password QR code to obtain the password combination code thereof includes the following steps:
s51, converting the security password into a security password binary system;
s52, judging the relationship between the total number of bits of the security code binary system and the total number of black cells in the code QR code:
Figure BDA0003088575030000121
wherein x' represents the total number of bits of the secure password binary;
y' represents the total number of black cells in the password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z' represents the total number of the password QR codes;
s53, if z 'is not less than 2, connecting the z' password QR codes from left to right in sequence to obtain the password QR connecting codes; if z' is 1, only one password QR code is available, and the password QR code is the password QR connecting code; black cells and white cells in the QR code concatenated code are encoded in the order from left to right and from top to bottom as 1 st cell, 2 nd cell, 3 rd cell, … …, and a 'th cell, where a' is z 'x α' 2 Wherein α' represents the size of the password QR code;
s54, encoding the characters in the binary system of the security password from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the y' th character of the password; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the first y 'of the password arrangement codes to obtain the y' password arrangement codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the y 'th character of the password to a y' password permutation code in sequence;
s55, extracting the password permutation code mapped by the character corresponding to the y' th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s56, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, the … … and the password cut-off code into lines to obtain binary character strings;
and S57, converting the binary character string into hexadecimal character string to obtain the cipher combination code.
In a preferred embodiment of the present invention, in step S5, the method for the server to verify the correctness of the account number binding code includes the following steps:
s51, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received login security account;
s52, judging the relationship between the total digits of the binary account number combination code and the total number of black cells and white cells in the QR code of the server-side account number:
Figure BDA0003088575030000131
wherein K represents the total digits of the binary account number binding codes;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
j represents the total number of the QR codes of the server-side account;
s53, if J is larger than or equal to 2, sequentially connecting the J server-side account numbers QR codes from left to right to obtain server-side account numbers QR connecting codes; if J is 1, only one server-side account number QR code is available, and the server-side account number QR code is the server-side account number QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of the server-side account from left to right and from top to bottom, wherein the black units and the white units are respectively a No. 1 unit, a No. 2 unit, a No. 3 unit, … … unit and a No. V unit, and V is J multiplied by delta 2 Wherein, δ represents the size of the QR code of the server-side account;
s54, encoding characters in the binary account number binding codes according to the sequence from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the Kth character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the Kth character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the Kth unit in sequence;
s55, extracting codes of black cells in the 1 st, 2 nd, 3 rd, … … th and K th cells;
s56, arranging the extracted codes of the black units in a descending order, writing the characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s57, converting the server binary character string into the binary character string which is the same as the safety account number in the step S13 to obtain the server account number;
s58, judging whether the server account number is consistent with a preset account number preset at the server side:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
In a preferred embodiment of the present invention, in step S58, the method for calculating the server-side password includes the following steps:
s581, the server side converts the received password combination code into a binary password combination code; generating a server-side password (QR) code from the received login security password;
s582, judging the relation between the total digits of the binary password combination code and the total number of black units and white units in the server-side password QR code:
Figure BDA0003088575030000132
wherein K' represents the total number of bits of the binary cipher code;
l' represents the total number of black units and white units in the server-side password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
j' represents the total number of the server-side password QR codes;
s583, if J 'is larger than or equal to 2, sequentially connecting the J' server-side password QR codes from left to right to obtain server-side password QR connecting codes; if J' is 1, only one server-side password QR code is available, and the server-side password QR code is the server-side password QR connecting code; black cells and white cells in the server-side password QR connection code are encoded in order from left to right and from top to bottom, i.e., the 1 st cell, the 2 nd cell, the 3 rd cell, … …, and the V 'th cell, and V' is J '× δ' 2 Wherein δ' represents the size of the server-side password QR code;
s584, coding characters in the binary password combination code from left to right, wherein the characters are a 1 st character, a 2 nd character, a 3 rd character, … … and a K' th character of the password respectively; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the K 'th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the K' th unit in sequence;
s585, extracting codes of black cells in the 1 st, 2 nd, 3 rd, … … rd, and K' th cells;
s586, arranging the extracted codes of the black units in a sequence from small to large, writing characters mapped by the arranged codes of the black units into lines, and obtaining a server-side binary character string;
s587, the server side binary string is converted to be the same as the security password system in the step S3, and the server side password is obtained.
For example, in the first step, the login account number input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account of the input login account;
Figure BDA0003088575030000141
in this embodiment, a security algorithm
Figure BDA0003088575030000143
The MD5 algorithm is adopted to obtain 32-bit lower case 16-system numerical values.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088575030000142
fourthly, an account QR code is generated for the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 5.
Fifth, convert its secured account number 188f3647551830c11fbd2d43563f1867 into a secured account number binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111.
Sixthly, judging the relationship between the total digits of the binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 of the safety account number and the total number of black cells in the QR code of the account number:
due to the fact that
Figure BDA0003088575030000151
Thus, it is possible to provide
Figure BDA0003088575030000152
Seventhly, because z is 1, the account QR code is an account QR connection code, as shown in fig. 5; if z is 2, sequentially connecting the 2 account QR codes from left to right to obtain account QR connecting codes; as shown in fig. 6; if z is 4, sequentially connecting the QR codes of the 4 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 7.
Eighthly, coding the black units and the white units in the account QR connection code shown in fig. 5 from left to right and from top to bottom in sequence, wherein the black units and the white units are respectively the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 841 rd unit, and the size of the account QR code is 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 9 th, 12 th, 16 th, 19 th, 20 th, 21 st, 23 rd, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, the character mapped on cell 29 is 1. (here, since only the first action example is taken in the ninth step, 1 to 20 digits of the binary system of the secured account number, that is, 11000100011110011011, whose corresponding hexadecimal system is c479b, and c479b is used as the preset account number stored in the server).
Step ten, mapping the characters 0 to the 8 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 14 th unit, the 15 th unit, the 17 th unit, the 18 th unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1.
The eleventh step, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into a line to obtain a binary character string 11000100000000010011100011011.
In the twelfth step, the binary string 11000100000000010011100011011 is converted into hexadecimal string 1880271b, i.e. the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088575030000153
fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088575030000154
the server-side preset account is 188f3647551830c11fbd2d43563f1867, and the server-side preset account 188f3647551830c11fbd2d43563f1867 is associated with a preset password of 188f3647551830c11fbd2d43563f 1867.
In the fifteenth step, a password QR code is generated for the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 5.
Sixthly, the security code 188f3647551830c11fbd2d43563f1867 is converted into the security code binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111.
Seventeenth step, judging the relationship between the total digits of the security code binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 and the total number of black cells in the code QR code:
due to the fact that
Figure BDA0003088575030000161
Thus, it is possible to provide
Figure BDA0003088575030000162
Eighteenth, because z' is 1, the password QR code is a password QR connection code, as shown in fig. 5; if z' is 2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 6; if z' is 4, sequentially connecting 4 password QR codes from left to right to obtain the password QR connecting code; as shown in fig. 7.
Nineteenth step, coding the black unit and the white unit in the password QR code shown in fig. 5 from left to right and from top to bottom in sequence, which are the 1 st unit, the 2 nd unit, the 3 rd unit, … …, and the 841 rd unit in sequence, respectively, and the size of the password QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, the character mapped on cell 29 is 1. (here, since only the first behavior example is taken in the twentieth step, 1-20 bits of the binary system of the security password, that is, 11000100011110011011, whose corresponding hexadecimal is c479b, are taken, and c479b is taken as the preset password associated with the preset account c479b stored in the server side).
Twenty-first, mapping character 0 to the 8 th, 10 th, 11 th, 13 th, 14 th, 15 th, 17 th, 18 th and 22 th units; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1.
In the twentieth step, the characters mapped by the units 1, 2, 3, … … and the password cut-off code are written into lines, and the binary string is 11000100000000010011100011011.
And a twentieth step of converting the binary string 11000100000000010011100011011 into a hexadecimal string 1880271b, thereby obtaining the password combination code.
And twenty-fourth step, sending the account combination code 1880271b, the login safe account 315be36db8ad7b3e3a7bb0839d6fa839, the password combination code 1880271b and the login safe password 315be36db8ad7b3e3a7bb0839d6fa839 to the server side.
The twenty-fifth step, the account combination code received by the server is 1880271b, and the login security account received by the server is 315be36db8ad7b3e3a7bb0839d6fa 839;
the twenty-sixth step, the server side converts the received account number binding code 1880271b into a binary account number binding code 11000100000000010011100011011; and generating a server-side account QR code from the received login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 5.
Twenty-seventh step, because
Figure BDA0003088575030000171
Thus, it is possible to provide
Figure BDA0003088575030000172
In the twenty-eighth step, since J is 1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 5; if J is 2, sequentially connecting the QR codes of the 2 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 6; if J is 4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 7.
And twenty-ninth step, sequentially coding black units and white units in the server-side account number QR connection code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit … … and a unit 841, and the size of the server-side account number QR code is 29.
Thirty, encoding characters in the binary account number combined code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 0, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, the character corresponding to the 15 th character is 0, the character corresponding to the 16 th character of the account is 1, the character corresponding to the 17 th character is 0, and the character corresponding to the 18 th character is 0, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 1, the character corresponding to the 21 st character of the account is 1, the character corresponding to the 22 th character of the account is 0, the character corresponding to the 23 rd character of the account is 0, the character corresponding to the 24 th character of the account is 0, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 0, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 1.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, the character mapped on the 29 th cell is 1.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain 11000100011110011011 binary character strings at the server end.
And a thirty-third step, converting the server-side binary string 11000100011110011011 into hexadecimal, and obtaining the server-side account number c479 b.
And thirty-fourth step, judging whether the server side account number c479b is consistent with a preset account number preset at the server side:
calculating a server-side password because the server-side account c479b is consistent with a preset account c479b preset at the server side;
thirty-fifth step, the server side converts the received password combination code 1880271b into a binary password combination code 11000100000000010011100011011; and generating a server-side password QR code from the received login security password 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 5.
Thirty-sixth step, because
Figure BDA0003088575030000181
Thus, it is possible to provide
Figure BDA0003088575030000182
Thirty-seventh step, since J' is 1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 5; if J' is 2, sequentially connecting the 2 server-side password QR codes from left to right to obtain a server-side password QR connecting code; as shown in fig. 6; if J' is 4, sequentially connecting the 4 server-side password QR codes from left to right to obtain the server-side password QR connecting codes; as shown in fig. 7.
And thirty-eighth step, sequentially encoding black units and white units in the server-side password QR connecting code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit … … and a unit 841, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding the characters in the binary password combination code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 0, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the character corresponding to the 16 th character of the password is 1, the character corresponding to the 17 th character of the password is 0, the character corresponding to the 18 th character is 0, the 19 th character of the password corresponds to the character 1, the 20 th character of the password corresponds to the character 1, the 21 st character of the password corresponds to the character 1, the 22 nd character of the password corresponds to the character 0, the 23 rd character of the password corresponds to the character 0, the 24 th character of the password corresponds to the character 0, the 25 th character of the password corresponds to the character 1, the 26 th character of the password corresponds to the character 1, the 27 th character of the password corresponds to the character 0, the 28 th character of the password corresponds to the character 1, and the 29 th character of the password corresponds to the character 1.
Step forty, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, the character mapped on cell 29 is 1.
And a fortieth step, writing the characters mapped by the codes of the arranged black units into lines to obtain 11000100011110011011 serving as a binary character string.
In the fortieth step, the server-side binary string 11000100011110011011 is converted to hexadecimal, resulting in its server-side password of c479 b.
The forty-third step, judging whether the server password c479b is consistent with the preset password preset at the server:
and if the server-side password c479b is consistent with the preset password c479b associated with the preset account preset at the server side, the login is passed.
For example, in the first step, the login account number input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account of the input login account;
Figure BDA0003088575030000183
in this embodiment, a security algorithm
Figure BDA0003088575030000184
The MD5 algorithm is adopted to obtain 32-bit lower case 16-system numerical values.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088575030000191
fourthly, an account QR code is generated for the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 5.
Fifth, convert its secured account number 188f3647551830c11fbd2d43563f1867 into a secured account number binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111.
Sixthly, judging the relationship between the total digits of the binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 of the safety account number and the total number of black units in the QR code of the account number:
due to the fact that
Figure BDA0003088575030000192
Thus, it is possible to provide
Figure BDA0003088575030000193
Seventhly, because z is 1, the account QR code is an account QR connection code, as shown in fig. 5; if z is 2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 6; if z is 4, sequentially connecting the QR codes of the 4 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 7.
Eighthly, coding black units and white units in the account QR connecting code shown in fig. 5 from left to right and from top to bottom in sequence, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit … … and a unit 841, and the size of the account QR code is 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 9 th, 12 th, 16 th, 19 th, 20 th, 21 st, 23 rd, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, the character mapped on cell 29 is 1. (here, since only the first action example is taken in the ninth step, 1 to 20 digits of the binary system of the secured account number, that is, 11000100011110011011, whose corresponding hexadecimal system is c479b, and c479b is used as the preset account number stored in the server).
Step ten, mapping the characters 0 to the 8 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 14 th unit, the 15 th unit, the 17 th unit, the 18 th unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1.
The eleventh step, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into a line to obtain a binary character string 11000100000000010011100011011.
In the twelfth step, the binary string 11000100000000010011100011011 is converted into hexadecimal string 1880271b, i.e. the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088575030000201
in this embodiment, a security algorithm
Figure BDA0003088575030000205
The MD5 algorithm is adopted to obtain a 32-bit lower case 16-system numerical value.
Fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088575030000202
in the fifteenth step, a password QR code is generated for the obtained security password 188f3647551830c11fbd2d43563f1867, as shown in fig. 2.
Sixthly, the login security password 315be36db8ad7b3e3a7bb0839d6fa839 is converted into a login security password binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001.
Seventeenth step, judging the relationship between the total digits of the login security password binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 and the total number of black cells in the password QR code:
due to the fact that
Figure BDA0003088575030000203
Thus, it is possible to provide
Figure BDA0003088575030000204
Eighteenth, since "z ═ 1, the password QR code is a password QR concatenated code, as shown in fig. 2; if' z is 2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 3; if' z is 4, sequentially connecting 4 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 4.
Nineteenth step, coding the black unit and the white unit in the password QR connecting code shown in fig. 2 from left to right and from top to bottom in sequence, which are the 1 st unit, the 2 nd unit, the 3 rd unit, … …, and the 841 rd unit in sequence, respectively, and the size of the password QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher code; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the first behavior example is taken in the twentieth step, 1 to 18 bits of the binary system of the security password, that is, 110001010110111110, which corresponds to a hexadecimal number of 315be, and 315be is taken as the preset password stored in the server).
Twenty-first, mapping character 0 to the 8 th unit, the 9 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 15 th unit, the 16 th unit, the 17 th unit, the 20 th unit, the 21 st unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 nd cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 0, the character mapped on cell 21 is 0, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0.
In the twenty-second step, the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the end code are written into a row to obtain a binary character string 11000100000100000110000111110.
The twentieth step converts the binary string 11000100000100000110000111110 into hexadecimal string 18820c3e, and obtains the cipher code.
And a twenty-fourth step, sending the account combination code 1880271b and the login safe account 315be36db8ad7b3e3a7bb0839d6fa839, the password combination code 18820c3e and the safe password 188f3647551830c11fbd2d43563f1867 to the server side.
The twenty-fifth step, the account combination code received by the server is 1880271b, and the login security account received by the server is 315be36db8ad7b3e3a7bb0839d6fa 839;
twenty-sixth step, the server side converts the received account number binding code 1880271b into a binary account number binding code 11000100000000010011100011011; and generating a server-side account QR code from the received login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 5.
Twentieth generationSeven steps are due to
Figure BDA0003088575030000211
Thus, it is possible to provide
Figure BDA0003088575030000212
In the twenty-eighth step, since J is 1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 5; if J is 2, sequentially connecting the QR codes of the 2 server-side account numbers from left to right to obtain a QR connecting code of the server-side account number; as shown in fig. 6; if J is 4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 7.
And twenty-ninth step, sequentially coding black units and white units in the server-side account number QR connection code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit … … and a unit 841, and the size of the server-side account number QR code is 29.
Thirty, encoding characters in the binary account number combined code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 0, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, the character corresponding to the 15 th character is 0, the character corresponding to the 16 th character of the account is 1, the character corresponding to the 17 th character is 0, and the character corresponding to the 18 th character is 0, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 1, the character corresponding to the 21 st character of the account is 1, the character corresponding to the 22 th character of the account is 0, the character corresponding to the 23 rd character of the account is 0, the character corresponding to the 24 th character of the account is 0, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 0, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 1.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, the character mapped on cell 29 is 1.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain 11000100011110011011 binary character strings at the server end.
And a thirty-third step, converting the server-side binary string 11000100011110011011 into hexadecimal, and obtaining the server-side account number c479 b.
And thirty-fourth step, judging whether the server side account number c479b is consistent with a preset account number preset at the server side:
calculating a server-side password because the server-side account c479b is consistent with a preset account c479b preset at the server side;
thirty-fifth step, the server side converts the received password combination code 18820c3e into a binary password combination code 11000100000100000110000111110; and generating a server-side password (QR) code from the received security password 188f3647551830c11fbd2d43563f1867, as shown in FIG. 2.
Thirty-sixth step, because
Figure BDA0003088575030000221
Thus, it is possible to provide
Figure BDA0003088575030000222
Thirty-seventh step, since "J ═ 1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 2; if 'J' is 2, connecting 2 server-side password QR codes from left to right in sequence to obtain a server-side password QR connecting code; as shown in fig. 3; if 'J' is 4, connecting 4 server-side password QR codes from left to right in sequence to obtain server-side password QR connecting codes; as shown in fig. 4.
And thirty-eighth step, sequentially coding the black unit and the white unit in the server-side password QR connecting code from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding the characters in the binary password combination code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 1, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the character corresponding to the 16 th character of the password is 0, the character corresponding to the 17 th character of the password is 0, the character corresponding to the 18 th character is 1, the 19 th character of the password corresponds to the character 1, the 20 th character of the password corresponds to the character 0, the 21 st character of the password corresponds to the character 0, the 22 nd character of the password corresponds to the character 0, the 23 rd character of the password corresponds to the character 0, the 24 th character of the password corresponds to the character 1, the 25 th character of the password corresponds to the character 1, the 26 th character of the password corresponds to the character 1, the 27 th character of the password corresponds to the character 1, the 28 th character of the password corresponds to the character 1, and the 29 th character of the password corresponds to the character 0.
Step forty, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And a fortieth step, writing the characters mapped by the codes of the arranged black units into lines to obtain 110001010110111110 serving as a binary character string.
In the fortieth step, the server side binary string 110001010110111110 is converted into hexadecimal, resulting in a server side password of 315 be.
The forty-third step, determining whether the server password 315be is consistent with a preset password preset at the server:
the login is passed because the server password 315be is consistent with the preset password 315be associated with the preset account preset at the server.
In a preferred embodiment of the present invention, after the user successfully logs in the server terminal by using the mobile phone device terminal, the default display information of the server is displayed on the mobile phone device terminal.
In a preferred embodiment of the present invention, the server-side default display information includes one or any combination of an approval module, a project management module, a personnel management module, an equipment management module, a learning module, an assessment module, a data management module, a task information module, and a gadget module.
In a preferred embodiment of the present invention, the project management module includes one or any combination of a help module, a project list module, a route calculation module, a new project module, and a project profile module;
the help module is used for providing an operation description of the software system; the item list module is used for displaying all items related to the current user; the line calculation module is used for calculating and displaying input data; the new project module is used for allowing a legal user to add a new project; the item profile module is used for displaying and providing basic information for modifying the selected items in the item list module. When the mobile phone equipment end receives a trigger signal of the project management module, displaying a help module, a project list module, a route calculation module, a newly-built project module and one, two, three, four or five of project profile modules on a touch display screen; in the interface state, if the mobile phone equipment end receives a help module trigger signal, displaying an operation instruction of the software system on the touch display screen; if the mobile phone equipment end receives the item list module trigger signal, displaying all items related to the current user on the touch display screen, and sequencing according to the time sequence; when the mobile phone equipment end receives a trigger signal of receiving a certain item, basic information of the item is displayed on the touch display screen, and the basic information comprises one or any combination of time for adding a new item, a place where the new item is added, a title, a user ID for adding the new item, an item progress and an item description. If the mobile phone equipment end receives a line calculation module trigger signal, displaying a calculation result of input data on the touch display screen; if the mobile phone equipment receives a new project module trigger signal, judging whether the user has the permission to add a new project, if so, displaying the added new project on a touch display screen, wherein the added new project comprises one or any combination of time for adding the new project, a place where the new project is added, a title and a user ID for adding the new project, and if not, prompting the user, and giving the administrator the permission to add the new project; and if the mobile phone equipment end receives the item profile module trigger signal, displaying and providing basic information for modifying the selected item in the item list module on the touch display screen.
In a preferred embodiment of the present invention, the line calculation module includes one or any combination of a data entry module, a data approval module, a parameter setting module, and a calculation result module;
the data output end of the data input module is connected with the data input end of the data approval module, the data output end of the data approval module is connected with the data input end of the parameter setting module, and the data output end of the parameter setting module is connected with the data input end of the calculation result module;
the data entry module is used for the entry of users with different authorities to the data; the data approval module is used for approving the input data; the parameter setting module is used for setting the format of the input data; and the calculation result module is used for displaying the calculation result of the approval process data. Firstly, a parameter setting user sets various parameter information used by the project at a parameter setting module; then, the bridge information is input into the data input module, stored on the server and submitted to a data approval person through the data approval module; and the data approval personnel check the data uploaded by the parameter setting user in the data approval module, if the data is qualified, the data is submitted to the upper-level data approval personnel through the data approval module, if the data is unqualified, and the corresponding data approval personnel is returned after modification opinions are added.
In a preferred embodiment of the present invention, the personnel management module includes one or any combination of a personnel information module, a user authority module, a personnel allocation module, a project allocation module and a role module;
the personnel information module is used for storing personal information of personnel, and comprises one or any combination of name, identification card number, contact telephone, age, native place, college and university, academic degree and work experience;
the user authority module is used for giving the user the authority to use the corresponding functional module; the personnel allocation module is used for recording personnel allocation process; the project allocation module is used for allocating personnel to each project name; the role module is used for defining the authority of the user. After the personnel information perfecting user perfects the personal information in the personnel information module, submitting the personal information to the personnel information examination and approval user for examination and approval; the personnel information approval user has the administrator authority granted by the role module, and after the personnel information module approves and passes the new personnel information, the information is stored in the server; the personnel transfer user provides a personnel demand plan at the personnel transfer module, the personnel demand examination and approval user examines and approves the demand plan, the examination and approval is given to other personnel transfer users through the initiating personnel transfer plan, after the other personnel transfer users agree, a transfer list is returned to the personnel demand examination and approval user, and finally the initiating plan personnel transfer user reports the actual personnel to the post; the role module is essentially a set of permissions, which facilitates rapid assignment of permissions to users, and administrators can change the roles of other users at the module.
In a preferred embodiment of the present invention, the device management module includes one or any combination of a device management method module, a device information module, and a device allocation module;
the equipment management method module is used for displaying the use and maintenance method of each equipment; the equipment information module is used for displaying various attributes of the item equipment, including one or any combination of type, starting date, checked date and maintenance record; the equipment transferring module is used for transferring the flow of the equipment. An equipment management user uploads a PDF file of 'Total station systematic item error checking method' in an equipment management method module, the measuring user checks the method in the module, and the total station is checked according to instructions; the equipment information user inputs new equipment information in the equipment information module, if the equipment information needs to be updated, an equipment information updating approval process needs to be initiated, after the approval of the upper-level equipment information user, the equipment information is changed, and the system prompts the user to scrap or send for inspection instrument equipment within 3 months in the future according to the latest inspected time and the appraisal age; and initiating equipment requirements in the equipment transferring module by the equipment transferring user, and transferring the required equipment to a requirement plan initiating project after the approval is passed.
In a preferred embodiment of the invention, the learning module comprises a learning material module or/and a quick self-test module;
the learning materials are used for displaying various learning materials; the quick self-testing module is used for testing the knowledge points by the user. The learning material user uploads training materials on the learning material module, the online learning user browses the learning materials online through the module, and after learning is finished, the online learning user can enter the rapid self-testing module to test knowledge proficiency according to the sections selected by the current learning material module.
In a preferred embodiment of the invention, the examination module comprises an question bank module, a test paper module, an examination module and a result analysis module; the question bank module is used for inputting an examination question bank and a self-testing question bank, and the test paper combining module and the rapid self-testing module respectively select test questions from the examination question bank and the self-testing question bank; the examination paper combining module is used for customizing examination ranges, examination time and reference personnel by a user to extract questions and combine papers; the examination module is used for a reference person to take an examination; and the result analysis module checks the examination result and obtains various analysis results. The question bank input user inputs the test questions in the question bank module singly or in batches and performs necessary editing; selecting 100 questions from a level measurement question bank in a group test module by a group test user, and examining and saying that users to be tested exist at 18:00 days 2021.1.5; a user to be tested takes an examination at 2021.1.5 days 18:00 on time, and the result of the examination including total score, correct rate, wrong question, answer time and the like is checked through the result analysis module; the examination paper user can check examination success rate, average score, error-prone questions and the like through the result analysis module.
In a preferred embodiment of the invention, the task information module comprises one or any combination of a project management approval module, a learning task module, an assessment task module and an equipment management approval module;
the project management approval module is used for prompting a user about a process to be approved in project management and providing a quick entrance for approval; the learning task module is used for prompting a user to learn a task and providing a learning shortcut entrance; the examination task module is used for prompting the examination task of the user and providing a quick entrance for taking an examination; the equipment management approval module is used for prompting the user equipment management aspect to-be-approved process and providing a quick entrance for approval. The project management user sees that 12 platform data of the Beijing bridge project need to be examined and approved in the project management examination and approval module, the data are examined and approved through a quick entrance, if the data are not wrong, all the users are authorized to use the data, and if the data are wrong, the opinion is returned to the examination and approval initiator; a user to be learned sees the first chapter of leveling needing to be learned in the current month in a learning task, and online learning can be carried out through a quick entrance; the user to be tested can immediately take a leveling test after seeing the examination task and can take the test through a quick entrance; and the equipment management user checks the equipment transfer approval process in the equipment management approval module and approves the data through a quick entrance.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (6)

1. An engineering measurement intelligent management platform comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, and is characterized in that a user logs in the server end by using the mobile phone equipment end; the working method for logging in the server by the user through the mobile phone equipment comprises the following steps:
s1, acquiring the input login account and login password at the mobile phone device end;
s2, respectively performing security processing on the login account or/and the login password acquired in the step S1 to obtain a login security account or/and a login security password;
s3, respectively carrying out security processing on the login security account or/and the login security password obtained in the step S2 to obtain the security account or/and the security password;
s4, respectively generating an account number QR code or/and a password QR code for the secured account number or/and the secured password obtained in the step S3;
s5, combining the login safe account obtained in the step S2 with the QR code of the account generated in the step S4 to obtain an account combination code; or/and combining the login security password obtained in the step S2 with the password QR code generated in the step S4 to obtain a password combination code; the method for obtaining the account number combination code comprises the following steps:
s51, converting the login safety account number into a login safety account number binary system;
s52, judging the relationship between the total number of digits of the binary system of the login safety account and the total number of black cells in the QR code of the account:
Figure FDA0003618428860000011
wherein,' x represents the total number of digits of the binary system of the login safety account;
"y represents the total number of black cells in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"z represents the total number of account number QR codes;
s53, if 'z is larger than or equal to 2, sequentially connecting' z account QR codes from left to right to obtain account QR connecting codes; if' z is 1, only one account QR code is available, and the account QR code is an account QR connection code; sequentially coding black units and white units in the QR connecting code of the account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an A th unit, and A ═ z × "alpha- 2 Wherein,' alpha represents the size of the account QR code;
s54, encoding characters in a binary system of the login safety account from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 'y' th character of the account; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the' y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the ' y ' th character of the account to a ' y arrangement code in sequence;
s55, extracting the arrangement code mapped by the character corresponding to the 'y' th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of the unmapped characters before the cut-off codes;
s56, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, the … … and the cut-off code into lines to obtain binary character strings;
s57, converting the binary character string into a hexadecimal character string to obtain the account number combination code;
and S6, sending the account combination code or/and the password combination code obtained in the step S5 and the safety account corresponding to the account combination code or/and the safety password corresponding to the password combination code to a server.
2. The intelligent management platform for engineering measurement according to claim 1, wherein in step S2, the method for performing login account security processing on the acquired login account to obtain the login security account includes:
Figure FDA0003618428860000021
wherein Locinsecuritynumber represents a login security account;
the method for carrying out login password security processing on the obtained login password to obtain the login security password comprises the following steps:
Figure FDA0003618428860000031
security number represents a login password;
loginsafetynumber denotes a login security password.
3. The intelligent management platform for engineering measurement according to claim 1, wherein in step S3, the obtained login security account is subjected to login security account security processing, and the method for obtaining the security account comprises:
Figure FDA0003618428860000032
wherein the content of the first and second substances,
Figure FDA0003618428860000033
representing a security algorithm;
logins securitynumber represents a login secured account number;
loginstecurynymber' represents a secured account number;
the method for performing login security password security processing on the obtained login security password to obtain the security password comprises the following steps:
Figure FDA0003618428860000034
loginsafetynumber represents a login security password;
loginsafetynumber' denotes a security password.
4. The intelligent management platform for engineering measurement according to claim 1, further comprising a step S7 in which the server verifies the correctness of the received account number combination code or/and password combination code and the security account number corresponding to the account number combination code or/and the security password corresponding to the password combination code.
5. The intelligent management platform for engineering measurement as claimed in claim 4, wherein in step S7, the method for the server to verify the correctness of the account number binding code includes the following steps:
s71, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received safe account;
s72, judging the relationship between the total digits of the binary account number combination code and the total number of black cells and white cells in the QR code of the server-side account number:
Figure FDA0003618428860000041
the 'K' represents the total digit of the binary account number combined code;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"J represents the total number of server-side account QR codes;
s73, if 'J is larger than or equal to 2, sequentially connecting the QR codes of the' J server-side accounts from left to right to obtain the QR connecting codes of the server-side accounts; if' J ═ 1, only one server-side account number QR code is present, and the server-side account number QR code is a server-side account number QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of the server-side account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a V th unit, and V is ═ J × "delta ^ respectively 2 The method comprises the following steps that a 'delta' represents the size of a QR code of a server-side account;
s74, encoding characters in the binary account number binding codes according to the sequence from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 'K' character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 'K' character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 'K' unit in sequence;
s75, extracting the codes of black units in the 1 st unit, the 2 nd unit, the 3 rd unit, the … … th unit and the' K unit;
s76, arranging the extracted codes of the black units in a descending order, writing the characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s77, converting the server binary character string into the binary character string which is the same as the login safety account number in the step S2 to obtain the server account number;
s78, judging whether the server account is consistent with a preset account preset at the server side:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server-side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server-side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
6. The intelligent management platform for engineering measurement according to claim 1, wherein after the user successfully logs in the server through the mobile phone device, the default display information of the server is displayed on the mobile phone device.
CN202110588711.5A 2021-05-28 2021-05-28 Engineering survey intelligent management platform Active CN113312534B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110588711.5A CN113312534B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110588711.5A CN113312534B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management platform

Publications (2)

Publication Number Publication Date
CN113312534A CN113312534A (en) 2021-08-27
CN113312534B true CN113312534B (en) 2022-08-05

Family

ID=77375714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110588711.5A Active CN113312534B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management platform

Country Status (1)

Country Link
CN (1) CN113312534B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN108334919A (en) * 2018-04-16 2018-07-27 南京中印防伪科技有限公司 A kind of product false proof verification method and its system based on Quick Response Code
CN110688644A (en) * 2019-10-09 2020-01-14 重庆市筑智建信息技术有限公司 Method and system for realizing login of BIM system through graphic code

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107862364B (en) * 2017-11-08 2018-09-07 王少龙 A kind of generation method and system of the individual identification mark that plain code is combined with password
US11374759B2 (en) * 2018-10-29 2022-06-28 Xiid Corporation Username-less and password-less one-time identification and authentication code method and system
US11363014B2 (en) * 2019-05-02 2022-06-14 Xiid Corporation Method and system for securely authenticating a user by an identity and access service using a pictorial code and a one-time code

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN108334919A (en) * 2018-04-16 2018-07-27 南京中印防伪科技有限公司 A kind of product false proof verification method and its system based on Quick Response Code
CN110688644A (en) * 2019-10-09 2020-01-14 重庆市筑智建信息技术有限公司 Method and system for realizing login of BIM system through graphic code

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
QR code based color image stego-crypto technique using dynamic bit replacement and logistic map;Mathivanan P.等;《Optik》;20201101;第225卷;1-8 *
RSA加密二维码在防伪溯源系统中的应用;陈靖雯等;《宁波工程学院学报》;20170117(第04期);36-41 *
基于多因素认证的安全移动支付技术研究;于其洪;《中国优秀硕士学位论文全文数据库 信息科技辑》;20190215(第02期);I138-223 *

Also Published As

Publication number Publication date
CN113312534A (en) 2021-08-27

Similar Documents

Publication Publication Date Title
CN109741118A (en) Invoice issuing method, apparatus, equipment and computer readable storage medium
CN113407517B (en) Data quality health degree analysis method and system based on multidimensional analysis technology
CN108416343A (en) A kind of facial image recognition method and device
CN109801174A (en) Claims Resolution data processing method, device, equipment and computer readable storage medium
CN110688536A (en) Label prediction method, device, equipment and storage medium
CN111815169A (en) Business approval parameter configuration method and device
CN108959218A (en) Form validation method and device, electronic equipment and computer readable storage medium
CN111931047B (en) Artificial intelligence-based black product account detection method and related device
CN112906361A (en) Text data labeling method and device, electronic equipment and storage medium
CN112711640A (en) Method and device for configuring business handling process
CN113312534B (en) Engineering survey intelligent management platform
CN107992527A (en) Data markers method of calibration, server and storage medium
CN113051180B (en) Method, device, equipment and storage medium for monitoring test task
CN113312535B (en) Engineering survey intelligent management control cloud platform
CN113312536B (en) Engineering survey intelligent management control platform
CN113807728A (en) Performance assessment method, device, equipment and storage medium based on neural network
CN113837113A (en) Document verification method, device, equipment and medium based on artificial intelligence
CN109032956A (en) A kind of interface test method and device
CN111651500A (en) User identity recognition method, electronic device and storage medium
CN111488269B (en) Index detection method, device and system for data warehouse
CN107944507A (en) Packaging products in boxes error-reporting method and its system
CN112085469A (en) Data approval method, device, equipment and storage medium based on vector machine model
CN113379371A (en) Method and system for automatically classifying event works
CN112396418A (en) Information processing method, device and system
CN112559012A (en) System upgrading and testing method and device, computer equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant