CN113312535A - Engineering measurement intelligent management control cloud platform - Google Patents

Engineering measurement intelligent management control cloud platform Download PDF

Info

Publication number
CN113312535A
CN113312535A CN202110588790.XA CN202110588790A CN113312535A CN 113312535 A CN113312535 A CN 113312535A CN 202110588790 A CN202110588790 A CN 202110588790A CN 113312535 A CN113312535 A CN 113312535A
Authority
CN
China
Prior art keywords
password
character
account
code
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110588790.XA
Other languages
Chinese (zh)
Other versions
CN113312535B (en
Inventor
徐其学
高兵
吕超武
谢先武
熊军
罗勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Railway 11th Bureau Group Co Ltd
Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd
Original Assignee
China Railway 11th Bureau Group Co Ltd
Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Railway 11th Bureau Group Co Ltd, Fifth Engineering Co Ltd of China Railway 11th Bureau Group Co Ltd filed Critical China Railway 11th Bureau Group Co Ltd
Priority to CN202110588790.XA priority Critical patent/CN113312535B/en
Publication of CN113312535A publication Critical patent/CN113312535A/en
Application granted granted Critical
Publication of CN113312535B publication Critical patent/CN113312535B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention provides an engineering measurement intelligent management control cloud platform which comprises a data output end of an acquisition module connected with a data input end of a first safety processing module, a data output first end of the first safety processing module connected with a data input end of a second safety processing module, a data output second end of the first safety processing module connected with a data input end of a first generation module, a data output end of the first generation module connected with a data input first end of the second generation module, a data output end of the second safety processing module connected with a data input first end of the second generation module, and a data output end of the second generation module connected with a data input end of a sending module. The method and the system can ensure the safe login to the cloud platform, prevent the login account and the login password from being cracked in the transmission process, and ensure the safety of the user.

Description

Engineering measurement intelligent management control cloud platform
Technical Field
The invention relates to the technical field of cloud platforms, in particular to an engineering measurement intelligent management control cloud platform.
Background
With the continuous development of the big data era, security becomes a hot topic, and patent application No. 2015110319802, entitled "two-dimensional code scanning authentication login method and related device", discloses that after a second client (mobile client) logs in and authenticates through a target system, a two-dimensional code is scanned, information in the two-dimensional code is extracted to generate binding information, the binding information is sent to the target system through a security platform, login processing of a first client is performed, and fast login of the first client can be achieved through the interaction. Meanwhile, the security platform is added to serve as a link between the mobile device and the server, interaction between the mobile terminal and the server needs to pass through the security forwarding platform, and interaction between the mobile terminal and the server cannot be carried out directly, so that the server can be prevented from being exposed in an external network environment, and attacks on the server are reduced. Meanwhile, the security platform encrypts the request information for fast scanning login, so that potential safety hazards such as brute force attack and intrusion on the verification system after the scanning code is intercepted by an extranet person can be prevented.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides an engineering measurement intelligent management control cloud platform.
In order to achieve the above purpose, the invention provides an engineering measurement intelligent management control cloud platform, which comprises a mobile phone equipment end and a server end capable of achieving wireless communication with the mobile phone equipment end, wherein a user logs in the server end by using the mobile phone equipment end, and the mobile phone equipment end comprises an acquisition module, a first safety processing module, a second safety processing module, a first generation module, a second generation module and a sending module;
the data output end of the acquisition module is connected with the data input end of the first safety processing module, the data output first end of the first safety processing module is connected with the data input end of the second safety processing module, the data output second end of the first safety processing module is connected with the data input first end of the first generation module, the data output first end of the second safety processing module is connected with the data input second end of the first generation module, the data output end of the first generation module is connected with the data input first end of the second generation module, the data output second end of the second safety processing module is connected with the data input second end of the second generation module, the data output third end of the first safety processing module is connected with the data input third end of the second generation module, and the data output end of the second generation module is connected with the data input end of the sending module;
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device end;
the first security processing module is used for respectively carrying out security processing on the login account and the login password acquired in the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the first generation module is used for generating an account number QR code for the login safety account number obtained in the first safety processing module and generating a password QR code for the safety password obtained in the second safety processing module;
the second generation module is used for combining the security account obtained in the second security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the login security password obtained in the first security processing module with the password QR code generated in the first generation module to obtain a password combination code;
the sending module sends the account number combination code and the password combination code obtained in the second generating module of the sending module, and the login safety account number corresponding to the account number combination code and the safety password corresponding to the password combination code to the server side for verification;
or the following steps:
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device end;
the first security processing module is used for respectively carrying out security processing on the login account and the login password acquired in the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the first generation module is used for generating an account number QR code for the safety account number obtained from the second safety processing module and a password QR code for the login safety password obtained from the first safety processing module;
the second generation module is used for combining the login security account obtained in the first security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the security password obtained in the second security processing module with the password QR code generated in the first generation module to obtain a password combination code;
and the sending module sends the account number combination code and the password combination code obtained in the second generating module and the login security password corresponding to the security account number and the password combination code corresponding to the account number combination code to the server side for verification.
In conclusion, by adopting the technical scheme, the invention can ensure safe login to the cloud platform, prevent the login account and the login password from being cracked in the transmission process and ensure the safety of the user.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the connection of the present invention.
Fig. 2 is a schematic diagram of a QR code of an account according to the present invention.
Fig. 3 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 4 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 5 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 6 is a schematic diagram of a QR connection code of an account according to the present invention.
Fig. 7 is a schematic diagram of a QR connection code of an account according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention discloses an engineering measurement intelligent management control cloud platform which comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, wherein a user logs in the server end by using the mobile phone equipment end, and the mobile phone equipment end comprises an acquisition module, a first safety processing module, a second safety processing module, a first generation module, a second generation module and a sending module;
as shown in fig. 1, the data output end of the acquisition module is connected to the data input end of the first security processing module, the data output first end of the first security processing module is connected to the data input end of the second security processing module, the data output second end of the first security processing module is connected to the data input first end of the first generation module, the data output first end of the second security processing module is connected to the data input second end of the first generation module, the data output end of the first generation module is connected to the data input first end of the second generation module, the data output second end of the second security processing module is connected to the data input second end of the second generation module, the data output third end of the first security processing module is connected to the data input third end of the second generation module, and the data output end of the second generation module is connected to the data input end of the transmission module;
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device end;
the first security processing module is used for respectively carrying out security processing on the login account and the login password acquired in the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the first generation module is used for generating an account number QR code for the login safety account number obtained in the first safety processing module and generating a password QR code for the safety password obtained in the second safety processing module;
the second generation module is used for combining the security account obtained in the second security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the login security password obtained in the first security processing module with the password QR code generated in the first generation module to obtain a password combination code;
the sending module sends the account number combination code and the password combination code obtained in the second generating module of the sending module, and the login safety account number corresponding to the account number combination code and the safety password corresponding to the password combination code to the server side for verification;
or the following steps:
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device end;
the first security processing module is used for respectively carrying out security processing on the login account and the login password acquired in the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the first generation module is used for generating an account number QR code for the safety account number obtained from the second safety processing module and a password QR code for the login safety password obtained from the first safety processing module;
the second generation module is used for combining the login security account obtained in the first security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the security password obtained in the second security processing module with the password QR code generated in the first generation module to obtain a password combination code;
and the sending module sends the account number combination code and the password combination code obtained in the second generating module and the login security password corresponding to the security account number and the password combination code corresponding to the account number combination code to the server side for verification.
In a preferred embodiment of the present invention, in the first security processing module, the method for performing security processing on the login account to obtain the login security account includes:
Loginsecuritynumber=sha[[securitynumber]],
wherein sha [ ] ] represents a security algorithm;
securitynumber represents a login account;
logins securitynumber represents a login secured account number;
the method for carrying out login password security processing on the obtained login password to obtain the login security password comprises the following steps:
Loginsafetynumber=sha[[safetynumber]],
security number represents a login password;
loginsafetynumber denotes a login security password.
In a preferred embodiment of the present invention, in the second security processing module, the method for performing secure processing on the obtained login secured account to obtain the secured account thereof includes:
Loginsecuritynumber′=sha[[Loginsecuritynumber]],
wherein sha [ ] ] represents a security algorithm;
logins securitynumber represents a login secured account number;
loginstecurynymber' represents a secured account number;
the method for performing login security password security processing on the obtained login security password to obtain the security password comprises the following steps:
Loginsafetynumber′=sha[[Loginsafetynumber]],
loginsafetynumber represents a login security password;
loginsafetynumber' denotes a security password.
In a preferred embodiment of the present invention, in the second generation module, the method for combining the obtained secured account with the generated account QR code to obtain the account combination code thereof includes the following steps:
s151, converting the safety account number into a safety account number binary system;
s152, judging the relationship between the total number of binary digits of the safety account and the total number of black units in the QR code of the account:
Figure BDA0003088639720000041
wherein x represents the total number of binary digits of the safety account number;
y represents the total number of black units in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z represents the total number of the QR codes of the account;
s153, if z is larger than or equal to 2, sequentially connecting the QR codes of the z accounts from left to right to obtain QR connecting codes of the accounts; if z is 1, only one account QR code is available, and the account QR code is an account QR connection code; black units and white units in the QR connecting code of the account are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an A-th unit, wherein A is z multiplied by alpha2Wherein, alpha represents the size of the QR code of the account;
s154, encoding characters in a binary system of the safety account number from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account number respectively; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account to a y arrangement code in sequence;
s155, extracting the arrangement code mapped by the character corresponding to the y-th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of unmapped characters before the cut-off codes;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into lines to obtain binary character strings;
and S157, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
In a preferred embodiment of the present invention, the method for combining the obtained login security password with the generated password QR code in the second generation module to obtain the password combination code thereof includes the following steps:
s151, converting the login security password into a login security password binary system;
s152, judging the relation between the total digits of the login security password binary system and the total number of black units in the password QR code:
Figure BDA0003088639720000042
wherein,' x represents the total number of digits of the login security password binary system;
"y represents the total number of black cells in the password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"z represents the total number of the cryptographic QR code;
s153, if the ' z ' is larger than or equal to 2, sequentially connecting the ' z password QR codes from left to right to obtain password QR connecting codes thereof; if' z is 1, only one password QR code is available, and the password QR code is a password QR connecting code; sequentially coding a black unit and a white unit in the QR code from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a 'A' unit, wherein 'A' -Z '-alpha' is formed2Wherein,' α represents the size of the password QR code;
s154, encoding the characters in the login security password binary system from left to right, wherein the characters are respectively the 1 st character, the 2 nd character, the 3 rd character, … … and the' -y character of the password; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the first Y password permutation codes to obtain the Y password permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the Y th character of the password to the Y password arrangement code in sequence;
s155, extracting the password arrangement code mapped by the character corresponding to the Y-th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the password cut-off code into lines to obtain binary character strings;
and S157, converting the binary character string into a hexadecimal character string to obtain the password combination code.
In a preferred embodiment of the present invention, a method for a server to verify correctness of an account number binding code includes the following steps:
s151, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received login security account;
s152, judging the relation between the total digits of the binary account number combination code and the total number of black units and white units in the QR code of the server-side account number:
Figure BDA0003088639720000051
wherein K represents the total digits of the binary account number binding codes;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
j represents the total number of the QR codes of the server-side account;
s153, if J is larger than or equal to 2, sequentially connecting the QR codes of the J server-side accounts from left to right to obtain a QR connecting code of the server-side account; if J is 1, only one server-side account number QR code is available, and the server-side account number QR code is the server-side account number QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of the server-side account from left to right and from top to bottom, wherein the black units and the white units are respectively a No. 1 unit, a No. 2 unit, a No. 3 unit, … … unit and a No. V unit, and V is J multiplied by delta2Wherein, δ represents the size of the QR code of the server-side account;
s154, encoding characters in the binary account number binding code from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the Kth character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the Kth character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the Kth unit in sequence;
s155, extracting codes of black cells in the 1 st cell, the 2 nd cell, the 3 rd cell, … … and the K th cell;
s156, arranging the extracted codes of the black units in a sequence from small to large, and writing characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s157, converting the server binary character string into the binary string which is the same as the safety account number in the step S13, and obtaining the server account number;
s158, determining whether the server account is consistent with a preset account preset at the server:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
In a preferred embodiment of the present invention, the method for calculating the server-side password comprises the following steps:
s581, the server end converts the received password combination code into a binary password combination code; generating a server-side password (QR) code from the received security password;
s582, judging the relation between the total digits of the binary password combination code and the total number of black units and white units in the server-side password QR code:
Figure BDA0003088639720000061
wherein,' K represents the total number of bits of the binary cipher-code combination code;
the' L represents the total number of black units and white units in the QR code at the server side;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
' J represents the total number of the server-side password QR codes;
s583, if the ' J ' is larger than or equal to 2, sequentially connecting the ' J server-side password QR codes from left to right to obtain server-side password QR connecting codes; if' J ═ 1, only one server-side password QR code is available, and the server-side password QR code is the server-side password QR connecting code; sequentially coding a black unit and a white unit in the QR connecting code at the server end from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a V th unit, and the V is 'J x' delta2Wherein,' delta represents the size of the server-side password QR code;
s584, coding the characters in the binary password combination code from left to right, wherein the characters are respectively a password 1 st character, a password 2 nd character, a password 3 rd character, … … and a password K; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the K-th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the K-th unit in sequence;
s585, extracting the codes of black units in the 1 st unit, the 2 nd unit, the 3 rd unit, … … th unit and the 'K' unit;
s586, arranging the extracted codes of the black units in a sequence from small to large, writing characters mapped by the arranged codes of the black units into lines, and obtaining a server-side binary character string;
s587, the server side binary string is converted to be the same as the login security password system in the step S2, and the server side password is obtained. In the present embodiment, the present invention further includes:
the following operations are performed on the server-side password:
`Loginsafetynumber=sha[[``safetynumber]],
wherein sha [ ] ] represents a security algorithm;
"security number represents a server-side password;
"Loginsafetynumber represents a password security value;
judging whether the password security value' Loginsetynumber is consistent with the received security password:
if the password security value' Loginsetynumber is consistent with the received security password, executing to judge whether the password of the server side is consistent with a preset password associated with a preset account preset at the server side;
if the password security value' Loginsafetynumber is inconsistent with the received security password, returning to the step S1581, and if the number of times of returning reaches the password returning set number threshold, failing to log in.
For example, in the first step, the login account number input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account of the input login account;
Figure BDA0003088639720000071
in the embodiment, the safety algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower-case 16-system numerical values thereof.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088639720000072
fourthly, an account QR code is generated for the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Fifthly, the secured account number 188f3647551830c11fbd2d43563f1867 is converted into a secured account binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111.
Sixthly, judging the relationship between the total digits of the binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 of the safety account number and the total number of black cells in the QR code of the account number:
due to the fact that
Figure BDA0003088639720000073
Thus, it is possible to provide
Figure BDA0003088639720000074
Seventhly, because z is 1, the account QR code is an account QR connection code, as shown in fig. 2; if z is 2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 3; if z is 4, sequentially connecting the QR codes of the 4 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 4.
Eighthly, coding black units and white units in the account QR connection code shown in fig. 2 from left to right and from top to bottom in sequence, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit in sequence, and the size of the account QR code is 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 9 th, 12 th, 16 th, 19 th, 20 th, 21 st, 23 rd, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, the character mapped on cell 29 is 1. (here, since only the first behavior example is taken in the ninth step, 1 to 20 bits of the binary system of the secured account number, that is, 11000100011110011011, whose corresponding hexadecimal is c479b, and c479b is taken as the preset account number stored in the server).
Step ten, mapping the characters 0 to the 8 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 14 th unit, the 15 th unit, the 17 th unit, the 18 th unit and the 22 nd unit; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1.
The eleventh step, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into a line to obtain a binary character string 11000100000000010011100011011.
In the twelfth step, the binary string 11000100000000010011100011011 is converted into hexadecimal string 1880271b, i.e. the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088639720000081
in the embodiment, the safety algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower-case 16-system numerical values thereof.
Fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088639720000082
in the fifteenth step, a password QR code is generated for the obtained security password 188f3647551830c11fbd2d43563f1867, as shown in fig. 5.
Sixthly, the login security password 315be36db8ad7b3e3a7bb0839d6fa839 is converted into a login security password binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001.
Seventeenth step, judging the relationship between the total digits of the login security password binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 and the total number of black cells in the password QR code:
due to the fact that
Figure BDA0003088639720000083
Thus, it is possible to provide
Figure BDA0003088639720000084
Eighteenth, since "z ═ 1, the password QR code is a password QR concatenated code, as shown in fig. 5; if' z is 2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 6; if' z is 4, sequentially connecting 4 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 7.
Nineteenth step, coding the black unit and the white unit in the password QR code shown in fig. 5 from left to right and from top to bottom in sequence, which are the 1 st unit, the 2 nd unit, the 3 rd unit, … …, and the 841 rd unit in sequence, respectively, and the size of the password QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher code; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the first behavior example is taken in the twentieth step, 1 to 18 bits of the binary system of the security password, that is, 110001010110111110, which corresponds to a hexadecimal number of 315be, and 315be is taken as the preset password stored in the server).
Twenty-first, mapping character 0 to the 8 th, 9 th, 10 th, 11 th, 13 th, 15 th, 16 th, 17 th, 20 th, 21 st and 22 nd units; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 nd cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 0, the character mapped on cell 21 is 0, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0.
In the twenty-second step, the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code are written into a row, and the binary character string is 11000100000100000110000111110.
The twentieth step converts the binary string 11000100000100000110000111110 into hexadecimal string 18820c3e, and obtains the cipher code.
And a twenty-fourth step, sending the account combination code 1880271b and the login secured account 315be36db8ad7b3e3a7bb0839d6fa839, the password combination code 18820c3e and the secured password 188f3647551830c11fbd2d43563f1867 to the server side.
The twenty-fifth step, the account combination code received by the server is 1880271b, and the login security account received by the server is 315be36db8ad7b3e3a7bb0839d6fa 839;
the twenty-sixth step, the server side converts the received account number binding code 1880271b into a binary account number binding code 11000100000000010011100011011; and generating a server-side account QR code from the received login secure account 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 2.
Twenty-seventh step, because
Figure BDA0003088639720000091
Thus, it is possible to provide
Figure BDA0003088639720000092
In the twenty-eighth step, since J is 1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 2; if J is 2, sequentially connecting the QR codes of the 2 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 3; if J is 4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 4.
And twenty-ninth step, sequentially coding black units and white units in the server-side account number QR connection code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit … … and a unit 841, and the size of the server-side account number QR code is 29.
Thirty, encoding characters in the binary account number combined code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 0, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, the character corresponding to the 15 th character is 0, the character corresponding to the 16 th character of the account is 1, the character corresponding to the 17 th character is 0, and the character corresponding to the 18 th character is 0, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 1, the character corresponding to the 21 st character of the account is 1, the character corresponding to the 22 th character of the account is 0, the character corresponding to the 23 rd character of the account is 0, the character corresponding to the 24 th character of the account is 0, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 0, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 1.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, the character mapped on cell 29 is 1.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain 11000100011110011011 binary character strings at the server end.
And a thirty-third step, converting the server-side binary string 11000100011110011011 into hexadecimal, and obtaining the server-side account number c479 b.
And thirty-fourth step, judging whether the server side account number c479b is consistent with a preset account number preset at the server side:
calculating a server-side password because the server-side account c479b is consistent with a preset account c479b preset at the server side;
thirty-fifth step, the server side converts the received password combination code 18820c3e into a binary password combination code 11000100000100000110000111110; and generating a server-side password (QR) code from the received security password 188f3647551830c11fbd2d43563f1867, as shown in FIG. 5.
Thirty-sixth step, because
Figure BDA0003088639720000101
Thus, it is possible to provide
Figure BDA0003088639720000102
Thirty-seventh step, since "J ═ 1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 5; if 'J' is 2, connecting 2 server-side password QR codes from left to right in sequence to obtain a server-side password QR connecting code; as shown in fig. 6; if 'J' is 4, connecting 4 server-side password QR codes from left to right in sequence to obtain server-side password QR connecting codes; as shown in fig. 7.
And thirty-eighth step, sequentially coding the black unit and the white unit in the server-side password QR connecting code from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding the characters in the binary password combination code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 1, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the character corresponding to the 16 th character of the password is 0, the character corresponding to the 17 th character of the password is 0, the character corresponding to the 18 th character is 1, the 19 th character of the password corresponds to the character 1, the 20 th character of the password corresponds to the character 0, the 21 st character of the password corresponds to the character 0, the 22 nd character of the password corresponds to the character 0, the 23 rd character of the password corresponds to the character 0, the 24 th character of the password corresponds to the character 1, the 25 th character of the password corresponds to the character 1, the 26 th character of the password corresponds to the character 1, the 27 th character of the password corresponds to the character 1, the 28 th character of the password corresponds to the character 1, and the 29 th character of the password corresponds to the character 0.
Step forty, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And a fortieth step, writing the characters mapped by the codes of the arranged black units into lines to obtain 110001010110111110 serving as a binary character string.
In the fortieth step, the server side binary string 110001010110111110 is converted into hexadecimal, resulting in a server side password of 315 be.
The forty-third step, determining whether the server password 315be is consistent with a preset password preset at the server:
the login is passed because the server password 315be is consistent with the preset password 315be associated with the preset account preset at the server.
In a preferred embodiment of the present invention, in the second generation module, the method for combining the obtained login security account with the generated account QR code to obtain the account combination code thereof includes the following steps:
s51, converting the login safety account number into a login safety account number binary system;
s52, judging the relationship between the total number of digits of the binary system of the login safety account and the total number of black cells in the QR code of the account:
Figure BDA0003088639720000111
wherein,' x represents the total number of digits of the binary system of the login safety account;
"y represents the total number of black cells in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"z represents the total number of account number QR codes;
s53, if 'z is larger than or equal to 2, sequentially connecting' z account QR codes from left to right to obtain account QR connecting codes; if' z is 1, only one account QR code is available, and the account QR code is an account QR connection code; sequentially coding black units and white units in the QR connecting code of the account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an A th unit, and A ═ z × "alpha-2Wherein,' alpha represents the size of the account QR code;
s54, encoding characters in a binary system of the login safety account from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 'y' th character of the account; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the' y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the ' y ' th character of the account to a ' y arrangement code in sequence;
s55, extracting the arrangement code mapped by the character corresponding to the 'y' th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of unmapped characters before the cut-off codes;
s56, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, the … … and the cut-off code into lines to obtain binary character strings;
and S57, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
In a preferred embodiment of the present invention, in the second generation module, the method for combining the obtained security password with the generated password QR code to obtain the password combination code thereof includes the following steps:
s151, converting the security password into a security password binary system;
s152, judging the relation between the total number of the binary digits of the security password and the total number of the black units in the password QR code:
Figure BDA0003088639720000121
wherein x' represents the total number of bits of the secure password binary;
y' represents the total number of black cells in the password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z' represents the total number of the password QR codes;
s153, if z 'is not less than 2, connecting the z' password QR codes from left to right in sequence to obtain the password QR connecting codes; if z' is 1, only one password QR code is available, and the password QR code is the password QR connecting code; QR connecting code for pair cipherWherein the black unit and the white unit are sequentially encoded from left to right and from top to bottom, and respectively represent the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the A 'th unit, and A' is z 'x α'2Wherein α' represents the size of the password QR code;
s154, encoding the characters in the binary system of the security password from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the y' th character of the password respectively; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the first y 'of the password arrangement codes to obtain the y' password arrangement codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the y 'th character of the password to a y' password permutation code in sequence;
s155, extracting the password permutation code mapped by the character corresponding to the y' th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the password cut-off code into lines to obtain binary character strings;
and S157, converting the binary character string into a hexadecimal character string to obtain the password combination code.
In a preferred embodiment of the present invention, a method for a server to verify correctness of an account number binding code includes the following steps:
s51, the server side converts the received account number combination code into a binary account number combination code; generating a server-side account QR code from the received safe account;
s52, judging the relationship between the total digits of the binary account number combination code and the total number of black cells and white cells in the QR code of the server-side account number:
Figure BDA0003088639720000131
wherein, the' K represents the total digits of the binary account number combination code;
l represents the total number of black units and white units in the QR code of the server-side account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"J represents the total number of server-side account QR codes;
s53, if 'J is larger than or equal to 2, sequentially connecting the QR codes of the' J server-side accounts from left to right to obtain the QR connecting codes of the server-side accounts; if' J ═ 1, only one server-side account number QR code is present, and the server-side account number QR code is a server-side account number QR connection code; sequentially coding black units and white units in a QR (quick response) connection code of the server-side account from left to right and from top to bottom, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a V th unit, and V is ═ J × "delta ^ respectively2The method comprises the following steps that a 'delta' represents the size of a QR code of a server-side account;
s54, encoding characters in the binary account number binding codes according to the sequence from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 'K' character of the account number respectively; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 'K' character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 'K' unit in sequence;
s55, extracting codes of black units in the 1 st unit, the 2 nd unit, the 3 rd unit, the … … th unit and the 'K' unit;
s56, arranging the extracted codes of the black units in a descending order, writing the characters mapped by the arranged codes of the black units into lines to obtain a server-side binary character string;
s57, converting the server binary character string into the binary character string which is the same as the login safety account number in the step S2 to obtain the server account number; in the present embodiment, the present invention further includes:
executing the following operations on the server account:
`Loginsecuritynumber=sha[[``Loginsecuritynumber]],
wherein sha [ ] ] represents a security algorithm;
"logins churitynumber represents a server-side account number;
locinsecuritynumber represents an account security value;
judging whether the account security value' Loginsecurynymber is consistent with the received security account or not:
if the account security value' logins is consistent with the received secured account, step S158 is executed;
if the account security value' logins is inconsistent with the received security account, the process returns to step S151, and if the number of returns reaches the threshold value of the number of returns of the account, the login is not passed.
S58, judging whether the server account number is consistent with a preset account number preset at the server side:
if the server side account number is consistent with a preset account number preset at the server side, judging whether a server side password is consistent with a preset password associated with the preset account number preset at the server side:
if the server side password is consistent with a preset password associated with a preset account preset at the server side, the login is passed;
if the server side password is inconsistent with a preset password associated with a preset account preset at the server side, the login is not passed;
and if the server account number is inconsistent with a preset account number preset at the server, the login is not passed.
In a preferred embodiment of the present invention, the method for calculating the server-side password comprises the following steps:
s1581, the server side converts the received password combination code into a binary password combination code; generating a server-side password (QR) code from the received login security password;
s1582, judging the relation between the total digits of the binary password combination code and the total number of black units and white units in the server-side password QR code:
Figure BDA0003088639720000141
wherein K' represents the total number of bits of the binary cipher code;
l' represents the total number of black units and white units in the server-side password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
j' represents the total number of the server-side password QR codes;
s1583, if J 'is not less than 2, sequentially connecting the J' server-side password QR codes from left to right to obtain server-side password QR connecting codes; if J' is 1, only one server-side password QR code is available, and the server-side password QR code is the server-side password QR connecting code; black cells and white cells in the server-side password QR connection code are encoded in order from left to right and from top to bottom, i.e., the 1 st cell, the 2 nd cell, the 3 rd cell, … …, and the V 'th cell, and V' is J '× δ'2Wherein δ' represents the size of the server-side password QR code;
s1584, coding the characters in the binary password combination code from left to right, wherein the characters are respectively a password 1 st character, a password 2 nd character, a password 3 rd character, … … and a password K' th character; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the K 'th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the K' th unit in sequence;
s1585, extracting codes of black units in the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the K' th unit;
s1586, arranging the extracted codes of the black units in a descending order, writing characters mapped by the arranged codes of the black units into lines, and obtaining a server-side binary character string;
s1587, the server side binary character string is converted into the security password system which is the same as the security password system in the step S13, and the server side password is obtained.
For example, in the first step, the login account number input at the mobile phone device end is 123456789@ qq.com; the login password input at the mobile phone equipment end is 123456789@ qq.
Secondly, performing login account security processing on the input login account 123456789@ qq.com to obtain a login security account of the input login account;
Figure BDA0003088639720000142
in the embodiment, the safety algorithms sha [ ] ] all adopt the MD5 algorithm to obtain 32-bit lower-case 16-system numerical values thereof.
Thirdly, performing login account security processing on the obtained login secure account 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a secure account of the login secure account;
Figure BDA0003088639720000151
fourthly, an account QR code is generated for the obtained secured account 188f3647551830c11fbd2d43563f1867, as shown in fig. 2.
Fifth, the login secured account number 315be36db8ad7b3e3a7bb0839d6fa839 is converted into a login secured account number binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001.
Sixthly, judging the relationship between the total digits of the login security account binary 110001010110111110001101101101101110001010110101111011001111100011101001111011101100001000001110011101011011111010100000111001 and the total number of black cells in the QR code of the account:
due to the fact that
Figure BDA0003088639720000152
Thus, it is possible to provide
Figure BDA0003088639720000153
Seventhly, because' z is 1, the account QR code is an account QR connection code, as shown in fig. 2; if' z is 2, sequentially connecting the QR codes of the 2 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 3; if' z is 4, sequentially connecting the QR codes of the 4 accounts from left to right to obtain the QR connecting codes of the accounts; as shown in fig. 4.
Eighthly, coding black units and white units in the account QR connection code shown in fig. 2 from left to right and from top to bottom in sequence, wherein the black units and the white units are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit in sequence, and the size of the account QR code is 29.
The ninth step, because the data is more, only take the first behavior example; the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, 7 th, 12 th, 14 th, 18 th, 19 th, 23 th, 24 th, 25 th, 26 th, 27 th, 28 th and 29 th units are permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 12 is 1, the character mapped on cell 14 is 0, the character mapped on cell 18 is 1, the character mapped on cell 19 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0. (here, since only the first action example is taken in the ninth step, 1 to 18 bits of the binary system of the secured account number, that is, 110001010110111110, whose corresponding hexadecimal is 315be, and 315be is taken as the preset account number stored in the server).
Tenth, mapping the 8 th unit, the 9 th unit, the 10 th unit, the 11 th unit, the 13 th unit, the 15 th unit, the 16 th unit, the 17 th unit, the 20 th unit, the 21 st unit and the 22 nd unit with a character 0; that is, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 20 th cell is 0, the character mapped on the 21 st cell is 0, and the character mapped on the 22 nd cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 0, the character mapped on cell 21 is 0, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 1, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 1, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 0.
The eleventh step, writing the characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into a line to obtain a binary character string 11000100000100000110000111110.
In the twelfth step, the binary string 11000100000100000110000111110 is converted into hexadecimal string 18820c3e, i.e. the account number combination code is obtained.
The thirteenth step, the login password security processing is carried out on the input login password 123456789@ qq.com, and the login security password is obtained;
Figure BDA0003088639720000161
fourteenth, performing login password security processing on the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839 to obtain a security password;
Figure BDA0003088639720000162
the server-side preset account is 188f3647551830c11fbd2d43563f1867, and the server-side preset account 188f3647551830c11fbd2d43563f1867 is associated with a preset password of 188f3647551830c11fbd2d43563f 1867.
In the fifteenth step, a password QR code is generated for the obtained login security password 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 5.
Sixthly, the security code 188f3647551830c11fbd2d43563f1867 is converted into a security code binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111.
Seventeenth step, judging the relationship between the total digits of the security code binary 11000100011110011011001000111010101010001100000110000110000010001111110111101001011010100001101010110001111110001100001100111 and the total number of black cells in the code QR code:
due to the fact that
Figure BDA0003088639720000163
Thus, it is possible to provide
Figure BDA0003088639720000164
Eighteenth, because z' is 1, the password QR code is a password QR connection code, as shown in fig. 5; if z' is 2, sequentially connecting 2 password QR codes from left to right to obtain password QR connecting codes; as shown in fig. 6; if z' is 4, sequentially connecting 4 password QR codes from left to right to obtain the password QR connecting code; as shown in fig. 7.
Nineteenth step, coding the black unit and the white unit in the password QR code shown in fig. 5 from left to right and from top to bottom in sequence, which are the 1 st unit, the 2 nd unit, the 3 rd unit, … …, and the 841 rd unit in sequence, respectively, and the size of the password QR code is 29.
Twentieth, only take the first behavior example because of more data; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are cipher permutation codes; the character mapped on cell 1 is 1, the character mapped on cell 2 is 1, the character mapped on cell 3 is 0, the character mapped on cell 4 is 0, the character mapped on cell 5 is 0, the character mapped on cell 6 is 1, the character mapped on cell 7 is 0, the character mapped on cell 9 is 0, the character mapped on cell 12 is 0, the character mapped on cell 16 is 1, the character mapped on cell 19 is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, the character mapped on cell 29 is 1. (here, since only the first behavior example is taken in the twentieth step, 1-20 bits of the binary system of the security password, that is, 11000100011110011011, the corresponding hexadecimal system is c479b, and c479b is used as the preset password associated with the preset account c479b stored in the server side).
Twenty-first, mapping character 0 to the 8 th, 10 th, 11 th, 13 th, 14 th, 15 th, 17 th, 18 th and 22 th units; that is, the character mapped on the 8 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, and the character mapped on the 22 th cell is 0. That is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 8 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 10 th cell is 0, the character mapped on the 11 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 13 th cell is 0, the character mapped on the 14 th cell is 0, the character mapped on the 15 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 17 th cell is 0, the character mapped on the 18 th cell is 0, the character mapped on the 19 th cell is 1, the character mapped on cell 20 is 1, the character mapped on cell 21 is 1, the character mapped on cell 22 is 0, the character mapped on cell 23 is 0, the character mapped on cell 24 is 0, the character mapped on cell 25 is 1, the character mapped on cell 26 is 1, the character mapped on cell 27 is 0, the character mapped on cell 28 is 1, and the character mapped on cell 29 is 1.
In the twentieth step, the characters mapped by the units 1, 2, 3, … … and the password cut-off code are written into lines, and the binary string is 11000100000000010011100011011.
And a twentieth step of converting the binary string 11000100000000010011100011011 into a hexadecimal string 1880271b, thereby obtaining the password combination code.
And twenty-fourth step, the account combination code 18820c3e and the secured account 188f3647551830c11fbd2d43563f1867, the password combination code 18820c3e and the login secured password 188f3647551830c11fbd2d43563f1867 are sent to the server side.
The twenty-fifth step, the account combination code received by the server is 18820c3e, and the secured account number received by the server is 188f3647551830c11fbd2d43563f 1867;
the twenty-sixth step, the server side converts the received account number combination code 18820c3e into a binary account number combination code 11000100000100000110000111110; and generating a server-side account QR code from the received secured account 188f3647551830c11fbd2d43563f1867, as shown in fig. 2.
Twenty-seventh step, because
Figure BDA0003088639720000171
Thus, it is possible to provide
Figure BDA0003088639720000172
In the twenty-eighth step, because' J ═ 1, the server-side account QR code is the server-side account QR connection code, as shown in fig. 2; if' J is 2, sequentially connecting the QR codes of the 2 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 3; if' J is 4, sequentially connecting the QR codes of the 4 server-side accounts from left to right to obtain a QR connection code of the server-side account; as shown in fig. 4.
And twenty-ninth step, sequentially coding black units and white units in the server-side account number QR connection code from left to right and from top to bottom, wherein the black units and the white units are respectively a unit 1, a unit 2, a unit 3, a unit … … and a unit 841, and the size of the server-side account number QR code is 29.
Thirty, encoding characters in the binary account number combined code 11000100000100000110000111110 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account number respectively; that is, the character corresponding to the 1 st character of the account is 1, the character corresponding to the 2 nd character of the account is 1, the character corresponding to the 3 rd character of the account is 0, the character corresponding to the 4 th character of the account is 0, the character corresponding to the 5 th character of the account is 0, the character corresponding to the 6 th character of the account is 1, the character corresponding to the 7 th character of the account is 0, the character corresponding to the 8 th character of the account is 0, the character corresponding to the 9 th character of the account is 0, the character corresponding to the 10 th character of the account is 0, the character corresponding to the 11 th character of the account is 0, the character corresponding to the 12 th character of the account is 1, the character corresponding to the 13 th character of the account is 0, the character corresponding to the 14 th character of the account is 0, the character corresponding to the 15 th character is 0, the character corresponding to the 16 th character of the account is 0, the character corresponding to the 17 th character is 0, and the character corresponding to the 18 th character is 1, the character corresponding to the 19 th character of the account is 1, the character corresponding to the 20 th character of the account is 0, the character corresponding to the 21 st character of the account is 0, the character corresponding to the 22 th character of the account is 0, the character corresponding to the 23 rd character of the account is 0, the character corresponding to the 24 th character of the account is 1, the character corresponding to the 25 th character of the account is 1, the character corresponding to the 26 th character of the account is 1, the character corresponding to the 27 th character of the account is 1, the character corresponding to the 28 th character of the account is 1, and the character corresponding to the 29 th character of the account is 0.
Thirty-first step, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the account to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 12, the unit 14, the unit 18, the unit 19, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 12 th cell is 1, the character mapped on the 14 th cell is 0, the character mapped on the 18 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 1, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 1, the character mapped on the 28 th cell is 1, and the character mapped on the 29 th cell is 0.
And thirty-second step, writing the characters mapped by the codes of the arranged black units into lines to obtain 110001010110111110 binary character strings at the server end.
And thirty-third step, converting the server-side binary character string 110001010110111110 into hexadecimal, and obtaining the server-side account number 315 be.
And thirty-fourth step, judging whether the server side account 315be is consistent with a preset account preset at the server side:
calculating a server side password because the server side account 315be is consistent with a preset account 315be preset in the server side;
thirty-fifth step, the server side converts the received password combination code 1880271b into a binary password combination code 11000100000000010011100011011; and generating a server-side password QR code from the received login security password 315be36db8ad7b3e3a7bb0839d6fa839, as shown in fig. 5.
Thirty-sixth step, because
Figure BDA0003088639720000181
Thus, it is possible to provide
Figure BDA0003088639720000182
Thirty-seventh step, since J' is 1, the server-side password QR code is the server-side password QR connection code, as shown in fig. 5; if J' is 2, sequentially connecting the 2 server-side password QR codes from left to right to obtain a server-side password QR connecting code; as shown in fig. 6; if J' is 4, sequentially connecting the 4 server-side password QR codes from left to right to obtain the server-side password QR connecting codes; as shown in fig. 7.
And thirty-eighth step, sequentially coding the black unit and the white unit in the server-side password QR connecting code from left to right and from top to bottom, wherein the black unit and the white unit are respectively a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an 841 rd unit, and the size of the server-side password QR code is 29.
Thirty-ninth step, encoding the characters in the binary password combination code 11000100000000010011100011011 from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password; that is, the character corresponding to the 1 st character of the password is 1, the character corresponding to the 2 nd character of the password is 1, the character corresponding to the 3 rd character of the password is 0, the character corresponding to the 4 th character of the password is 0, the character corresponding to the 5 th character of the password is 0, the character corresponding to the 6 th character of the password is 1, the character corresponding to the 7 th character of the password is 0, the character corresponding to the 8 th character of the password is 0, the character corresponding to the 9 th character of the password is 0, the character corresponding to the 10 th character of the password is 0, the character corresponding to the 11 th character of the password is 0, the character corresponding to the 12 th character of the password is 0, the character corresponding to the 13 th character of the password is 0, the character corresponding to the 14 th character of the password is 0, the character corresponding to the 15 th character of the password is 0, the character corresponding to the 16 th character of the password is 1, the character corresponding to the 17 th character of the password is 0, the character corresponding to the 18 th character is, the 19 th character of the password corresponds to the character 1, the 20 th character of the password corresponds to the character 1, the 21 st character of the password corresponds to the character 1, the 22 nd character of the password corresponds to the character 0, the 23 rd character of the password corresponds to the character 0, the 24 th character of the password corresponds to the character 0, the 25 th character of the password corresponds to the character 1, the 26 th character of the password corresponds to the character 1, the 27 th character of the password corresponds to the character 0, the 28 th character of the password corresponds to the character 1, and the 29 th character of the password corresponds to the character 1.
Step forty, mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the 29 th character of the password to the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the 29 th unit in sequence; the unit 1, the unit 2, the unit 3, the unit 4, the unit 5, the unit 6, the unit 7, the unit 9, the unit 12, the unit 16, the unit 19, the unit 20, the unit 21, the unit 23, the unit 24, the unit 25, the unit 26, the unit 27, the unit 28 and the unit 29 are codes of black units which are arranged in the order from small to large; that is, the character mapped on the 1 st cell is 1, the character mapped on the 2 nd cell is 1, the character mapped on the 3 rd cell is 0, the character mapped on the 4 th cell is 0, the character mapped on the 5 th cell is 0, the character mapped on the 6 th cell is 1, the character mapped on the 7 th cell is 0, the character mapped on the 9 th cell is 0, the character mapped on the 12 th cell is 0, the character mapped on the 16 th cell is 1, the character mapped on the 19 th cell is 1, the character mapped on the 20 th cell is 1, the character mapped on the 21 st cell is 1, the character mapped on the 23 rd cell is 0, the character mapped on the 24 th cell is 0, the character mapped on the 25 th cell is 1, the character mapped on the 26 th cell is 1, the character mapped on the 27 th cell is 0, the character mapped on the 28 th cell is 1, the character mapped on cell 29 is 1.
And a fortieth step, writing the characters mapped by the codes of the arranged black units into lines to obtain 11000100011110011011 serving as a binary character string.
In the fortieth step, the server-side binary string 11000100011110011011 is converted to hexadecimal, resulting in its server-side password of c479 b.
The forty-third step, judging whether the server password c479b is consistent with the preset password preset at the server:
and if the server-side password c479b is consistent with the preset password c479b associated with the preset account preset at the server side, the login is passed.
In a preferred embodiment of the present invention, after the user successfully logs in the server using the mobile phone device, the default display information of the server is displayed on the mobile phone device. The server-side default display information comprises one or any combination of an approval module, a project management module, a personnel management module, an equipment management module, a learning module, an assessment module, a data management module, a task information module and a small tool module.
In a preferred embodiment of the present invention, the project management module includes one or any combination of a help module, a project list module, a route calculation module, a new project module, and a project profile module;
the help module is used for providing an operation description of the software system; the item list module is used for displaying all items related to the current user; the line calculation module is used for calculating and displaying input data; the new project module is used for allowing a legal user to add a new project; the item profile module is used for displaying and providing basic information for modifying the selected items in the item list module. When the mobile phone equipment end receives a trigger signal of the project management module, displaying a help module, a project list module, a route calculation module, a newly-built project module and one, two, three, four or five of project profile modules on a touch display screen; in the interface state, if the mobile phone equipment end receives a help module trigger signal, displaying an operation instruction of the software system on the touch display screen; if the mobile phone equipment end receives the item list module trigger signal, displaying all items related to the current user on the touch display screen, and sequencing according to the time sequence; when the mobile phone equipment end receives a trigger signal of receiving a certain item, basic information of the item is displayed on the touch display screen, and the basic information comprises one or any combination of time for adding a new item, a place where the new item is added, a title, a user ID for adding the new item, an item progress and an item description. If the mobile phone equipment end receives a line calculation module trigger signal, displaying a calculation result of input data on the touch display screen; if the mobile phone equipment receives a new project module trigger signal, judging whether the user has the permission to add a new project, if so, displaying the added new project on a touch display screen, wherein the added new project comprises one or any combination of time for adding the new project, a place where the new project is added, a title and a user ID for adding the new project, and if not, prompting the user, and giving the administrator the permission to add the new project; and if the mobile phone equipment end receives the item profile module trigger signal, displaying and providing basic information for modifying the selected item in the item list module on the touch display screen.
In a preferred embodiment of the present invention, the line calculation module includes one or any combination of a data entry module, a data approval module, a parameter setting module, and a calculation result module;
the data output end of the data input module is connected with the data input end of the data approval module, the data output end of the data approval module is connected with the data input end of the parameter setting module, and the data output end of the parameter setting module is connected with the data input end of the calculation result module;
the data entry module is used for the entry of users with different authorities to the data; the data approval module is used for approving the input data; the parameter setting module is used for setting the format of the input data; and the calculation result module is used for displaying the calculation result of the approval process data. Firstly, a parameter setting user sets various parameter information used by the project at a parameter setting module; then, the bridge information is input into the data input module, stored on the server and submitted to a data approval person through the data approval module; and the data approval personnel check the data uploaded by the parameter setting user in the data approval module, if the data is qualified, the data is submitted to the upper-level data approval personnel through the data approval module, if the data is unqualified, and the corresponding data approval personnel is returned after modification opinions are added.
In a preferred embodiment of the present invention, the personnel management module includes one or any combination of a personnel information module, a user authority module, a personnel allocation module, a project allocation module and a role module;
the personnel information module is used for storing personal information of personnel, and comprises one or any combination of name, identification card number, contact telephone, age, native place, college and university, academic degree and work experience;
the user authority module is used for giving the user the authority to use the corresponding functional module; the personnel allocation module is used for recording personnel allocation process; the project allocation module is used for allocating personnel to each project name; and the role module is used for defining the authority of the user. After the personnel information perfecting user perfects the personal information in the personnel information module, submitting the personal information to the personnel information examination and approval user for examination and approval; the personnel information approval user has the administrator authority granted by the role module, and after the personnel information module approves and passes the new personnel information, the information is stored in the server; the personnel transfer user provides a personnel demand plan at the personnel transfer module, the personnel demand examination and approval user examines and approves the demand plan, the examination and approval is given to other personnel transfer users through the initiating personnel transfer plan, after the other personnel transfer users agree, a transfer list is returned to the personnel demand examination and approval user, and finally the initiating plan personnel transfer user reports the actual personnel to the post; the role module is essentially a set of permissions, which facilitates rapid assignment of permissions to users, and administrators can change the roles of other users at the module.
In a preferred embodiment of the present invention, the device management module includes one or any combination of a device management method module, a device information module, and a device allocation module;
the equipment management method module is used for displaying the use and maintenance method of each equipment; the equipment information module is used for displaying various attributes of the item equipment, including one or any combination of type, starting date, checked date and maintenance record; the equipment transferring module is used for transferring the flow of the equipment. An equipment management user uploads a PDF file of 'a total station system item error checking method' in an equipment management method module, measures a method checked by the user in the module, and checks and corrects the total station according to an instruction; the equipment information user inputs new equipment information in the equipment information module, if the equipment information needs to be updated, an equipment information updating approval process needs to be initiated, after the approval of the upper-level equipment information user, the equipment information is changed, and the system prompts the user to scrap or send for inspection instrument equipment within 3 months in the future according to the latest inspected time and the appraisal age; and initiating equipment requirements in the equipment transferring module by the equipment transferring user, and transferring the required equipment to a requirement plan initiating project after the approval is passed.
In a preferred embodiment of the invention, the learning module comprises a learning material module or/and a quick self-test module;
the learning materials are used for displaying various learning materials; the quick self-testing module is used for testing the knowledge points by the user. The learning material user uploads training materials on the learning material module, the online learning user browses the learning materials online through the module, and after learning is finished, the online learning user can enter the rapid self-testing module to test knowledge proficiency according to the sections selected by the current learning material module.
In a preferred embodiment of the invention, the examination module comprises an question bank module, a test paper module, an examination module and a result analysis module; the question bank module is used for inputting an examination question bank and a self-testing question bank, and the test paper combining module and the rapid self-testing module respectively select test questions from the examination question bank and the self-testing question bank; the examination paper combining module is used for customizing examination ranges, examination time and reference personnel by a user to extract questions and combine papers; the examination module is used for a reference person to take an examination; and the result analysis module checks the examination result and obtains various analysis results. The question bank input user inputs the test questions in the question bank module singly or in batches and performs necessary editing; the group volume user selects 100 questions from the level measurement question bank in the group volume module, and the 18:00 assessment statement at 2021.1.5 shows that the users to be tested exist; a user to be tested takes an examination at 2021.1.5 days 18:00 on time, and the result of the examination including total score, correct rate, wrong question, answer time and the like is checked through the result analysis module; the examination paper user can check examination success rate, average score, error-prone questions and the like through the result analysis module.
In a preferred embodiment of the invention, the task information module comprises one or any combination of a project management approval module, a learning task module, an assessment task module and an equipment management approval module;
the project management approval module is used for prompting a user about a process to be approved in project management and providing a quick entrance for approval; the learning task module is used for prompting a user to learn a task and providing a learning shortcut entrance; the examination task module is used for prompting the examination task of the user and providing a quick entrance for taking an examination; the equipment management approval module is used for prompting the user equipment management aspect to-be-approved process and providing a quick entrance for approval. The project management user sees that 12 platform data of the Beijing bridge project need to be examined and approved in the project management examination and approval module, the data are examined and approved through a quick entrance, if the data are not wrong, all the users are authorized to use the data, and if the data are wrong, the opinion is returned to the examination and approval initiator; a user to be learned sees the first chapter of leveling needing to be learned in the current month in a learning task, and online learning can be carried out through a quick entrance; the user to be tested can immediately take a leveling test after seeing the examination task and can take the test through a quick entrance; and the equipment management user checks the equipment transfer approval process in the equipment management approval module and approves the data through a quick entrance.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (5)

1. An engineering measurement intelligent management control cloud platform comprises a mobile phone equipment end and a server end capable of realizing wireless communication with the mobile phone equipment end, and is characterized in that a user logs in the server end by using the mobile phone equipment end, and the mobile phone equipment end comprises an acquisition module, a first safety processing module, a second safety processing module, a first generation module, a second generation module and a sending module;
the data output end of the acquisition module is connected with the data input end of the first safety processing module, the data output first end of the first safety processing module is connected with the data input end of the second safety processing module, the data output second end of the first safety processing module is connected with the data input first end of the first generation module, the data output first end of the second safety processing module is connected with the data input second end of the first generation module, the data output end of the first generation module is connected with the data input first end of the second generation module, the data output second end of the second safety processing module is connected with the data input second end of the second generation module, the data output third end of the first safety processing module is connected with the data input third end of the second generation module, and the data output end of the second generation module is connected with the data input end of the sending module;
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device end;
the first security processing module is used for respectively carrying out security processing on the login account and the login password acquired in the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the first generation module is used for generating an account number QR code for the login safety account number obtained in the first safety processing module and generating a password QR code for the safety password obtained in the second safety processing module;
the second generation module is used for combining the security account obtained in the second security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the login security password obtained in the first security processing module with the password QR code generated in the first generation module to obtain a password combination code;
the sending module sends the account number combination code and the password combination code obtained in the second generating module of the sending module, and the login safety account number corresponding to the account number combination code and the safety password corresponding to the password combination code to the server side for verification;
or the following steps:
the acquisition module is used for acquiring an input login account and a login password at a mobile phone device end;
the first security processing module is used for respectively carrying out security processing on the login account and the login password acquired in the acquisition module to obtain a login security account and a login security password;
the second security processing module is used for respectively performing security processing on the login security account and the login security password obtained in the first security processing module to obtain the security account and the security password;
the first generation module is used for generating an account number QR code for the safety account number obtained from the second safety processing module and a password QR code for the login safety password obtained from the first safety processing module;
the second generation module is used for combining the login security account obtained in the first security processing module with the account QR code generated in the first generation module to obtain an account combination code; combining the security password obtained in the second security processing module with the password QR code generated in the first generation module to obtain a password combination code;
and the sending module sends the account number combination code and the password combination code obtained in the second generating module and the login security password corresponding to the security account number and the password combination code corresponding to the account number combination code to the server side for verification.
2. The cloud platform for engineering measurement intelligent management control as claimed in claim 1, wherein the first security processing module performs security processing on the obtained login account to obtain a login security account according to a method comprising:
Figure FDA0003088639710000021
wherein Locinsecuritynumber represents a login security account;
the method for carrying out login password security processing on the obtained login password to obtain the login security password comprises the following steps:
Figure FDA0003088639710000022
security number represents a login password;
loginsafetynumber denotes a login security password.
3. The cloud platform for engineering measurement intelligent management control as claimed in claim 1, wherein the second security processing module performs security processing on the obtained login security account to obtain the security account, and the method for obtaining the security account comprises:
Figure FDA0003088639710000031
wherein the content of the first and second substances,
Figure FDA0003088639710000032
representing a security algorithm;
logins securitynumber represents a login secured account number;
loginstecurynymber' represents a secured account number;
the method for performing login security password security processing on the obtained login security password to obtain the security password comprises the following steps:
Figure FDA0003088639710000033
loginsafetynumber represents a login security password;
loginsafetynumber' denotes a security password.
4. The cloud platform for engineering measurement intelligent management control as claimed in claim 1, wherein the method for combining the obtained secured account with the generated account QR code in the second generation module to obtain the account combination code comprises the following steps:
s151, converting the safety account number into a safety account number binary system;
s152, judging the relationship between the total number of binary digits of the safety account and the total number of black units in the QR code of the account:
Figure FDA0003088639710000034
wherein x represents the total number of binary digits of the safety account number;
y represents the total number of black units in the QR code of the account;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
z represents the total number of the QR codes of the account;
s153, if z is larger than or equal to 2, sequentially connecting the QR codes of the z accounts from left to right to obtain QR connecting codes of the accounts; if z is 1, only one account QR code is available, and the account QR code is an account QR connection code; black units and white units in the QR connecting code of the account are sequentially coded from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, … … and an A-th unit, wherein A is z multiplied by alpha2Wherein, alpha represents the size of the QR code of the account;
s154, encoding characters in a binary system of the safety account number from left to right, wherein the characters are the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account number respectively; extracting codes corresponding to all black units in the QR connecting code of the account, and arranging the codes according to a sequence from small to large to obtain an arrangement code of the QR connecting code; taking the first y of the permutation codes to obtain the y permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the y th character of the account to a y arrangement code in sequence;
s155, extracting the arrangement code mapped by the character corresponding to the y-th character of the account to obtain an interception code; mapping characters 0 or 1 to other units of unmapped characters before the cut-off codes;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the cut-off code into lines to obtain binary character strings;
and S157, converting the binary character string into a hexadecimal character string to obtain the account number combination code.
5. The cloud platform for engineering measurement intelligent management control as claimed in claim 1, wherein the second generation module combines the obtained login security password with the generated password QR code to obtain the password combination code thereof, and the method comprises the following steps:
s151, converting the login security password into a login security password binary system;
s152, judging the relation between the total digits of the login security password binary system and the total number of black units in the password QR code:
Figure FDA0003088639710000051
wherein,' x represents the total number of digits of the login security password binary system;
"y represents the total number of black cells in the password QR code;
if indicates that the condition is;
z represents a set of all integers;
int [ ] represents a rounding function;
"z represents the total number of the cryptographic QR code;
s153, if the ' z ' is larger than or equal to 2, sequentially connecting the ' z password QR codes from left to right to obtain password QR connecting codes thereof; if' z is 1, only one password QR code is available, and the password QR code is a password QR connecting code; sequentially coding a black unit and a white unit in the QR code from left to right and from top to bottom, namely a 1 st unit, a 2 nd unit, a 3 rd unit, … … and a 'A' unit, wherein 'A' -Z '-alpha' is formed2Wherein,' α represents the size of the password QR code;
s154, encoding the characters in the login security password binary system from left to right, wherein the characters are respectively the 1 st character, the 2 nd character, the 3 rd character, … … and the' -y character of the password; extracting codes corresponding to all black units in the QR connecting code, and arranging the codes according to a sequence from small to large to obtain a password arrangement code; taking the first Y password permutation codes to obtain the Y password permutation codes; mapping characters corresponding to the 1 st character, the 2 nd character, the 3 rd character, … … and the Y th character of the password to the Y password arrangement code in sequence;
s155, extracting the password arrangement code mapped by the character corresponding to the Y-th character of the password to obtain a password interception code; mapping characters 0 or 1 to other units of unmapped characters before the password cut-off code;
s156, writing characters mapped by the 1 st unit, the 2 nd unit, the 3 rd unit, … … and the password cut-off code into lines to obtain binary character strings;
and S157, converting the binary character string into a hexadecimal character string to obtain the password combination code.
CN202110588790.XA 2021-05-28 2021-05-28 Engineering survey intelligent management control cloud platform Active CN113312535B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110588790.XA CN113312535B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110588790.XA CN113312535B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control cloud platform

Publications (2)

Publication Number Publication Date
CN113312535A true CN113312535A (en) 2021-08-27
CN113312535B CN113312535B (en) 2023-02-24

Family

ID=77375651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110588790.XA Active CN113312535B (en) 2021-05-28 2021-05-28 Engineering survey intelligent management control cloud platform

Country Status (1)

Country Link
CN (1) CN113312535B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023918A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for uniformly providing login for multiple network services
US20130167208A1 (en) * 2011-12-22 2013-06-27 Jiazheng Shi Smart Phone Login Using QR Code
CN103605950A (en) * 2013-11-25 2014-02-26 广西大学 Method and system for hiding signature in credible two-dimensional code
CN104092542A (en) * 2013-09-11 2014-10-08 腾讯科技(深圳)有限公司 Account login method, device and system
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login
CN106936803A (en) * 2015-12-31 2017-07-07 亿阳安全技术有限公司 Two-dimensional code scanning certification login method and relevant apparatus
CN108848057A (en) * 2018-05-04 2018-11-20 浙江大华技术股份有限公司 A kind of method and device of remote secure access
CN109214161A (en) * 2018-05-31 2019-01-15 中国地质大学(武汉) A kind of two-dimension code safe label login system
CN110428036A (en) * 2019-07-11 2019-11-08 深圳市优博讯科技股份有限公司 A kind of generation method of dynamic two-dimension code, system and terminal device
CN110611685A (en) * 2019-10-30 2019-12-24 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition
CN110688644A (en) * 2019-10-09 2020-01-14 重庆市筑智建信息技术有限公司 Method and system for realizing login of BIM system through graphic code
CN111026798A (en) * 2019-12-05 2020-04-17 苏州中车建设工程有限公司 Electromechanical equipment database system and control method thereof
US20200351660A1 (en) * 2018-08-21 2020-11-05 HYPR Corp. Secure mobile initiated authentication

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130167208A1 (en) * 2011-12-22 2013-06-27 Jiazheng Shi Smart Phone Login Using QR Code
CN103023918A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for uniformly providing login for multiple network services
CN104092542A (en) * 2013-09-11 2014-10-08 腾讯科技(深圳)有限公司 Account login method, device and system
CN103605950A (en) * 2013-11-25 2014-02-26 广西大学 Method and system for hiding signature in credible two-dimensional code
CN104270338A (en) * 2014-09-01 2015-01-07 刘文印 A method and system of electronic identity registration and authentication login
CN106936803A (en) * 2015-12-31 2017-07-07 亿阳安全技术有限公司 Two-dimensional code scanning certification login method and relevant apparatus
CN108848057A (en) * 2018-05-04 2018-11-20 浙江大华技术股份有限公司 A kind of method and device of remote secure access
CN109214161A (en) * 2018-05-31 2019-01-15 中国地质大学(武汉) A kind of two-dimension code safe label login system
US20200351660A1 (en) * 2018-08-21 2020-11-05 HYPR Corp. Secure mobile initiated authentication
CN110428036A (en) * 2019-07-11 2019-11-08 深圳市优博讯科技股份有限公司 A kind of generation method of dynamic two-dimension code, system and terminal device
CN110688644A (en) * 2019-10-09 2020-01-14 重庆市筑智建信息技术有限公司 Method and system for realizing login of BIM system through graphic code
CN110611685A (en) * 2019-10-30 2019-12-24 南宁市指搜信息技术有限公司 Internet site login system based on intelligent equipment monitoring and user identity recognition
CN111026798A (en) * 2019-12-05 2020-04-17 苏州中车建设工程有限公司 Electromechanical equipment database system and control method thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
V. RAMYA 等: "Review on quick response codes in the field of information security (Analysis of various imperceptibility characteristics on grayscale and binary QR code", 《2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY (ICAET)》 *
王俊杰: "基于云技术的QR码安全应用体系研究及系统设计", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 *

Also Published As

Publication number Publication date
CN113312535B (en) 2023-02-24

Similar Documents

Publication Publication Date Title
US20090287923A1 (en) Reverse Mapping Method and Apparatus for Form Filling
CN108875404B (en) Data desensitization method and device based on machine learning and storage medium
CN107800672A (en) A kind of Information Authentication method, electronic equipment, server and information authentication system
US10896083B2 (en) Dynamic cloud deployment and calibration tool
CN108460268A (en) Verification method and device
CN104348617A (en) Verification code processing method and device, and terminal and server
CN108848057A (en) A kind of method and device of remote secure access
CN106485261A (en) A kind of method and apparatus of image recognition
CN113312535B (en) Engineering survey intelligent management control cloud platform
CN110674493B (en) BIM system login verification method and system
CN113987421A (en) Software authorization method, system and storage medium
CN113312534B (en) Engineering survey intelligent management platform
CN113312536B (en) Engineering survey intelligent management control platform
CN110717315B (en) System data batch modification method and device, storage medium and electronic equipment
CN114826623B (en) Mock test message processing method and device
CN111488269B (en) Index detection method, device and system for data warehouse
CN106790160A (en) Security level identification and method of calibration and device
CN112396418A (en) Information processing method, device and system
CN112085469A (en) Data approval method, device, equipment and storage medium based on vector machine model
CN111126503A (en) Training sample generation method and device
CN113162918B (en) Method for extracting abnormal data under condition of rapidly mining four-in-one network
CN113505137B (en) Real estate space graph updating method
CN116389013B (en) Short message password verification method, mobile terminal and system
CN108259184A (en) A kind of digital signature based on user identifier, sign test method and device
CN112799956B (en) Asset identification capability test method, device and system device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant