CN116668189A - Computer network user identity login verification system and method - Google Patents

Computer network user identity login verification system and method Download PDF

Info

Publication number
CN116668189A
CN116668189A CN202310894781.2A CN202310894781A CN116668189A CN 116668189 A CN116668189 A CN 116668189A CN 202310894781 A CN202310894781 A CN 202310894781A CN 116668189 A CN116668189 A CN 116668189A
Authority
CN
China
Prior art keywords
data
touch
user
mobile device
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202310894781.2A
Other languages
Chinese (zh)
Inventor
张铃丽
谭爽爽
刘宇建
于妍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuchang University
Original Assignee
Xuchang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuchang University filed Critical Xuchang University
Priority to CN202310894781.2A priority Critical patent/CN116668189A/en
Publication of CN116668189A publication Critical patent/CN116668189A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application is suitable for the technical field of identity verification, in particular to a computer network user identity login verification system and a method, wherein the method comprises the following steps: receiving a log-out request, and intercepting data to obtain temporary intercepted data; performing data conversion on the temporary interception data, converting the temporary interception data into a character string with a preset format, and generating identity verification data based on the character string; transmitting the authentication data to a mobile device bound to the current computer network user; and receiving touch data by the mobile equipment, identifying a touch gesture based on the touch data, and if the touch gesture is the same as the preset gesture, sending corresponding identity verification data by the mobile equipment to finish login verification. According to the application, when the user needs to log in after each use, the mobile device is used for collecting information, and the user can call the corresponding verification data to log in through the simple touch device, so that the verification efficiency is greatly improved, and the convenience of logging in of the user is improved.

Description

Computer network user identity login verification system and method
Technical Field
The application belongs to the technical field of identity verification, and particularly relates to a computer network user identity login verification system and method.
Background
The authentication is also called authentication, and means that the user identity is confirmed by a certain means. There are many methods of authentication, which can be basically divided into: authentication based on a shared key, authentication based on biological characteristics, and authentication based on a public key encryption algorithm.
The purpose of authentication is to confirm that the user currently purported to be of a certain identity is indeed the purported user. In daily life, authentication is not uncommon; for example, by checking the identity of the other party, we can generally be confident about the identity of the other party. Although such a method of confirming the identity of the counterpart in daily life also belongs to the broad term "authentication", the term "authentication" is used more and more in the fields of computers, communications, and the like.
In the current computer network user login process, the account number and the password are directly input for verification, and the account number and the password are required to be input for each verification, so that the operation is complicated.
Disclosure of Invention
The embodiment of the application aims to provide a computer network user identity login verification method, which aims to solve the problems that in the current computer network user login process, an account number and a password are directly input for verification, and the account number and the password are required to be input for each verification, so that the operation is complicated.
The embodiment of the application is realized in such a way that the computer network user identity login verification method comprises the following steps:
receiving an exit login request, and intercepting data based on the exit login request to obtain temporary interception data;
performing data conversion on the temporary interception data, converting the temporary interception data into a character string with a preset format, and generating identity verification data based on the character string;
transmitting the authentication data to a mobile device bound with a current computer network user, wherein the mobile device stores the authentication data;
and receiving touch data by the mobile equipment, identifying a touch gesture based on the touch data, and if the touch gesture is the same as the preset gesture, sending corresponding identity verification data by the mobile equipment to finish login verification.
Preferably, the step of converting the temporary interception data into a character string in a preset format and generating authentication data based on the character string specifically includes:
carrying out binary conversion on the temporary interception data, and converting the temporary interception data into thirty-six binary data to obtain format conversion data;
character screening is carried out on the format conversion data, and only one type of character is reserved in the screened format conversion data to obtain a character string with a preset format;
counting the number of each character in the character string in the preset format, recording the number of each character, and generating identity verification data based on the number of each character, wherein the identity verification data is the combination of the characters and numbers corresponding to the number of the characters.
Preferably, the step of sending the authentication data to a mobile device bound to the current computer network user, where the mobile device stores the authentication data specifically includes:
matching the current user with the mobile equipment set by the user, and determining the communication address of the mobile equipment;
encrypting the authentication data according to a preset encryption algorithm, and transmitting the encrypted authentication data according to a communication address;
and receiving the authentication data through the mobile equipment, decrypting the authentication data, and storing the decrypted authentication data in a preset area.
Preferably, the step of receiving the touch data by the mobile device, identifying a touch gesture based on the touch data, and if the touch gesture is the same as the preset gesture, sending corresponding authentication data by the mobile device to complete login authentication specifically includes:
when logging in is needed, an information receiving instruction is sent to the mobile equipment, and the mobile equipment is in a standby state according to the information receiving instruction;
detecting screen touch actions in real time through mobile equipment to obtain touch data, and identifying touch gestures based on positions touched by a user in the touch data and time intervals of adjacent touch data;
if the touch gesture is the same as the preset gesture, the mobile device sends out corresponding identity verification data to complete login verification.
Preferably, the mobile device has stored therein a decryption key for decrypting the authentication data.
Preferably, after receiving the information receiving instruction, the mobile device opens a detection window, wherein the duration of the detection window is a preset value, and after reaching the preset value, the detection window is closed.
It is another object of an embodiment of the present application to provide a computer network user identity login verification system, the system comprising:
the data interception module is used for receiving the log-out request, and intercepting the data based on the log-out request to obtain temporary interception data;
the data conversion module is used for carrying out data conversion on the temporary interception data, converting the temporary interception data into character strings in a preset format, and generating identity verification data based on the character strings;
the data transmission module is used for transmitting the identity verification data to the mobile equipment bound with the current computer network user, and the mobile equipment stores the identity verification data;
the identity verification module is used for receiving touch data through the mobile equipment, identifying touch gestures based on the touch data, and sending corresponding identity verification data through the mobile equipment if the touch gestures are the same as preset gestures, so that login verification is completed.
Preferably, the data conversion module includes:
the format conversion unit is used for carrying out binary conversion on the temporary interception data and converting the temporary interception data into thirty-six binary data to obtain format conversion data;
the character screening unit is used for carrying out character screening on the format conversion data, and the screened format conversion data only reserves one type of character to obtain a character string with a preset format;
the data synthesis unit is used for counting the number of each character in the character string in the preset format, recording the number of each character, and generating identity verification data based on the number of each character, wherein the identity verification data is the combination of the characters and numbers corresponding to the number of the characters.
Preferably, the data transmission module includes:
the communication address matching unit is used for matching the current user with the mobile equipment set by the user and determining the communication address of the mobile equipment;
the authentication data transmission unit is used for encrypting the authentication data according to a preset encryption algorithm and transmitting the encrypted authentication data according to the communication address;
and the verification data storage unit is used for receiving the authentication data through the mobile equipment, decrypting the authentication data and storing the decrypted authentication data in a preset area.
Preferably, the identity verification module includes:
the mobile device comprises an instruction receiving unit, a control unit and a control unit, wherein the instruction receiving unit is used for sending an information receiving instruction to the mobile device when login is needed, and the mobile device is in a standby state according to the information receiving instruction;
the touch data acquisition unit is used for detecting touch actions of the screen in real time through the mobile equipment to obtain touch data, and identifying touch gestures based on the positions touched by a user in the touch data and the time intervals of adjacent touch data;
and the touch verification unit is used for sending corresponding identity verification data through the mobile equipment to finish login verification if the touch gesture is the same as the preset gesture.
According to the computer network user identity login verification method provided by the embodiment of the application, the use data is temporarily intercepted and used as verification data when each use is finished, so that the verification data is stored in the mobile device, when the user needs to log in, the mobile device is used for information acquisition, and the user can access the corresponding verification data for logging in through a simple touch device, so that the verification efficiency is greatly improved, and the convenience of user login is improved.
Drawings
FIG. 1 is a flow chart of a method for verifying user identity login of a computer network according to an embodiment of the present application;
fig. 2 is a flowchart of performing data conversion on temporary interception data, converting the temporary interception data into a character string with a preset format, and generating authentication data based on the character string, which is provided by the embodiment of the application;
FIG. 3 is a flowchart of the method for transmitting authentication data to a mobile device bound to a current computer network user, the mobile device storing the authentication data according to an embodiment of the present application;
FIG. 4 is a flowchart of receiving touch data by a mobile device, identifying a touch gesture based on the touch data, and if the touch gesture is the same as a preset gesture, sending corresponding authentication data by the mobile device to complete login authentication;
FIG. 5 is a block diagram of a computer network user authentication system according to an embodiment of the present application;
fig. 6 is a schematic diagram of a data conversion module according to an embodiment of the present application;
fig. 7 is a schematic diagram of a data transmission module according to an embodiment of the present application;
fig. 8 is a schematic diagram of an authentication module according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another element. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of this disclosure.
As shown in fig. 1, a flowchart of a method for verifying user identity login of a computer network according to an embodiment of the present application includes:
s100, receiving a log-out request, and intercepting data based on the log-out request to obtain temporary interception data.
In this step, the method is applied to a login webpage or a computer client, after a user verifies an account number and a password for the first time, identity login can be completed, when the user logs out of the account number, the webpage or the client intercepts the last received data, so that temporary intercepted data can be obtained, if an APP client receives a data packet before pushing out, temporary intercepted data with preset byte length is intercepted from the data packet, no matter what the content is contained in the data packet, the data can be intercepted as data, in particular video data, audio data, text data and the like, the data can be generated in the APP, uploaded by the user or downloaded from a network, and the time for intercepting the data is the moment for detecting the user logging out.
And S200, performing data conversion on the temporary interception data, converting the temporary interception data into a character string in a preset format, and generating identity verification data based on the character string.
In this step, the temporary interception data is subjected to data conversion, and is used as a carrier for verifying the identity of the user, so that the temporary interception data is not required to be known about specific content and specific meaning contained in the temporary interception data, is subjected to binary conversion, is converted into specific binary data, specifically, thirty-six binary data can be represented by characters 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y and Z, and is converted to obtain character strings in a specific format, and in order to further improve the randomness of the data and ensure the safety of the verification data, the number of the characters in the character strings is counted, and a group of identity verification data is generated based on the contained characters and the number of the characters.
And S300, the authentication data is sent to the mobile equipment bound with the current computer network user, and the mobile equipment stores the authentication data.
In this step, the authentication data is sent to the mobile device bound to the current computer network user, in order to ensure the security of the data in the transmission process, a preset encryption algorithm is called to encrypt the authentication data, a decryption key for decryption is stored in the mobile device, and in the transmission process, even if the encrypted authentication data is intercepted or copied, the encrypted authentication data cannot be encrypted due to lack of the decryption key, so that the decryption process of the authentication data is difficult to complete, account login cannot be performed according to the authentication data naturally, the mobile device stores the authentication data, and in the process, the authentication data is not decrypted.
S400, receiving touch data through the mobile equipment, identifying touch gestures based on the touch data, and if the touch gestures are identical to the preset gestures, sending corresponding identity verification data through the mobile equipment to finish login verification.
In this step, touch data is received through the mobile device, when a user opens a corresponding webpage or client, the webpage or client is automatically matched with a corresponding user according to an account number logged in last time, the corresponding mobile device is matched based on the user, so that a communication address corresponding to the mobile device is called, an information receiving instruction is sent to the mobile device, after the mobile device receives the information receiving instruction, a detection window is opened, when the detection window is opened, the mobile device can be lightened, a screen-extinguishing state can also be kept, at the moment, a corresponding prompt voice can be set, the prompt voice is used for prompting that the current touch instruction is acquired, at the moment, the user can touch the mobile device according to a preset touch action, the touch action is user-defined, such as circle drawing in a specific area of the mobile device, or three-finger tap in a specific area of the mobile device, a time interval of multiple tap is set, based on a touch gesture monitored in real time and a user-defined gesture, if the touch gesture is matched, corresponding identity verification data is sent to a corresponding webpage background or an APP through the mobile device, and verification is completed.
As shown in fig. 2, as a preferred embodiment of the present application, the step of performing data conversion on temporary interception data, converting the temporary interception data into a character string in a preset format, and generating authentication data based on the character string specifically includes:
s201, carrying out binary conversion on the temporary interception data, and converting the temporary interception data into thirty-six binary data to obtain format conversion data.
In this step, the temporary interception data is subjected to a binary conversion, and in order to reduce the number of characters, the temporary interception data is converted into tricetyl, and at this time, the numbers and letters in the data are regarded as characters, so that format conversion data is obtained.
S202, character screening is carried out on the format conversion data, and only one type of character is reserved in the screened format conversion data, so that a character string with a preset format is obtained.
In this step, character screening is performed on the format conversion data, specifically, the number characters contained in the format conversion data can be completely removed, only the alphabetic characters are reserved, and based on the same manner, only the number characters can be reserved, and the alphabetic characters can be discarded, so that a character string with a preset format can be obtained.
S203, counting the number of each character in the character string in the preset format, recording the number of each character, and generating identity verification data based on the number of each character, wherein the identity verification data is the combination of the characters and numbers corresponding to the number of the characters.
In this step, the number of each character in the character string in the preset format is counted, and in thirty-six, a total of 26 alphabetic characters are included, and in the character string in the preset format, each alphabetic character is repeatedly used, the number of use of each alphabetic character is counted, the alphabetic characters are ordered according to A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y and Z, and the corresponding number of use times such as a80, B85, etc. is inserted after each alphabetic character, so as to obtain the authentication data.
As shown in fig. 3, as a preferred embodiment of the present application, the step of sending the authentication data to a mobile device bound to a current computer network user, where the mobile device stores the authentication data specifically includes:
s301, matching the current user with the mobile device set by the user, and determining the communication address of the mobile device.
In the step, the current user is matched with the mobile device set by the user, specifically, the webpage or the APP client records the user account number logged in each time, the corresponding user identity can be determined based on the user account number, the mobile device corresponding to the user is correspondingly determined, and the communication address of the mobile device is determined accordingly.
S302, encrypting the authentication data according to a preset encryption algorithm, and sending the encrypted authentication data according to the communication address.
In this step, the authentication data is encrypted according to a preset encryption algorithm, and an encryption algorithm is set in the background of the web page or in the client, so that the encryption algorithm can be directly used for encrypting the data, a decryption key corresponding to the encryption algorithm is synchronously stored in the mobile device, and after encryption is completed, the encrypted authentication data is sent according to the communication address.
S303, receiving the authentication data through the mobile equipment, decrypting the authentication data, and storing the decrypted authentication data in a preset area.
In this step, the mobile device receives the authentication data, and in order to ensure the security of the data, an independent storage area is set in the mobile device, and the data in the storage area can only be written in and read out, so that the APP outside the authority is not allowed to rewrite the data.
As shown in fig. 4, as a preferred embodiment of the present application, the step of receiving touch data by the mobile device, identifying a touch gesture based on the touch data, and if the touch gesture is the same as a preset gesture, sending corresponding authentication data by the mobile device to complete login authentication specifically includes:
s401, when logging in is needed, an information receiving instruction is sent to the mobile device, and the mobile device is in a standby state according to the information receiving instruction.
In the step, when the login is required, an information receiving instruction is sent to the mobile device, the mobile device receives the information receiving instruction, so that the mobile device enters an information acquisition state, a screen of the mobile device is lightened, and a user can perform touch control on the screen.
S402, detecting screen touch actions in real time through the mobile device, obtaining touch data, and identifying touch gestures based on positions of user touches in the touch data and time intervals of adjacent touch data.
In this step, the mobile device detects the touch action of the screen in real time, in the above process, the user performs touch according to his user-defined touch gesture, if the user sets up to tap the screen three times with two fingers, the interval time is long and short, so as to obtain touch data, then the touch data is parsed, it is determined whether the user uses two fingers or not to tap each time, the tap time interval is long and short, the definition of the length can be twice the time of the first tap and the second tap and the time of the third tap, and then the length is long and short, otherwise, the user is regarded as two or two short, and the touch gesture is recognized based on the position touched by the user in the touch data and the time interval of the adjacent touch data.
S403, if the touch gesture is the same as the preset gesture, sending corresponding identity verification data through the mobile device, and finishing login verification.
In this step, when the touch gesture is the same as the preset gesture, the identity verification data is sent, the gesture is the same to indicate that the mobile device is nearby the user, and the user is himself/herself, in order to further improve security, the functions are limited within a preset time period from the last time the user unlocks the mobile device, if the user unlocks the mobile device at the time a, gesture verification can be performed by tapping in a duration of time B from the time a, otherwise verification can only be performed by inputting an account number and a password.
As shown in fig. 5, a system for verifying user identity login of a computer network according to an embodiment of the present application includes:
the data interception module 100 is configured to receive the log-out request, and intercept data based on the log-out request to obtain temporary intercepted data.
In the system, the data interception module 100 receives an exit login request, the application is applied to a login webpage or a computer client, after a user verifies an account number and a password for the first time, identity login can be completed, when the user exits the account number, the webpage or the client intercepts the last received data, temporary intercepted data can be obtained, if an APP client receives a data packet before pushing, the temporary intercepted data with preset byte length is intercepted from the data packet, no matter what the content is contained in the data packet, the data can be intercepted as data, in particular, video data, audio data, text data and the like, the data can be generated in the APP, uploaded by the user, downloaded from a network, and the time for intercepting the data is the time for detecting the user to exit login.
The data conversion module 200 is configured to perform data conversion on the temporary interception data, convert the temporary interception data into a character string in a preset format, and generate authentication data based on the character string.
In the system, the data conversion module 200 performs data conversion on temporary interception data, and for temporary interception data, the temporary interception data is only used as a carrier for verifying the identity of a user, so that specific content and specific meaning contained in the temporary interception data are not required to be known, the temporary interception data are converted into specific data, specifically, thirty-six system data can be expressed by characters 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y and Z, after conversion, character strings in specific formats are obtained, and in order to further improve the randomness of the data and ensure the safety of the verification data, the number statistics is performed on the characters in the character strings, and a group of identity verification data is generated based on the contained characters and the number of the characters.
The data transmission module 300 is configured to send the authentication data to a mobile device bound to a current computer network user, where the mobile device stores the authentication data.
In the system, the data transmission module 300 sends the authentication data to the mobile device bound with the current computer network user, in order to ensure the security of the data in the transmission process, a preset encryption algorithm is called to encrypt the authentication data, a decryption key for decryption is stored in the mobile device, and the encrypted authentication data cannot be encrypted in the transmission process even if the encrypted authentication data is intercepted or copied due to lack of the decryption key, so that the decryption process of the authentication data cannot be completed, account login cannot be naturally performed according to the authentication data, the mobile device stores the authentication data, and the authentication data is not decrypted in the process.
The authentication module 400 is configured to receive the touch data through the mobile device, identify a touch gesture based on the touch data, and send corresponding authentication data through the mobile device if the touch gesture is the same as the preset gesture, thereby completing login authentication.
In the system, the authentication module 400 receives touch data through the mobile device, when a user opens a corresponding webpage or client, the webpage or client is automatically matched with a corresponding user according to an account number logged in last time, the corresponding mobile device is matched based on the user, so that a communication address corresponding to the mobile device is called, an information receiving instruction is sent to the mobile device, after the mobile device receives the information receiving instruction, a detection window is opened, when the detection window is opened, the mobile device can be lightened, a screen-in state can be kept, at the moment, a corresponding prompt voice can be set, the prompt voice is used for prompting that the current touch instruction is acquired, at the moment, the user can touch the mobile device according to a preset touch action, the touch action is user-defined, such as circle drawing in a specific area of the mobile device, or three-finger tap in a specific area of the mobile device, the time interval of multiple tap is set to be long and short, and based on the touch gesture monitored in real time and the user-defined gesture, if the touch gesture is matched, the mobile device sends corresponding authentication data to the corresponding webpage or APP, and the authentication data is sent to the corresponding webpage or the client to complete login authentication.
As shown in fig. 6, as a preferred embodiment of the present application, the data conversion module 200 includes:
and the format conversion unit 201 is configured to perform a binary conversion on the temporary interception data, and convert the temporary interception data into thirty-six binary data, thereby obtaining format conversion data.
In the present system, the format conversion unit 201 performs a binary conversion on the temporary interception data, and in order to reduce the number of characters, converts it into tricyclopedia, and at this time, the numbers and letters in the data are regarded as characters, so as to obtain format conversion data.
The character screening unit 202 is configured to perform character screening on the format conversion data, where the screened format conversion data only retains one type of character, and a character string with a preset format is obtained.
In the present system, the character screening unit 202 performs character screening on the format conversion data, specifically, the number characters contained therein may be removed entirely, only the alphabetic characters are reserved, and based on the same manner, only the number characters may be reserved and the alphabetic characters may be discarded, so as to obtain a character string in a preset format.
The data synthesis unit 203 is configured to count the number of each character in the character string in the preset format, record the number of each character, and generate authentication data based on the number of each character, where the authentication data is a combination of the character and a number corresponding to the number of the character.
In the present system, the data synthesis unit 203 counts the number of each character in the character string in the preset format, and in thirty-six, contains 26 alphabetic characters in total, and in the character string in the preset format, each alphabetic character is repeatedly used, counts the number of use of each alphabetic character, sorts the alphabetic characters according to A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y and Z, and inserts the corresponding number of use times, such as a80, B85, etc., after each alphabetic character, to obtain the authentication data.
As shown in fig. 7, as a preferred embodiment of the present application, the data transmission module 300 includes:
the communication address matching unit 301 is configured to match the current user with the mobile device set by the user, and determine the communication address of the mobile device.
In this module, the communication address matching unit 301 matches the current user with the mobile device set by the user, specifically, the web page or APP client records the user account logged in each time, and based on the user account, the corresponding user identity can be determined, and the mobile device corresponding to the user is correspondingly determined, and then the communication address of the mobile device is determined.
The authentication data transmission unit 302 is configured to encrypt the authentication data according to a preset encryption algorithm, and send the encrypted authentication data according to a communication address.
In this module, the authentication data transmission unit 302 encrypts the authentication data according to a preset encryption algorithm, and an encryption algorithm is set in the background of the web page or in the client, so that the encryption algorithm can be directly used for encrypting the data, a decryption key corresponding to the encryption algorithm is synchronously stored in the mobile device, and after the encryption is completed, the encrypted authentication data is sent according to the communication address.
And the verification data storage unit 303 is configured to receive the authentication data through the mobile device, decrypt the authentication data, and store the decrypted authentication data in a preset area.
In this module, the authentication data storage unit 303 receives authentication data through the mobile device, and in order to ensure the security of the data, an independent storage area is set in the mobile device, and data in the storage area can only be written in and read out, so that the APP outside the authority is not allowed to rewrite the data.
As shown in fig. 8, as a preferred embodiment of the present application, the authentication module 400 includes:
the instruction receiving unit 401 is configured to send an information receiving instruction to the mobile device when the login is required, and the mobile device is in a standby state according to the information receiving instruction.
In this module, when the login is required, the instruction receiving unit 401 sends an information receiving instruction to the mobile device, and the mobile device receives the information receiving instruction, so that the mobile device enters an information acquisition state, and at this time, the screen of the mobile device is lit up, so that the user can perform touch control on the screen.
The touch data acquisition unit 402 is configured to detect a screen touch action in real time through the mobile device, obtain touch data, and identify a touch gesture based on a position touched by a user in the touch data and a time interval of adjacent touch data.
In this module, the touch data acquisition unit 402 detects the touch action of the screen in real time through the mobile device, in the above process, the user performs touch according to his user-defined touch gesture, for example, sets a double-finger tap on the screen three times, and the interval time is long and short, so as to obtain touch data, then analyzes the touch data, determines whether the user uses the double finger or not each tap, and whether the tap time interval is long and short, where the time interval between the first tap and the second tap may be twice the time between the second tap and the third tap, and is long and short, otherwise, it is regarded as two or two short, and identifies the touch gesture based on the position of the user touch in the touch data and the time interval between the adjacent touch data.
The touch verification unit 403 is configured to send corresponding authentication data through the mobile device if the touch gesture is the same as the preset gesture, and complete login verification.
In this module, when the touch gesture is the same as the preset gesture, the touch verification unit 403 sends the authentication data, and the gesture is the same to indicate that the mobile device is nearby the user, and for the user himself, in order to further improve the security, the above function is limited within a preset period of time from the last time the mobile device is unlocked, if the user unlocks the mobile device at the time a, then gesture verification can be performed by tapping during a period of time lasting for the time B at the time a, otherwise verification can only be performed by inputting the account number and the password.
It should be understood that, although the steps in the flowcharts of the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the application.

Claims (10)

1. A method for authenticating user identity login of a computer network, the method comprising:
receiving an exit login request, and intercepting data based on the exit login request to obtain temporary interception data;
performing data conversion on the temporary interception data, converting the temporary interception data into a character string with a preset format, and generating identity verification data based on the character string;
transmitting the authentication data to a mobile device bound with a current computer network user, wherein the mobile device stores the authentication data;
and receiving touch data by the mobile equipment, identifying a touch gesture based on the touch data, and if the touch gesture is the same as the preset gesture, sending corresponding identity verification data by the mobile equipment to finish login verification.
2. The method for verifying the identity login of a computer network user according to claim 1, wherein the step of converting the temporary interception data into a character string in a preset format and generating the identity verification data based on the character string specifically comprises the steps of:
carrying out binary conversion on the temporary interception data, and converting the temporary interception data into thirty-six binary data to obtain format conversion data;
character screening is carried out on the format conversion data, and only one type of character is reserved in the screened format conversion data to obtain a character string with a preset format;
counting the number of each character in the character string in the preset format, recording the number of each character, and generating identity verification data based on the number of each character, wherein the identity verification data is the combination of the characters and numbers corresponding to the number of the characters.
3. The method for authenticating a user's identity login in a computer network according to claim 1, wherein the step of transmitting the authentication data to a mobile device bound to the current computer network user, the mobile device storing the authentication data, comprises:
matching the current user with the mobile equipment set by the user, and determining the communication address of the mobile equipment;
encrypting the authentication data according to a preset encryption algorithm, and transmitting the encrypted authentication data according to a communication address;
and receiving the authentication data through the mobile equipment, decrypting the authentication data, and storing the decrypted authentication data in a preset area.
4. The method for verifying the login of the user identity of the computer network according to claim 1, wherein the step of receiving the touch data by the mobile device, recognizing the touch gesture based on the touch data, and if the touch gesture is the same as the preset gesture, sending corresponding verification data by the mobile device to complete the login verification specifically comprises the steps of:
when logging in is needed, an information receiving instruction is sent to the mobile equipment, and the mobile equipment is in a standby state according to the information receiving instruction;
detecting screen touch actions in real time through mobile equipment to obtain touch data, and identifying touch gestures based on positions touched by a user in the touch data and time intervals of adjacent touch data;
if the touch gesture is the same as the preset gesture, the mobile device sends out corresponding identity verification data to complete login verification.
5. A computer network user identity login verification method according to claim 1, wherein said mobile device has stored therein a decryption key for decrypting the authentication data.
6. The method for verifying user ID login in computer network according to claim 4, wherein after receiving the information receiving command, the mobile device opens a detection window, the duration of the detection window is a preset value, and after reaching the preset value, the detection window is closed.
7. A computer network user identity login verification system, the system comprising:
the data interception module is used for receiving the log-out request, and intercepting the data based on the log-out request to obtain temporary interception data;
the data conversion module is used for carrying out data conversion on the temporary interception data, converting the temporary interception data into character strings in a preset format, and generating identity verification data based on the character strings;
the data transmission module is used for transmitting the identity verification data to the mobile equipment bound with the current computer network user, and the mobile equipment stores the identity verification data;
the identity verification module is used for receiving touch data through the mobile equipment, identifying touch gestures based on the touch data, and sending corresponding identity verification data through the mobile equipment if the touch gestures are the same as preset gestures, so that login verification is completed.
8. The computer network user identity login verification system of claim 7, wherein said data conversion module comprises:
the format conversion unit is used for carrying out binary conversion on the temporary interception data and converting the temporary interception data into thirty-six binary data to obtain format conversion data;
the character screening unit is used for carrying out character screening on the format conversion data, and the screened format conversion data only reserves one type of character to obtain a character string with a preset format;
the data synthesis unit is used for counting the number of each character in the character string in the preset format, recording the number of each character, and generating identity verification data based on the number of each character, wherein the identity verification data is the combination of the characters and numbers corresponding to the number of the characters.
9. The computer network user identity login verification system according to claim 7, wherein said data transmission module comprises:
the communication address matching unit is used for matching the current user with the mobile equipment set by the user and determining the communication address of the mobile equipment;
the authentication data transmission unit is used for encrypting the authentication data according to a preset encryption algorithm and transmitting the encrypted authentication data according to the communication address;
and the verification data storage unit is used for receiving the authentication data through the mobile equipment, decrypting the authentication data and storing the decrypted authentication data in a preset area.
10. The computer network user identity login verification system of claim 7, wherein said identity verification module comprises:
the mobile device comprises an instruction receiving unit, a control unit and a control unit, wherein the instruction receiving unit is used for sending an information receiving instruction to the mobile device when login is needed, and the mobile device is in a standby state according to the information receiving instruction;
the touch data acquisition unit is used for detecting touch actions of the screen in real time through the mobile equipment to obtain touch data, and identifying touch gestures based on the positions touched by a user in the touch data and the time intervals of adjacent touch data;
and the touch verification unit is used for sending corresponding identity verification data through the mobile equipment to finish login verification if the touch gesture is the same as the preset gesture.
CN202310894781.2A 2023-07-20 2023-07-20 Computer network user identity login verification system and method Withdrawn CN116668189A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310894781.2A CN116668189A (en) 2023-07-20 2023-07-20 Computer network user identity login verification system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310894781.2A CN116668189A (en) 2023-07-20 2023-07-20 Computer network user identity login verification system and method

Publications (1)

Publication Number Publication Date
CN116668189A true CN116668189A (en) 2023-08-29

Family

ID=87713955

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310894781.2A Withdrawn CN116668189A (en) 2023-07-20 2023-07-20 Computer network user identity login verification system and method

Country Status (1)

Country Link
CN (1) CN116668189A (en)

Similar Documents

Publication Publication Date Title
US10681025B2 (en) Systems and methods for securely managing biometric data
US8275134B2 (en) Method for guaranteeing security of critical data, terminal and secured chip
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
EP1063812B1 (en) Methods and equipment for encrypting/decrypting, and indentification systems
CN101272237B (en) Method and system for automatically generating and filling login information
US20180082050A1 (en) Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device
US7024562B1 (en) Method for carrying out secure digital signature and a system therefor
US9218473B2 (en) Creation and authentication of biometric information
CN111787530B (en) Block chain digital identity management method based on SIM card
CN108833114A (en) A kind of decentralization identity authorization system and method based on block chain
CN101953111A (en) System and method for securing data
CA2408222A1 (en) Security system for high level transactions between devices
CN1910531B (en) Method and system used for key control of data resource, related network
CN110034926A (en) The generation and verification method of Internet of Things dynamic password, system and computer equipment
KR20220005705A (en) The electronic device for using homomorphic encryption and the method for processing encrypted data thereof
CN106844185A (en) The storage method and device of a kind of journal file
CN110768784A (en) Password transmission method, device, computer equipment and storage medium
EP3343827A1 (en) Information security device and information security method using accessibility
CN101622818A (en) IC tag system
CN102640166B (en) Electronic security device for validation adopting biometrics information and using method thereof
CN113595714A (en) Contactless card with multiple rotating security keys
CN116962021A (en) Method, device, equipment and medium for user real name authentication in financial cooperative institution
CN103684740A (en) Encrypting method and system, decrypting method and system, encryption and decryption method and system for photo album of mobile terminal
CN116668189A (en) Computer network user identity login verification system and method
KR20060098412A (en) Timely variable password formation module and a floating password application method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20230829