CN115529163A - Login identification encryption method for digital business hall of electric power system - Google Patents

Login identification encryption method for digital business hall of electric power system Download PDF

Info

Publication number
CN115529163A
CN115529163A CN202211037066.9A CN202211037066A CN115529163A CN 115529163 A CN115529163 A CN 115529163A CN 202211037066 A CN202211037066 A CN 202211037066A CN 115529163 A CN115529163 A CN 115529163A
Authority
CN
China
Prior art keywords
user
information
encryption
login
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211037066.9A
Other languages
Chinese (zh)
Inventor
吴鹏
李辉
周红林
郝翠萍
葛伟
李宁
徐莹娇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Electric Power Information Technology Co Ltd
Original Assignee
Jiangsu Electric Power Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Electric Power Information Technology Co Ltd filed Critical Jiangsu Electric Power Information Technology Co Ltd
Priority to CN202211037066.9A priority Critical patent/CN115529163A/en
Publication of CN115529163A publication Critical patent/CN115529163A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Biomedical Technology (AREA)
  • Water Supply & Treatment (AREA)
  • Public Health (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a login identification encryption method for a digital business hall of an electric power system, which comprises a terminal, wherein the terminal is provided with an operating system, and the login identification encryption method comprises the following steps: and (3) login request: a user initiates a login request; logging in a port: the terminal provides a login port; and (3) password identification: the operating system of the terminal matches the login information with the encryption lock; and (4) judging the result: and when the login information of the user is matched with the encryption lock, determining that the user successfully logs in. The invention utilizes RSA to encrypt the encryption hardware, the operating system on the terminal matches the user information with the encryption lock, the user can identify and log in the face information, the fingerprint information and the password information of the user when logging in, the application range is wider, and the safety and the flexibility of the system are improved.

Description

Login identification encryption method for digital business hall of electric power system
Technical Field
The invention belongs to the technical field of operating system safety, relates to a login identification encryption method, and particularly relates to a login identification encryption method for a digital business hall of an electric power system.
Background
The electric power system is an electric energy production and consumption system composed of the links of power generation, power transformation, power transmission, power distribution, power utilization and the like, and has the functions of converting primary energy in the nature into electric energy through a power generation power device and supplying the electric energy to each load center through the power transmission system, the power transformation system and the power distribution system.
With the development of information technology and the continuous development of digital business halls, information security is more and more widely concerned, particularly, the security of a server is greatly improved, a login port needs to be encrypted in order to enhance the security of the existing mode, a user name and a password are used for login in the login process of a traditional operating system, so that the security means is single, the password is easy to crack, potential safety hazards are brought to the use of the system and a user, and the recognition efficiency is low.
Therefore, there is a need for an improved login identification encryption method to solve the above existing problems.
Disclosure of Invention
The invention aims to provide a login identification encryption method for a digital business hall of an electric power system, which is characterized in that encryption hardware is encrypted by RSA, an operating system on a terminal is used for matching user information with an encryption lock, and a user can identify and log in user face information, user fingerprint information and user password information during login, so that the application range is wider, and the safety and the flexibility of the system are improved.
In order to achieve the purpose, the invention adopts the main technical scheme that:
a login identification encryption method for a digital business hall of an electric power system comprises a terminal, wherein the terminal is provided with an operating system, and the encryption method comprises the following steps:
the method comprises the following steps: and (3) login request: a user initiates a login request to a terminal through a client provided with an operating system;
step two: logging in a port: after receiving the information, the terminal identifies the user information through the client and provides a login port;
step three: and (3) password identification: the client sends the login information to the terminal, and an operating system of the terminal matches the login information with the encryption lock;
step four: and (4) judging the result: and when the login information of the user is matched with the encryption lock, determining that the user successfully logs in.
Through the technical scheme, the operating system on the terminal matches the user information with the encryption lock, when the login request is successfully matched with the encryption lock, the login success of the user is determined, the user can identify and log in the user face information, the user fingerprint information and the user password information when logging in, the application range is wider, and the safety and the flexibility of the system are improved.
Preferably, the login request comprises a face identification request, a fingerprint identification request and a user password identification request;
the encryption lock comprises a face identification encryption lock and a fingerprint identification encryption lock, and the encryption lock is identified by a user password;
the face identification request is matched with the face identification encryption lock, the fingerprint identification request is matched with the fingerprint identification encryption lock, the user password identification request is matched with the user password identification encryption lock, the user management module is used for switching login requests, and a user can switch at any time through the user management module, so that the situation that the user cannot identify the user is avoided;
through above technical scheme, the user can manage the classification of logging in through the user management module on the client when need log in, for example through fingerprint identification, facial recognition or account number password identification, promotes the scope of use greatly, promotes the convenience of use when the flexibility is high.
Preferably, the first step includes:
and (3) user information registration: the method comprises the steps that a user stores user information in an operating system of the terminal in advance, wherein the user information comprises user face information, user fingerprint information and user password information, and the user stores the user information in the operating system through a client;
the user information registration specifically comprises the following steps:
the administrator logs in: a system administrator submits an access application to a terminal through a client, and a user accesses an operating system and registers personal information;
information entry: after a user registers personal information, sequentially inputting user face information, user fingerprint information and user password information in the user information;
and (3) information storage: after the user inputs the user information, the user information is stored in an operating system;
through the technical scheme, when the user does not input information before, the operating system can prompt the user to be unidentified, so that the user is prohibited from logging in, the user can register in the operating system under the guidance of an administrator, user face information, user fingerprint information and user password information for inputting are input at the same time, the input information is stored in the data server, the data server is convenient to call in the later period, the operation is performed in the same operating system, the login time is shortened, and the timeliness is improved.
Preferably, the terminal comprises a router, a plurality of sets of self-service terminals and a data server;
the multiple sets of self-service terminals and the data server on the terminal are in communication connection with the operating system through the router, and the operating system is used for operating various types of data and temporarily storing the data, so that information can be conveniently and timely called, and timeliness is improved;
the specific mode is as follows:
each set of self-service terminals reads a part of data from the data server through the router for temporary storage;
the user logs in and identifies through each set of self-service terminals, the sets of self-service terminals call required data from the power data temporarily stored by the data server, if not, the user information registration needs to be carried out again, the humanization degree is higher, reasonable guidance is achieved, and the user is prevented from consuming a large amount of time.
Through the technical scheme, a plurality of sets of self-service terminals are all in communication connection with the operating system, so that a plurality of people can log in on a plurality of clients simultaneously, the timeliness is higher, the terminals comprise wireless communication modules, the wireless communication modules are in communication connection with the clients through routers, and meanwhile, the operating system can be in communication connection with mobile terminals of users such as mobile phones through the routers, so that the users can log in through the mobile terminals, the use convenience is greatly improved,
meanwhile, the terminal also comprises a wireless communication module, so that when a user logs in the operating system, the terminal can push information to the client through the operating system, the login state and information are improved, the user at the front end and the user at the rear end can conveniently check the information, and the use safety is greatly improved.
Preferably, the fourth step further comprises: when the user information of the user is not matched with the encryption lock or the login request is not matched with the encryption lock, the system is locked, and the user is prohibited from logging in;
when the login request is not matched with the encryption lock, the login request is unclear, recognition is prompted to be carried out again, or the recognition mode is changed, after recognition cannot be carried out for many times, the system is closed, the user is prohibited to login, login is carried out again through client-side lifting, and the safety of the system is greatly improved.
Preferably, the operating system includes an encryption hardware, a processing chip, and a cache database, the encryption hardware, the processing chip, and the cache database all establish communication connection with each other, and the processing chip stores the obtained encryption hardware in the cache database;
the encryption hardware comprises face information encryption hardware, fingerprint information encryption hardware and password information encryption hardware, and the encryption hardware is in communication connection with the encryption lock;
the face information encryption hardware is matched with the face identification encryption lock, the fingerprint information encryption hardware is matched with the fingerprint information encryption hardware, the password information encryption hardware is matched with the user password identification encryption lock, and the cache database is in communication connection with the data server;
the processing chip carries out calculation on the information of the user, once the user information corresponds to the encryption hardware in the operating system, the login is successful, otherwise, wrong information is temporarily placed in the cache database, the whole system is interconnected, and the safety of the system is improved.
Preferably, the processing chip encrypts the encryption hardware by using RSA;
the algorithm of RSA involves three parameters: n, e1, e2; (ii) a
Wherein n is the product of two large prime numbers p, q, and the binary number of n represents the key length;
e1 and e2 are a pair of related values, e1 can be arbitrarily taken, but e1 is required to be relatively prime with (p-1) × (q-1); and e2 is selected again, and the requirements are as follows:
(e2×e1)≡1(mod(p-1)×(q-1));
e1 and e2 may be used interchangeably, i.e.:
A≡B^e1(mod n);B≡A^e2(mod n);
through the technical scheme, the RSA algorithm is based on a very simple number theory fact: multiplication of two large prime numbers is easy, but factorization of their products is extremely difficult, so the products can be disclosed as encryption keys;
the RSA algorithm is an asymmetric cryptographic algorithm, so-called asymmetry, namely the algorithm needs a pair of keys, one key is used for encryption, the other key is used for decryption, most js RSA libraries adopt an incoming exponential modulus mode for encryption and decryption, a RSA encryption module adopts an exponential and modulus mode, wherein exponents serving as exponents are 10001 in most times by default, conversion to decimal is 65537, and the safety factor of the system is greatly improved;
gather and discern user's facial information through camera 901, gather and discern user's fingerprint information through fingerprint identification device 902, gather and discern user's account password through user password login device 903, simple structure, the convenience is higher, promotes the efficiency of use greatly.
Preferably, the client comprises a camera, a fingerprint identification device and a user password login device, the client is connected with a display unit, and the display unit is used for displaying the confirmation information when the matching is successful.
The invention has the following beneficial effects:
1. the encryption hardware is encrypted by RSA, the operating system on the terminal matches the user information with the encryption lock, when the login request is successfully matched with the encryption lock, the user is determined to successfully login, the user can identify and login the user face information, the user fingerprint information and the user password information during login, the application range is wider, and the safety and flexibility of the system are improved.
2. The RSA algorithm is an asymmetric cryptographic algorithm, one of the algorithms is used for encryption, the other algorithm is used for decryption, most js RSA libraries are encrypted and decrypted in an incoming exponent modulus mode, the RSA encryption module is used in an exponent and modulus mode, wherein exponents serving as exponents are 10001 by default, and conversion to decimal is 65537, so that the safety factor of the system is greatly improved.
Drawings
FIG. 1 is a flow chart of a method of the present invention;
FIG. 2 is a flow chart of a registration method of the present invention;
fig. 3 is a schematic diagram of the electrical principle of the present invention.
In the figure, 1-terminal, 101-router, 102-multiple sets of self-service terminals, 103-data server, 2-operating system, 3-login request, 301-facial recognition request, 302-fingerprint recognition request, 303-user password recognition request, 4-encryption lock, 401-facial recognition encryption lock, 402-fingerprint recognition encryption lock, 403-user password recognition encryption lock, 5-user information, 501-user facial information, 502-user fingerprint information, 503-user password information, 6-encryption hardware, 601-facial information encryption hardware, 602-fingerprint information encryption hardware, 603-password information encryption hardware, 7-processing chip, 8-cache database, 9-client, 901-camera, 902-fingerprint recognition device, 903-user password login device, 904-display unit, 10-wireless communication module, 11-user management module.
Detailed Description
The embodiments of the present application will be described in detail with reference to the drawings and examples, so that how to implement the technical means for solving the technical problems and achieving the technical effects of the present application can be fully understood and implemented.
As shown in fig. 1-3, the login identification encryption method for the digital business hall of the power system provided by the present embodiment includes a terminal 1, the terminal 1 is installed with an operating system 2, and the encryption method includes the following steps:
the method comprises the following steps: and (3) login request: a user initiates a login request 3 to a terminal 1 through a client 9 provided with an operating system 2;
step two: logging in a port: after receiving the information, the terminal 1 identifies the user information 5 through the client 9 and provides a login port;
step three: and (3) password identification: the client sends the login information to the terminal 1, and the operating system 2 of the terminal 1 matches the login information with the encryption lock 4;
step four: and (4) judging the result: and when the login information of the user is matched with the encryption lock 4, determining that the user successfully logs in.
The operating system 2 on the terminal 1 matches the user information 5 with the encryption lock 4, when the login request 3 is successfully matched with the encryption lock 4, the login success of the user is determined, and the user can identify and log in the user face information 501, the user fingerprint information 502 and the user password information 503 when logging in, so that the application range is wider, and the safety and the flexibility of the system are improved;
in the present embodiment, as shown in fig. 1, the login request 3 includes a face recognition request 301, a fingerprint recognition request 302, and a user password recognition request 303;
the encryption lock 4 comprises a face identification encryption lock 401, a fingerprint identification encryption lock 402 and a user password identification encryption lock 403;
the face identification request 301 is matched with the face identification encryption lock 401, the fingerprint identification request 302 is matched with the fingerprint identification encryption lock 402, the user password identification request 303 is matched with the user password identification encryption lock 403, the client 9 comprises a user management module 11, the user management module 11 is in communication connection with the operating system 2, the user management module 11 is used for switching the login request 3, and a user can switch at any time through the user management module 11 to avoid the situation that the user cannot identify;
when a user needs to log in, the user management module 11 on the client 9 can manage the login category, for example, fingerprint identification, face identification or account password identification, so that the use range is greatly improved, and the use convenience is improved while the flexibility is high.
The first step comprises the following steps:
and (3) registering user information: the user saves user information 5 in the operating system 2 of the terminal 1 in advance, the user information 5 comprises user face information 501, user fingerprint information 502 and user password information 503, and the user stores the user information 5 in the operating system 2 through the client 9;
the user information registration specifically comprises the following steps:
the administrator logs in: a system administrator submits an access application to the terminal 1 through the client 9, and a user accesses the operating system 2 and registers personal information;
information entry: after the user registers personal information, sequentially inputting user face information 501, user fingerprint information 502 and user password information 503 in user information 5;
and (3) information storage: the user enters the user information 5 and stores it in the operating system 2.
When the user does not input information before, the operating system 2 prompts that the information cannot be identified, so that the user is prohibited from logging in, the user can register in the operating system 2 under the guidance of an administrator, and simultaneously input user face information 501, user fingerprint information 502 and user password information 503 for storing in the data server 103, so that the user can call in the later period conveniently, and operate in the same operating system 2, thereby reducing the logging-in time and improving the timeliness.
The terminal 1 comprises a router 101, a plurality of sets of self-service terminals 102 and a data server 103;
the multiple sets of self-service terminals 102 and the data server 103 on the terminal 1 establish communication connection with the operating system 2 through the router 101, and the operating system 2 is used for operating various types of data;
the specific mode is as follows:
each set of self-service terminals 102 reads a part of data from the data server 103 through the router 101 for temporary storage, so that information can be called in time conveniently, and timeliness is improved;
the user logs in and identifies through each set of self-service terminals 102, the sets of self-service terminals 102 call required data from the power data temporarily stored in the data server 103, if the required data do not exist, user information registration needs to be carried out again, the humanization degree is higher, reasonable guidance is achieved, and the situation that the user consumes a large amount of time is avoided.
A plurality of sets of self-service terminals 102 are all in communication connection with the operating system 2, so that a plurality of users can log in on a plurality of clients 9 at the same time, the timeliness is stronger, the terminal 1 comprises a wireless communication module 10, the wireless communication module 10 is in communication connection with the clients 9 through a router 101, and meanwhile, the operating system 2 can be in communication connection with a mobile terminal of a user, such as a mobile phone and the like, through the router 101, so that the user can log in through the mobile terminal, the use convenience is greatly improved,
meanwhile, the terminal 1 further comprises a wireless communication module 10, so that when a user logs in the operating system 2, the terminal 1 can push information to the client 9 through the operating system 2, the login state and the information are improved, the user at the front end and the user at the rear end can conveniently check the information, and the use safety of the terminal 2 is greatly improved.
The fourth step also comprises: when the user information 5 of the user is not matched with the encryption lock 4 or the login request 3 is not matched with the encryption lock 4, the system is locked, and the user is prohibited from logging in;
when the login request 3 is not matched with the encryption lock 4, the recognition is unclear, the prompt is to recognize again, or the recognition mode is changed, after the recognition cannot be performed for many times, the system is closed, the user forbids to login, the login is promoted through the client 9, the login is performed again, and the safety of the system is greatly improved.
The operating system 2 comprises encryption hardware 6, a processing chip 7 and a cache database 8, wherein the encryption hardware 6, the processing chip 7 and the cache database 8 are all in communication connection with each other, and the processing chip 7 stores the obtained encryption hardware 6 in the cache database 8;
the encryption hardware 6 comprises face information encryption hardware 601, fingerprint information encryption hardware 602 and password information encryption hardware 603, and the encryption hardware 6 is in communication connection with the encryption lock 4;
the face information encryption hardware 601 is matched with the face identification encryption lock 401, the fingerprint information encryption hardware 602 is matched with the fingerprint information encryption hardware 602, and the password information encryption hardware 603 is matched with the user password identification encryption lock 403;
the cache database 8 establishes communication connection with the data server 103;
the processing chip 7 carries out calculation on the information of the user, once the user information corresponds to the encryption hardware 6 in the operating system 2, the login is successful, otherwise, wrong information is temporarily placed into the cache database 8, the whole system is interconnected, and the safety of the system is improved.
The processing chip 7 encrypts the encryption hardware 6 by using RSA;
the algorithm of RSA involves three parameters: n, e1, e2; (ii) a
Wherein n is the product of two large prime numbers p, q, and the binary number of n represents the key length;
e1 and e2 are a pair of related values, e1 can be arbitrarily taken, but e1 is required to be relatively prime with (p-1) × (q-1); and e2 is selected again, and the requirements are as follows:
(e2×e1)≡1(mod(p-1)×(q-1));
n, e 1), (n, e 2) are key pairs, where (n, e 1) is a public key and (n, e 2) is a private key;
the RSA encryption and decryption algorithms are completely the same, and if a is a plaintext and B is a ciphertext, then:
A≡B^e2(mod n);
b ≡ A ^ e1 (mod n); in the public key encryption system, the public key is used to encrypt and the private key is used to decrypt
e1 and e2 may be used interchangeably, i.e.:
A≡B^e1(mod n);B≡A^e2(mod n)。
the RSA algorithm is based on a very simple number theory fact: multiplication of two large prime numbers is easy, but factorization of their products is extremely difficult, so the products can be disclosed as encryption keys;
the RSA algorithm is an asymmetric cryptographic algorithm, so-called asymmetry refers to that the algorithm needs a pair of keys, one key is used for encryption, the other key is used for decryption, most js RSA libraries are encrypted and decrypted in an incoming exponent modulus mode, a RSA encryption module is in an exponent and modulus mode, wherein exponents serving as exponents are 10001 in most times by default, and conversion to decimal is 65537, so that the safety factor of the system is greatly improved.
The client 9 comprises a camera 901, a fingerprint identification device 902 and a user password login device 903, the client 9 is connected with a display unit 904, and the display unit 904 is used for displaying confirmation information when matching is successful;
gather and discern user's facial information through camera 901, gather and discern user's fingerprint information through fingerprint identification device 902, gather and discern user's account password through user password login device 903, simple structure, the convenience is higher, promotes the efficiency of using greatly.
It is noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a good or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such good or system. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of additional like elements in a commodity or system that comprises the element.
The foregoing description shows and describes several preferred embodiments of the invention, but as aforementioned, it is to be understood that the invention is not limited to the forms disclosed herein, and is not to be construed as excluding other embodiments, and that the invention is capable of use in various other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as expressed herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A login identification encryption method for a digital business hall of an electric power system comprises a terminal, wherein an operating system is installed on the terminal, and the encryption method is characterized by comprising the following steps:
the method comprises the following steps: and (3) login request: a user initiates a login request to a terminal through a client provided with an operating system;
step two: logging in a port: after receiving the information, the terminal identifies the user information through the client and provides a login port;
step three: and (3) password identification: the client sends the login information to the terminal, and an operating system of the terminal matches the login information with the encryption lock;
step four: and (4) judging the result: and when the login information of the user is matched with the encryption lock, determining that the user successfully logs in.
2. The login identification encryption method for the digital business hall of the electric power system as claimed in claim 1, wherein: the login request comprises a face identification request, a fingerprint identification request and a user password identification request;
the encryption lock comprises a face identification encryption lock and a fingerprint identification encryption lock, and the encryption lock is identified by a user password;
the face identification request is matched with the face identification encryption lock, the fingerprint identification request is matched with the fingerprint identification encryption lock, and the user password identification request is matched with the user password identification encryption lock.
3. The login identification encryption method for the electric power system digital business hall as claimed in claim 2, wherein: the operating system comprises encryption hardware, a processing chip and a cache database, wherein the encryption hardware, the processing chip and the cache database are all in communication connection with each other, and the processing chip stores the obtained encryption hardware in the cache database;
the encryption hardware comprises face information encryption hardware, fingerprint information encryption hardware and password information encryption hardware, and the encryption hardware is in communication connection with the encryption lock;
the face information encryption hardware is matched with the face identification encryption lock, the fingerprint information encryption hardware is matched with the fingerprint information encryption hardware, and the password information encryption hardware is matched with the user password identification encryption lock;
and the cache database establishes communication connection with the data server.
4. The login identification encryption method for the electric power system digitization business hall according to claim 3, characterized by comprising the following steps: the processing chip encrypts the encryption hardware by using RSA;
the algorithm of RSA involves three parameters: n, e1, e2; (ii) a
Wherein n is the product of two large prime numbers p, q, and the binary number of n represents the key length;
e1 and e2 are a pair of related values, e1 can be arbitrarily taken, but e1 is required to be relatively prime with (p-1) × (q-1); and e2 is selected again, and the requirements are as follows:
(e2×e1)≡1(mod(p-1)×(q-1));
(n, e 1), (n, e 2) are key pairs, where (n, e 1) is the public key and (n, e 2) is the private key;
the RSA encryption and decryption algorithms are completely the same, and if a is a plaintext and B is a ciphertext, then:
a ≡ B ^ e2 (mod n); b ≡ A ^ e1 (mod n); in the public key encryption system, the public key encryption, the private key decryption,
e1 and e2 may be used interchangeably, i.e.:
A≡B^e1(mod n);B≡A^e2(mod n)。
5. the login identification encryption method for the electric power system digitization business hall according to claim 1, characterized by comprising the following steps: the first step comprises the following steps:
and (3) registering user information: a user saves user information in the operating system of the terminal in advance, wherein the user information comprises user face information, user fingerprint information and user password information, and the user stores the user information (5) in the operating system through a client;
the user information registration specifically comprises the following steps:
3.1, login of an administrator: a system administrator submits an access application to a terminal through a client, and a user accesses an operating system and registers personal information;
3.2, information entry: after a user registers personal information, sequentially inputting user face information, user fingerprint information and user password information in the user information;
3.3, information storage: and after the user inputs the user information, storing the user information in the operating system.
6. The login identification encryption method for the electric power system digitization business hall according to claim 5, wherein: the terminal comprises a router, a plurality of sets of self-service terminals and a data server;
the system comprises a plurality of sets of self-service terminals, a router, an operating system and a data server, wherein the plurality of sets of self-service terminals and the data server on the terminals are in communication connection with the operating system through the router, and the operating system is used for operating various types of data;
the specific mode is as follows:
each set of self-service terminals reads a part of data from the data server through the router for temporary storage;
and the user logs in and identifies through each set of self-service terminals, the sets of self-service terminals call required data from the power data temporarily stored by the data server, and if the required data does not exist in the power data, the user information registration needs to be carried out again.
7. The login identification encryption method for the electric power system digitization business hall according to claim 1, characterized by comprising the following steps: the fourth step further comprises: and when the user information of the user is not matched with the encryption lock or the login request is not matched with the encryption lock, the system is locked, and the user is prohibited from logging in.
8. The login identification encryption method for the electric power system digitization business hall according to claim 1, characterized by comprising the following steps: the client comprises a camera, a fingerprint identification device and a user password login device, a display unit is connected to the client, and the display unit is used for displaying confirmation information when matching is successful.
9. The login identification encryption method for the digital business hall of the electric power system as claimed in claim 1, wherein: the terminal comprises a wireless communication module, and the wireless communication module is in communication connection with the client through the router.
10. The login identification encryption method for the electric power system digitization business hall according to claim 1, characterized by comprising the following steps: the client comprises a user management module, the user management module is in communication connection with the operating system, and the user management module is used for switching the login request.
CN202211037066.9A 2022-08-25 2022-08-25 Login identification encryption method for digital business hall of electric power system Pending CN115529163A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211037066.9A CN115529163A (en) 2022-08-25 2022-08-25 Login identification encryption method for digital business hall of electric power system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211037066.9A CN115529163A (en) 2022-08-25 2022-08-25 Login identification encryption method for digital business hall of electric power system

Publications (1)

Publication Number Publication Date
CN115529163A true CN115529163A (en) 2022-12-27

Family

ID=84697541

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211037066.9A Pending CN115529163A (en) 2022-08-25 2022-08-25 Login identification encryption method for digital business hall of electric power system

Country Status (1)

Country Link
CN (1) CN115529163A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701593A (en) * 2013-12-26 2014-04-02 西安理工大学 256-system large number-based Ron Rivest, Adi Shamir and Leonard Adleman (RSA) encryption method
CN104657639A (en) * 2015-02-02 2015-05-27 中国科学院数据与通信保护研究教育中心 Test method and system of operation system identity authentication mechanism
CN106713274A (en) * 2016-11-25 2017-05-24 湖南工业大学 Method and device for generating two-dimensional code based on text compression and method and device for reading two-dimensional code based on text compression
CN107086983A (en) * 2017-03-03 2017-08-22 福建省汽车工业集团云度新能源汽车股份有限公司 A kind of intelligent automobile voice quick registration method and device
CN107516026A (en) * 2017-09-01 2017-12-26 郑州云海信息技术有限公司 The method and its device of fingerprint recognition
CN107818255A (en) * 2017-12-01 2018-03-20 郑州云海信息技术有限公司 A kind of method based on fingerprint recognition encryption strengthening system safety
CN108134791A (en) * 2017-12-22 2018-06-08 郑州云海信息技术有限公司 A kind of data center's total management system login validation method
CN109088873A (en) * 2018-08-16 2018-12-25 安徽大尺度网络传媒有限公司 A kind of login system based on recognition of face big data
CN114417303A (en) * 2021-12-17 2022-04-29 中国建设银行股份有限公司 Login authentication management method, device, processor and machine-readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701593A (en) * 2013-12-26 2014-04-02 西安理工大学 256-system large number-based Ron Rivest, Adi Shamir and Leonard Adleman (RSA) encryption method
CN104657639A (en) * 2015-02-02 2015-05-27 中国科学院数据与通信保护研究教育中心 Test method and system of operation system identity authentication mechanism
CN106713274A (en) * 2016-11-25 2017-05-24 湖南工业大学 Method and device for generating two-dimensional code based on text compression and method and device for reading two-dimensional code based on text compression
CN107086983A (en) * 2017-03-03 2017-08-22 福建省汽车工业集团云度新能源汽车股份有限公司 A kind of intelligent automobile voice quick registration method and device
CN107516026A (en) * 2017-09-01 2017-12-26 郑州云海信息技术有限公司 The method and its device of fingerprint recognition
CN107818255A (en) * 2017-12-01 2018-03-20 郑州云海信息技术有限公司 A kind of method based on fingerprint recognition encryption strengthening system safety
CN108134791A (en) * 2017-12-22 2018-06-08 郑州云海信息技术有限公司 A kind of data center's total management system login validation method
CN109088873A (en) * 2018-08-16 2018-12-25 安徽大尺度网络传媒有限公司 A kind of login system based on recognition of face big data
CN114417303A (en) * 2021-12-17 2022-04-29 中国建设银行股份有限公司 Login authentication management method, device, processor and machine-readable storage medium

Similar Documents

Publication Publication Date Title
Zeng et al. E-AUA: An efficient anonymous user authentication protocol for mobile IoT
US8799664B2 (en) Small public-key based digital signatures for authentication
Khan et al. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
Fan et al. Robust remote authentication scheme with smart cards
Leu et al. Efficient and secure dynamic ID‐based remote user authentication scheme for distributed systems using smart cards
CN110224812B (en) Method and equipment for communication between electronic signature mobile client and collaboration server based on multi-party security calculation
US7856556B2 (en) Codeword-enhanced peer-to-peer authentication
CN105516201A (en) Lightweight anonymous authentication and key negotiation method in multi-server environment
KR20050073573A (en) Secure communications
JPH08507619A (en) Two-way public key verification and key matching for low cost terminals
WO2007067349A1 (en) Single one-time password token with single pin for access to multiple providers
CN109379176B (en) Password leakage resistant authentication and key agreement method
CN110224816B (en) Anti-quantum computing application system based on key fob and serial number, near-field energy-saving communication method and computer equipment
Li et al. Comments on “provably secure dynamic id-based anonymous two-factor authenticated key exchange protocol with extended security model”
CN110519214B (en) Application system short-distance energy-saving communication method, system and equipment based on online and offline signature and auxiliary verification signature
CN107104792B (en) Portable mobile password management system and management method thereof
CN110213056B (en) Anti-quantum computing energy-saving communication method and system and computer equipment
CN115529163A (en) Login identification encryption method for digital business hall of electric power system
CN116248312A (en) Lightweight zero-knowledge identity authentication method for Internet of things equipment
Zhang et al. Verifier-based anonymous password-authenticated key exchange protocol in the standard model
CN110048920B (en) Anti-quantum-computation intelligent home near-distance energy-saving communication method and system based on key fob
CN110061895B (en) Close-range energy-saving communication method and system for quantum computing resisting application system based on key fob
Hu et al. Anonymous password authenticated key exchange protocol in the standard model
Zhu et al. An efficient and secure biometrics-based one-time identity-password authenticated scheme for e-coupon system towards mobile Internet
Rozenblit et al. Computer aided design system for VLSI interconnections

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination