CN116668189A - Computer network user identity login verification system and method - Google Patents
Computer network user identity login verification system and method Download PDFInfo
- Publication number
- CN116668189A CN116668189A CN202310894781.2A CN202310894781A CN116668189A CN 116668189 A CN116668189 A CN 116668189A CN 202310894781 A CN202310894781 A CN 202310894781A CN 116668189 A CN116668189 A CN 116668189A
- Authority
- CN
- China
- Prior art keywords
- data
- touch
- user
- mobile device
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000012795 verification Methods 0.000 title claims abstract description 93
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000006243 chemical reaction Methods 0.000 claims abstract description 56
- 238000004891 communication Methods 0.000 claims description 23
- 238000004422 calculation algorithm Methods 0.000 claims description 17
- 230000005540 biological transmission Effects 0.000 claims description 16
- 230000009471 action Effects 0.000 claims description 12
- 238000012216 screening Methods 0.000 claims description 12
- 238000001514 detection method Methods 0.000 claims description 10
- 230000015572 biosynthetic process Effects 0.000 claims description 4
- 238000013500 data storage Methods 0.000 claims description 4
- 238000003786 synthesis reaction Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000010079 rubber tapping Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Debugging And Monitoring (AREA)
Abstract
The application is suitable for the technical field of identity verification, in particular to a computer network user identity login verification system and a method, wherein the method comprises the following steps: receiving a log-out request, and intercepting data to obtain temporary intercepted data; performing data conversion on the temporary interception data, converting the temporary interception data into a character string with a preset format, and generating identity verification data based on the character string; transmitting the authentication data to a mobile device bound to the current computer network user; and receiving touch data by the mobile equipment, identifying a touch gesture based on the touch data, and if the touch gesture is the same as the preset gesture, sending corresponding identity verification data by the mobile equipment to finish login verification. According to the application, when the user needs to log in after each use, the mobile device is used for collecting information, and the user can call the corresponding verification data to log in through the simple touch device, so that the verification efficiency is greatly improved, and the convenience of logging in of the user is improved.
Description
Technical Field
The application belongs to the technical field of identity verification, and particularly relates to a computer network user identity login verification system and method.
Background
The authentication is also called authentication, and means that the user identity is confirmed by a certain means. There are many methods of authentication, which can be basically divided into: authentication based on a shared key, authentication based on biological characteristics, and authentication based on a public key encryption algorithm.
The purpose of authentication is to confirm that the user currently purported to be of a certain identity is indeed the purported user. In daily life, authentication is not uncommon; for example, by checking the identity of the other party, we can generally be confident about the identity of the other party. Although such a method of confirming the identity of the counterpart in daily life also belongs to the broad term "authentication", the term "authentication" is used more and more in the fields of computers, communications, and the like.
In the current computer network user login process, the account number and the password are directly input for verification, and the account number and the password are required to be input for each verification, so that the operation is complicated.
Disclosure of Invention
The embodiment of the application aims to provide a computer network user identity login verification method, which aims to solve the problems that in the current computer network user login process, an account number and a password are directly input for verification, and the account number and the password are required to be input for each verification, so that the operation is complicated.
The embodiment of the application is realized in such a way that the computer network user identity login verification method comprises the following steps:
receiving an exit login request, and intercepting data based on the exit login request to obtain temporary interception data;
performing data conversion on the temporary interception data, converting the temporary interception data into a character string with a preset format, and generating identity verification data based on the character string;
transmitting the authentication data to a mobile device bound with a current computer network user, wherein the mobile device stores the authentication data;
and receiving touch data by the mobile equipment, identifying a touch gesture based on the touch data, and if the touch gesture is the same as the preset gesture, sending corresponding identity verification data by the mobile equipment to finish login verification.
Preferably, the step of converting the temporary interception data into a character string in a preset format and generating authentication data based on the character string specifically includes:
carrying out binary conversion on the temporary interception data, and converting the temporary interception data into thirty-six binary data to obtain format conversion data;
character screening is carried out on the format conversion data, and only one type of character is reserved in the screened format conversion data to obtain a character string with a preset format;
counting the number of each character in the character string in the preset format, recording the number of each character, and generating identity verification data based on the number of each character, wherein the identity verification data is the combination of the characters and numbers corresponding to the number of the characters.
Preferably, the step of sending the authentication data to a mobile device bound to the current computer network user, where the mobile device stores the authentication data specifically includes:
matching the current user with the mobile equipment set by the user, and determining the communication address of the mobile equipment;
encrypting the authentication data according to a preset encryption algorithm, and transmitting the encrypted authentication data according to a communication address;
and receiving the authentication data through the mobile equipment, decrypting the authentication data, and storing the decrypted authentication data in a preset area.
Preferably, the step of receiving the touch data by the mobile device, identifying a touch gesture based on the touch data, and if the touch gesture is the same as the preset gesture, sending corresponding authentication data by the mobile device to complete login authentication specifically includes:
when logging in is needed, an information receiving instruction is sent to the mobile equipment, and the mobile equipment is in a standby state according to the information receiving instruction;
detecting screen touch actions in real time through mobile equipment to obtain touch data, and identifying touch gestures based on positions touched by a user in the touch data and time intervals of adjacent touch data;
if the touch gesture is the same as the preset gesture, the mobile device sends out corresponding identity verification data to complete login verification.
Preferably, the mobile device has stored therein a decryption key for decrypting the authentication data.
Preferably, after receiving the information receiving instruction, the mobile device opens a detection window, wherein the duration of the detection window is a preset value, and after reaching the preset value, the detection window is closed.
It is another object of an embodiment of the present application to provide a computer network user identity login verification system, the system comprising:
the data interception module is used for receiving the log-out request, and intercepting the data based on the log-out request to obtain temporary interception data;
the data conversion module is used for carrying out data conversion on the temporary interception data, converting the temporary interception data into character strings in a preset format, and generating identity verification data based on the character strings;
the data transmission module is used for transmitting the identity verification data to the mobile equipment bound with the current computer network user, and the mobile equipment stores the identity verification data;
the identity verification module is used for receiving touch data through the mobile equipment, identifying touch gestures based on the touch data, and sending corresponding identity verification data through the mobile equipment if the touch gestures are the same as preset gestures, so that login verification is completed.
Preferably, the data conversion module includes:
the format conversion unit is used for carrying out binary conversion on the temporary interception data and converting the temporary interception data into thirty-six binary data to obtain format conversion data;
the character screening unit is used for carrying out character screening on the format conversion data, and the screened format conversion data only reserves one type of character to obtain a character string with a preset format;
the data synthesis unit is used for counting the number of each character in the character string in the preset format, recording the number of each character, and generating identity verification data based on the number of each character, wherein the identity verification data is the combination of the characters and numbers corresponding to the number of the characters.
Preferably, the data transmission module includes:
the communication address matching unit is used for matching the current user with the mobile equipment set by the user and determining the communication address of the mobile equipment;
the authentication data transmission unit is used for encrypting the authentication data according to a preset encryption algorithm and transmitting the encrypted authentication data according to the communication address;
and the verification data storage unit is used for receiving the authentication data through the mobile equipment, decrypting the authentication data and storing the decrypted authentication data in a preset area.
Preferably, the identity verification module includes:
the mobile device comprises an instruction receiving unit, a control unit and a control unit, wherein the instruction receiving unit is used for sending an information receiving instruction to the mobile device when login is needed, and the mobile device is in a standby state according to the information receiving instruction;
the touch data acquisition unit is used for detecting touch actions of the screen in real time through the mobile equipment to obtain touch data, and identifying touch gestures based on the positions touched by a user in the touch data and the time intervals of adjacent touch data;
and the touch verification unit is used for sending corresponding identity verification data through the mobile equipment to finish login verification if the touch gesture is the same as the preset gesture.
According to the computer network user identity login verification method provided by the embodiment of the application, the use data is temporarily intercepted and used as verification data when each use is finished, so that the verification data is stored in the mobile device, when the user needs to log in, the mobile device is used for information acquisition, and the user can access the corresponding verification data for logging in through a simple touch device, so that the verification efficiency is greatly improved, and the convenience of user login is improved.
Drawings
FIG. 1 is a flow chart of a method for verifying user identity login of a computer network according to an embodiment of the present application;
fig. 2 is a flowchart of performing data conversion on temporary interception data, converting the temporary interception data into a character string with a preset format, and generating authentication data based on the character string, which is provided by the embodiment of the application;
FIG. 3 is a flowchart of the method for transmitting authentication data to a mobile device bound to a current computer network user, the mobile device storing the authentication data according to an embodiment of the present application;
FIG. 4 is a flowchart of receiving touch data by a mobile device, identifying a touch gesture based on the touch data, and if the touch gesture is the same as a preset gesture, sending corresponding authentication data by the mobile device to complete login authentication;
FIG. 5 is a block diagram of a computer network user authentication system according to an embodiment of the present application;
fig. 6 is a schematic diagram of a data conversion module according to an embodiment of the present application;
fig. 7 is a schematic diagram of a data transmission module according to an embodiment of the present application;
fig. 8 is a schematic diagram of an authentication module according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another element. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of this disclosure.
As shown in fig. 1, a flowchart of a method for verifying user identity login of a computer network according to an embodiment of the present application includes:
s100, receiving a log-out request, and intercepting data based on the log-out request to obtain temporary interception data.
In this step, the method is applied to a login webpage or a computer client, after a user verifies an account number and a password for the first time, identity login can be completed, when the user logs out of the account number, the webpage or the client intercepts the last received data, so that temporary intercepted data can be obtained, if an APP client receives a data packet before pushing out, temporary intercepted data with preset byte length is intercepted from the data packet, no matter what the content is contained in the data packet, the data can be intercepted as data, in particular video data, audio data, text data and the like, the data can be generated in the APP, uploaded by the user or downloaded from a network, and the time for intercepting the data is the moment for detecting the user logging out.
And S200, performing data conversion on the temporary interception data, converting the temporary interception data into a character string in a preset format, and generating identity verification data based on the character string.
In this step, the temporary interception data is subjected to data conversion, and is used as a carrier for verifying the identity of the user, so that the temporary interception data is not required to be known about specific content and specific meaning contained in the temporary interception data, is subjected to binary conversion, is converted into specific binary data, specifically, thirty-six binary data can be represented by characters 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y and Z, and is converted to obtain character strings in a specific format, and in order to further improve the randomness of the data and ensure the safety of the verification data, the number of the characters in the character strings is counted, and a group of identity verification data is generated based on the contained characters and the number of the characters.
And S300, the authentication data is sent to the mobile equipment bound with the current computer network user, and the mobile equipment stores the authentication data.
In this step, the authentication data is sent to the mobile device bound to the current computer network user, in order to ensure the security of the data in the transmission process, a preset encryption algorithm is called to encrypt the authentication data, a decryption key for decryption is stored in the mobile device, and in the transmission process, even if the encrypted authentication data is intercepted or copied, the encrypted authentication data cannot be encrypted due to lack of the decryption key, so that the decryption process of the authentication data is difficult to complete, account login cannot be performed according to the authentication data naturally, the mobile device stores the authentication data, and in the process, the authentication data is not decrypted.
S400, receiving touch data through the mobile equipment, identifying touch gestures based on the touch data, and if the touch gestures are identical to the preset gestures, sending corresponding identity verification data through the mobile equipment to finish login verification.
In this step, touch data is received through the mobile device, when a user opens a corresponding webpage or client, the webpage or client is automatically matched with a corresponding user according to an account number logged in last time, the corresponding mobile device is matched based on the user, so that a communication address corresponding to the mobile device is called, an information receiving instruction is sent to the mobile device, after the mobile device receives the information receiving instruction, a detection window is opened, when the detection window is opened, the mobile device can be lightened, a screen-extinguishing state can also be kept, at the moment, a corresponding prompt voice can be set, the prompt voice is used for prompting that the current touch instruction is acquired, at the moment, the user can touch the mobile device according to a preset touch action, the touch action is user-defined, such as circle drawing in a specific area of the mobile device, or three-finger tap in a specific area of the mobile device, a time interval of multiple tap is set, based on a touch gesture monitored in real time and a user-defined gesture, if the touch gesture is matched, corresponding identity verification data is sent to a corresponding webpage background or an APP through the mobile device, and verification is completed.
As shown in fig. 2, as a preferred embodiment of the present application, the step of performing data conversion on temporary interception data, converting the temporary interception data into a character string in a preset format, and generating authentication data based on the character string specifically includes:
s201, carrying out binary conversion on the temporary interception data, and converting the temporary interception data into thirty-six binary data to obtain format conversion data.
In this step, the temporary interception data is subjected to a binary conversion, and in order to reduce the number of characters, the temporary interception data is converted into tricetyl, and at this time, the numbers and letters in the data are regarded as characters, so that format conversion data is obtained.
S202, character screening is carried out on the format conversion data, and only one type of character is reserved in the screened format conversion data, so that a character string with a preset format is obtained.
In this step, character screening is performed on the format conversion data, specifically, the number characters contained in the format conversion data can be completely removed, only the alphabetic characters are reserved, and based on the same manner, only the number characters can be reserved, and the alphabetic characters can be discarded, so that a character string with a preset format can be obtained.
S203, counting the number of each character in the character string in the preset format, recording the number of each character, and generating identity verification data based on the number of each character, wherein the identity verification data is the combination of the characters and numbers corresponding to the number of the characters.
In this step, the number of each character in the character string in the preset format is counted, and in thirty-six, a total of 26 alphabetic characters are included, and in the character string in the preset format, each alphabetic character is repeatedly used, the number of use of each alphabetic character is counted, the alphabetic characters are ordered according to A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y and Z, and the corresponding number of use times such as a80, B85, etc. is inserted after each alphabetic character, so as to obtain the authentication data.
As shown in fig. 3, as a preferred embodiment of the present application, the step of sending the authentication data to a mobile device bound to a current computer network user, where the mobile device stores the authentication data specifically includes:
s301, matching the current user with the mobile device set by the user, and determining the communication address of the mobile device.
In the step, the current user is matched with the mobile device set by the user, specifically, the webpage or the APP client records the user account number logged in each time, the corresponding user identity can be determined based on the user account number, the mobile device corresponding to the user is correspondingly determined, and the communication address of the mobile device is determined accordingly.
S302, encrypting the authentication data according to a preset encryption algorithm, and sending the encrypted authentication data according to the communication address.
In this step, the authentication data is encrypted according to a preset encryption algorithm, and an encryption algorithm is set in the background of the web page or in the client, so that the encryption algorithm can be directly used for encrypting the data, a decryption key corresponding to the encryption algorithm is synchronously stored in the mobile device, and after encryption is completed, the encrypted authentication data is sent according to the communication address.
S303, receiving the authentication data through the mobile equipment, decrypting the authentication data, and storing the decrypted authentication data in a preset area.
In this step, the mobile device receives the authentication data, and in order to ensure the security of the data, an independent storage area is set in the mobile device, and the data in the storage area can only be written in and read out, so that the APP outside the authority is not allowed to rewrite the data.
As shown in fig. 4, as a preferred embodiment of the present application, the step of receiving touch data by the mobile device, identifying a touch gesture based on the touch data, and if the touch gesture is the same as a preset gesture, sending corresponding authentication data by the mobile device to complete login authentication specifically includes:
s401, when logging in is needed, an information receiving instruction is sent to the mobile device, and the mobile device is in a standby state according to the information receiving instruction.
In the step, when the login is required, an information receiving instruction is sent to the mobile device, the mobile device receives the information receiving instruction, so that the mobile device enters an information acquisition state, a screen of the mobile device is lightened, and a user can perform touch control on the screen.
S402, detecting screen touch actions in real time through the mobile device, obtaining touch data, and identifying touch gestures based on positions of user touches in the touch data and time intervals of adjacent touch data.
In this step, the mobile device detects the touch action of the screen in real time, in the above process, the user performs touch according to his user-defined touch gesture, if the user sets up to tap the screen three times with two fingers, the interval time is long and short, so as to obtain touch data, then the touch data is parsed, it is determined whether the user uses two fingers or not to tap each time, the tap time interval is long and short, the definition of the length can be twice the time of the first tap and the second tap and the time of the third tap, and then the length is long and short, otherwise, the user is regarded as two or two short, and the touch gesture is recognized based on the position touched by the user in the touch data and the time interval of the adjacent touch data.
S403, if the touch gesture is the same as the preset gesture, sending corresponding identity verification data through the mobile device, and finishing login verification.
In this step, when the touch gesture is the same as the preset gesture, the identity verification data is sent, the gesture is the same to indicate that the mobile device is nearby the user, and the user is himself/herself, in order to further improve security, the functions are limited within a preset time period from the last time the user unlocks the mobile device, if the user unlocks the mobile device at the time a, gesture verification can be performed by tapping in a duration of time B from the time a, otherwise verification can only be performed by inputting an account number and a password.
As shown in fig. 5, a system for verifying user identity login of a computer network according to an embodiment of the present application includes:
the data interception module 100 is configured to receive the log-out request, and intercept data based on the log-out request to obtain temporary intercepted data.
In the system, the data interception module 100 receives an exit login request, the application is applied to a login webpage or a computer client, after a user verifies an account number and a password for the first time, identity login can be completed, when the user exits the account number, the webpage or the client intercepts the last received data, temporary intercepted data can be obtained, if an APP client receives a data packet before pushing, the temporary intercepted data with preset byte length is intercepted from the data packet, no matter what the content is contained in the data packet, the data can be intercepted as data, in particular, video data, audio data, text data and the like, the data can be generated in the APP, uploaded by the user, downloaded from a network, and the time for intercepting the data is the time for detecting the user to exit login.
The data conversion module 200 is configured to perform data conversion on the temporary interception data, convert the temporary interception data into a character string in a preset format, and generate authentication data based on the character string.
In the system, the data conversion module 200 performs data conversion on temporary interception data, and for temporary interception data, the temporary interception data is only used as a carrier for verifying the identity of a user, so that specific content and specific meaning contained in the temporary interception data are not required to be known, the temporary interception data are converted into specific data, specifically, thirty-six system data can be expressed by characters 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y and Z, after conversion, character strings in specific formats are obtained, and in order to further improve the randomness of the data and ensure the safety of the verification data, the number statistics is performed on the characters in the character strings, and a group of identity verification data is generated based on the contained characters and the number of the characters.
The data transmission module 300 is configured to send the authentication data to a mobile device bound to a current computer network user, where the mobile device stores the authentication data.
In the system, the data transmission module 300 sends the authentication data to the mobile device bound with the current computer network user, in order to ensure the security of the data in the transmission process, a preset encryption algorithm is called to encrypt the authentication data, a decryption key for decryption is stored in the mobile device, and the encrypted authentication data cannot be encrypted in the transmission process even if the encrypted authentication data is intercepted or copied due to lack of the decryption key, so that the decryption process of the authentication data cannot be completed, account login cannot be naturally performed according to the authentication data, the mobile device stores the authentication data, and the authentication data is not decrypted in the process.
The authentication module 400 is configured to receive the touch data through the mobile device, identify a touch gesture based on the touch data, and send corresponding authentication data through the mobile device if the touch gesture is the same as the preset gesture, thereby completing login authentication.
In the system, the authentication module 400 receives touch data through the mobile device, when a user opens a corresponding webpage or client, the webpage or client is automatically matched with a corresponding user according to an account number logged in last time, the corresponding mobile device is matched based on the user, so that a communication address corresponding to the mobile device is called, an information receiving instruction is sent to the mobile device, after the mobile device receives the information receiving instruction, a detection window is opened, when the detection window is opened, the mobile device can be lightened, a screen-in state can be kept, at the moment, a corresponding prompt voice can be set, the prompt voice is used for prompting that the current touch instruction is acquired, at the moment, the user can touch the mobile device according to a preset touch action, the touch action is user-defined, such as circle drawing in a specific area of the mobile device, or three-finger tap in a specific area of the mobile device, the time interval of multiple tap is set to be long and short, and based on the touch gesture monitored in real time and the user-defined gesture, if the touch gesture is matched, the mobile device sends corresponding authentication data to the corresponding webpage or APP, and the authentication data is sent to the corresponding webpage or the client to complete login authentication.
As shown in fig. 6, as a preferred embodiment of the present application, the data conversion module 200 includes:
and the format conversion unit 201 is configured to perform a binary conversion on the temporary interception data, and convert the temporary interception data into thirty-six binary data, thereby obtaining format conversion data.
In the present system, the format conversion unit 201 performs a binary conversion on the temporary interception data, and in order to reduce the number of characters, converts it into tricyclopedia, and at this time, the numbers and letters in the data are regarded as characters, so as to obtain format conversion data.
The character screening unit 202 is configured to perform character screening on the format conversion data, where the screened format conversion data only retains one type of character, and a character string with a preset format is obtained.
In the present system, the character screening unit 202 performs character screening on the format conversion data, specifically, the number characters contained therein may be removed entirely, only the alphabetic characters are reserved, and based on the same manner, only the number characters may be reserved and the alphabetic characters may be discarded, so as to obtain a character string in a preset format.
The data synthesis unit 203 is configured to count the number of each character in the character string in the preset format, record the number of each character, and generate authentication data based on the number of each character, where the authentication data is a combination of the character and a number corresponding to the number of the character.
In the present system, the data synthesis unit 203 counts the number of each character in the character string in the preset format, and in thirty-six, contains 26 alphabetic characters in total, and in the character string in the preset format, each alphabetic character is repeatedly used, counts the number of use of each alphabetic character, sorts the alphabetic characters according to A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y and Z, and inserts the corresponding number of use times, such as a80, B85, etc., after each alphabetic character, to obtain the authentication data.
As shown in fig. 7, as a preferred embodiment of the present application, the data transmission module 300 includes:
the communication address matching unit 301 is configured to match the current user with the mobile device set by the user, and determine the communication address of the mobile device.
In this module, the communication address matching unit 301 matches the current user with the mobile device set by the user, specifically, the web page or APP client records the user account logged in each time, and based on the user account, the corresponding user identity can be determined, and the mobile device corresponding to the user is correspondingly determined, and then the communication address of the mobile device is determined.
The authentication data transmission unit 302 is configured to encrypt the authentication data according to a preset encryption algorithm, and send the encrypted authentication data according to a communication address.
In this module, the authentication data transmission unit 302 encrypts the authentication data according to a preset encryption algorithm, and an encryption algorithm is set in the background of the web page or in the client, so that the encryption algorithm can be directly used for encrypting the data, a decryption key corresponding to the encryption algorithm is synchronously stored in the mobile device, and after the encryption is completed, the encrypted authentication data is sent according to the communication address.
And the verification data storage unit 303 is configured to receive the authentication data through the mobile device, decrypt the authentication data, and store the decrypted authentication data in a preset area.
In this module, the authentication data storage unit 303 receives authentication data through the mobile device, and in order to ensure the security of the data, an independent storage area is set in the mobile device, and data in the storage area can only be written in and read out, so that the APP outside the authority is not allowed to rewrite the data.
As shown in fig. 8, as a preferred embodiment of the present application, the authentication module 400 includes:
the instruction receiving unit 401 is configured to send an information receiving instruction to the mobile device when the login is required, and the mobile device is in a standby state according to the information receiving instruction.
In this module, when the login is required, the instruction receiving unit 401 sends an information receiving instruction to the mobile device, and the mobile device receives the information receiving instruction, so that the mobile device enters an information acquisition state, and at this time, the screen of the mobile device is lit up, so that the user can perform touch control on the screen.
The touch data acquisition unit 402 is configured to detect a screen touch action in real time through the mobile device, obtain touch data, and identify a touch gesture based on a position touched by a user in the touch data and a time interval of adjacent touch data.
In this module, the touch data acquisition unit 402 detects the touch action of the screen in real time through the mobile device, in the above process, the user performs touch according to his user-defined touch gesture, for example, sets a double-finger tap on the screen three times, and the interval time is long and short, so as to obtain touch data, then analyzes the touch data, determines whether the user uses the double finger or not each tap, and whether the tap time interval is long and short, where the time interval between the first tap and the second tap may be twice the time between the second tap and the third tap, and is long and short, otherwise, it is regarded as two or two short, and identifies the touch gesture based on the position of the user touch in the touch data and the time interval between the adjacent touch data.
The touch verification unit 403 is configured to send corresponding authentication data through the mobile device if the touch gesture is the same as the preset gesture, and complete login verification.
In this module, when the touch gesture is the same as the preset gesture, the touch verification unit 403 sends the authentication data, and the gesture is the same to indicate that the mobile device is nearby the user, and for the user himself, in order to further improve the security, the above function is limited within a preset period of time from the last time the mobile device is unlocked, if the user unlocks the mobile device at the time a, then gesture verification can be performed by tapping during a period of time lasting for the time B at the time a, otherwise verification can only be performed by inputting the account number and the password.
It should be understood that, although the steps in the flowcharts of the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the application.
Claims (10)
1. A method for authenticating user identity login of a computer network, the method comprising:
receiving an exit login request, and intercepting data based on the exit login request to obtain temporary interception data;
performing data conversion on the temporary interception data, converting the temporary interception data into a character string with a preset format, and generating identity verification data based on the character string;
transmitting the authentication data to a mobile device bound with a current computer network user, wherein the mobile device stores the authentication data;
and receiving touch data by the mobile equipment, identifying a touch gesture based on the touch data, and if the touch gesture is the same as the preset gesture, sending corresponding identity verification data by the mobile equipment to finish login verification.
2. The method for verifying the identity login of a computer network user according to claim 1, wherein the step of converting the temporary interception data into a character string in a preset format and generating the identity verification data based on the character string specifically comprises the steps of:
carrying out binary conversion on the temporary interception data, and converting the temporary interception data into thirty-six binary data to obtain format conversion data;
character screening is carried out on the format conversion data, and only one type of character is reserved in the screened format conversion data to obtain a character string with a preset format;
counting the number of each character in the character string in the preset format, recording the number of each character, and generating identity verification data based on the number of each character, wherein the identity verification data is the combination of the characters and numbers corresponding to the number of the characters.
3. The method for authenticating a user's identity login in a computer network according to claim 1, wherein the step of transmitting the authentication data to a mobile device bound to the current computer network user, the mobile device storing the authentication data, comprises:
matching the current user with the mobile equipment set by the user, and determining the communication address of the mobile equipment;
encrypting the authentication data according to a preset encryption algorithm, and transmitting the encrypted authentication data according to a communication address;
and receiving the authentication data through the mobile equipment, decrypting the authentication data, and storing the decrypted authentication data in a preset area.
4. The method for verifying the login of the user identity of the computer network according to claim 1, wherein the step of receiving the touch data by the mobile device, recognizing the touch gesture based on the touch data, and if the touch gesture is the same as the preset gesture, sending corresponding verification data by the mobile device to complete the login verification specifically comprises the steps of:
when logging in is needed, an information receiving instruction is sent to the mobile equipment, and the mobile equipment is in a standby state according to the information receiving instruction;
detecting screen touch actions in real time through mobile equipment to obtain touch data, and identifying touch gestures based on positions touched by a user in the touch data and time intervals of adjacent touch data;
if the touch gesture is the same as the preset gesture, the mobile device sends out corresponding identity verification data to complete login verification.
5. A computer network user identity login verification method according to claim 1, wherein said mobile device has stored therein a decryption key for decrypting the authentication data.
6. The method for verifying user ID login in computer network according to claim 4, wherein after receiving the information receiving command, the mobile device opens a detection window, the duration of the detection window is a preset value, and after reaching the preset value, the detection window is closed.
7. A computer network user identity login verification system, the system comprising:
the data interception module is used for receiving the log-out request, and intercepting the data based on the log-out request to obtain temporary interception data;
the data conversion module is used for carrying out data conversion on the temporary interception data, converting the temporary interception data into character strings in a preset format, and generating identity verification data based on the character strings;
the data transmission module is used for transmitting the identity verification data to the mobile equipment bound with the current computer network user, and the mobile equipment stores the identity verification data;
the identity verification module is used for receiving touch data through the mobile equipment, identifying touch gestures based on the touch data, and sending corresponding identity verification data through the mobile equipment if the touch gestures are the same as preset gestures, so that login verification is completed.
8. The computer network user identity login verification system of claim 7, wherein said data conversion module comprises:
the format conversion unit is used for carrying out binary conversion on the temporary interception data and converting the temporary interception data into thirty-six binary data to obtain format conversion data;
the character screening unit is used for carrying out character screening on the format conversion data, and the screened format conversion data only reserves one type of character to obtain a character string with a preset format;
the data synthesis unit is used for counting the number of each character in the character string in the preset format, recording the number of each character, and generating identity verification data based on the number of each character, wherein the identity verification data is the combination of the characters and numbers corresponding to the number of the characters.
9. The computer network user identity login verification system according to claim 7, wherein said data transmission module comprises:
the communication address matching unit is used for matching the current user with the mobile equipment set by the user and determining the communication address of the mobile equipment;
the authentication data transmission unit is used for encrypting the authentication data according to a preset encryption algorithm and transmitting the encrypted authentication data according to the communication address;
and the verification data storage unit is used for receiving the authentication data through the mobile equipment, decrypting the authentication data and storing the decrypted authentication data in a preset area.
10. The computer network user identity login verification system of claim 7, wherein said identity verification module comprises:
the mobile device comprises an instruction receiving unit, a control unit and a control unit, wherein the instruction receiving unit is used for sending an information receiving instruction to the mobile device when login is needed, and the mobile device is in a standby state according to the information receiving instruction;
the touch data acquisition unit is used for detecting touch actions of the screen in real time through the mobile equipment to obtain touch data, and identifying touch gestures based on the positions touched by a user in the touch data and the time intervals of adjacent touch data;
and the touch verification unit is used for sending corresponding identity verification data through the mobile equipment to finish login verification if the touch gesture is the same as the preset gesture.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310894781.2A CN116668189A (en) | 2023-07-20 | 2023-07-20 | Computer network user identity login verification system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310894781.2A CN116668189A (en) | 2023-07-20 | 2023-07-20 | Computer network user identity login verification system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116668189A true CN116668189A (en) | 2023-08-29 |
Family
ID=87713955
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310894781.2A Withdrawn CN116668189A (en) | 2023-07-20 | 2023-07-20 | Computer network user identity login verification system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116668189A (en) |
-
2023
- 2023-07-20 CN CN202310894781.2A patent/CN116668189A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10681025B2 (en) | Systems and methods for securely managing biometric data | |
US8275134B2 (en) | Method for guaranteeing security of critical data, terminal and secured chip | |
CN109325342B (en) | Identity information management method, device, computer equipment and storage medium | |
EP1063812B1 (en) | Methods and equipment for encrypting/decrypting, and indentification systems | |
CN101272237B (en) | Method and system for automatically generating and filling login information | |
US20180082050A1 (en) | Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device | |
US7024562B1 (en) | Method for carrying out secure digital signature and a system therefor | |
US9218473B2 (en) | Creation and authentication of biometric information | |
CN111787530B (en) | Block chain digital identity management method based on SIM card | |
CN108833114A (en) | A kind of decentralization identity authorization system and method based on block chain | |
CN101953111A (en) | System and method for securing data | |
CA2408222A1 (en) | Security system for high level transactions between devices | |
CN1910531B (en) | Method and system used for key control of data resource, related network | |
CN110034926A (en) | The generation and verification method of Internet of Things dynamic password, system and computer equipment | |
KR20220005705A (en) | The electronic device for using homomorphic encryption and the method for processing encrypted data thereof | |
CN106844185A (en) | The storage method and device of a kind of journal file | |
CN110768784A (en) | Password transmission method, device, computer equipment and storage medium | |
EP3343827A1 (en) | Information security device and information security method using accessibility | |
CN101622818A (en) | IC tag system | |
CN102640166B (en) | Electronic security device for validation adopting biometrics information and using method thereof | |
CN113595714A (en) | Contactless card with multiple rotating security keys | |
CN116962021A (en) | Method, device, equipment and medium for user real name authentication in financial cooperative institution | |
CN103684740A (en) | Encrypting method and system, decrypting method and system, encryption and decryption method and system for photo album of mobile terminal | |
CN116668189A (en) | Computer network user identity login verification system and method | |
KR20060098412A (en) | Timely variable password formation module and a floating password application method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20230829 |