CN117009941A - Electronic contract database login method, system, storage medium and equipment - Google Patents

Electronic contract database login method, system, storage medium and equipment Download PDF

Info

Publication number
CN117009941A
CN117009941A CN202311287334.7A CN202311287334A CN117009941A CN 117009941 A CN117009941 A CN 117009941A CN 202311287334 A CN202311287334 A CN 202311287334A CN 117009941 A CN117009941 A CN 117009941A
Authority
CN
China
Prior art keywords
verification code
target verification
typing
target
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311287334.7A
Other languages
Chinese (zh)
Other versions
CN117009941B (en
Inventor
孙竑
刘薇
周兆华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangling Motors Corp Ltd
Original Assignee
Jiangling Motors Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangling Motors Corp Ltd filed Critical Jiangling Motors Corp Ltd
Priority to CN202311287334.7A priority Critical patent/CN117009941B/en
Publication of CN117009941A publication Critical patent/CN117009941A/en
Application granted granted Critical
Publication of CN117009941B publication Critical patent/CN117009941B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Social Psychology (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The invention provides a method, a system, a storage medium and equipment for logging in an electronic contract database, wherein a target account number and a corresponding target verification code are input into electronic contract database logging software, the target verification code is a self-defined digital group, the target verification code is the self-defined digital group, and the digital group is formed by combining a plurality of numbers; acquiring the input time of a target verification code, and judging whether the input time is the input habit of a target user or not according to the input time; if yes, the electronic contract database is opened, and specifically, as habits of inputting the digital groups by each person are different, namely, the consistency degree is different, the electronic contract database can be used in user authentication, and the access security is improved.

Description

Electronic contract database login method, system, storage medium and equipment
Technical Field
The invention belongs to the technical field of electronic contract database login, and particularly relates to an electronic contract database login method, an electronic contract database login system, a storage medium and equipment.
Background
Along with the development of society, signing of contracts is changing to paperless, namely a large number of electronic contracts are generated, in general, each enterprise and each organization can have an electronic contract database belonging to the enterprise and each organization, and the electronic contract database is used for storing various electronic contracts, so that the electronic contract data is more convenient to search, but at the same time, the electronic contract database has a certain risk that the electronic data in the electronic contract database has a certain confidentiality, and if leakage occurs, a certain loss is caused to property of the enterprise.
At present, most of the login modes of the electronic contract database are carried out in the form of inputting an account number and a password, when the account number and the password are correctly input, the authentication can be considered to be successful, the electronic contract database can be accessed, the electronic contract data of a company can be accessed, and it can be understood that the security is not enough to ensure only by correctly inputting the account number and the password.
Disclosure of Invention
Based on the above, the embodiment of the invention provides a method, a system, a storage medium and equipment for logging in an electronic contract database, which aim to solve the problem of poor security in the prior art that logging in and accessing is only performed by inputting an account number and a password.
The first aspect of the embodiment of the invention provides a login method of an electronic contract database, which is applied to a scene that a specific user has a login account and a password of a corresponding electronic contract database, and comprises the following steps:
setting a target verification code, manually inputting the target verification code into electronic contract database login software of a local terminal for multiple times, and respectively acquiring the keying-in time interval of adjacent numbers in the target verification code and the total keying-in time of the target verification code;
determining the keying time range between adjacent digits and the total keying time range of the target verification code according to the keying time interval and the total keying time;
inputting a target account number and a corresponding target verification code in electronic contract database login software, wherein the target verification code is a self-defined digital group, and the digital group is formed by combining a plurality of numbers;
acquiring the input time of a target verification code, and judging whether the input time is the input habit of a target user or not according to the input time;
if yes, opening an electronic contract database;
the steps of setting a target verification code, manually inputting the target verification code into the electronic contract database login software of the local terminal for multiple times, and respectively obtaining the keying-in time interval of adjacent numbers in the target verification code and the total keying-in time of the target verification code comprise the following steps:
setting a target verification code, determining each local terminal for typing the target verification code, and respectively acquiring corresponding digit row arrangement and digit nine-grid arrangement according to each local terminal;
and when the target verification code is manually input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively, the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are obtained, wherein when the target verification code is manually input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively, the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are obtained, and when the target verification code is input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively, the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are obtained.
Further, the step of obtaining the input time of the target verification code and judging whether the input time is the input habit of the target user according to the input time includes:
the method comprises the steps of obtaining a local terminal and determining a corresponding target verification code typing mode, wherein the target verification code typing mode comprises a digit course arrangement typing mode and a digit nine-grid arrangement typing mode;
when the target verification code typing mode is a digit course arrangement typing mode, acquiring a corresponding total typing time range;
acquiring actual total typing time for typing a target verification code in a numeric course arrangement typing mode, and judging whether the actual total typing time is in a corresponding total typing time range or not;
if yes, acquiring the actual typing time interval of each adjacent digit of the target verification code in a digit row arrangement typing mode, and sequentially judging whether the actual typing time interval of each adjacent digit is in a corresponding typing time range;
if yes, acquiring the target number of the actual typing time interval in the typing time range, and judging whether the target number is larger than a preset value;
if yes, the input habit of the target user is described.
Further, the step of obtaining the local terminal and determining a corresponding target verification code typing mode, wherein the target verification code typing mode includes a digit course arrangement typing mode and a digit nine-grid arrangement typing mode, and then includes:
when the target verification code typing mode is a digital nine-grid arrangement typing mode, acquiring a corresponding total typing time range;
acquiring actual total typing time for typing a target verification code in a digital nine-grid arrangement typing mode, and judging whether the actual total typing time is in a corresponding total typing time range or not;
if yes, acquiring the actual typing time interval of each adjacent digit of the target verification code in a digit row arrangement typing mode, and sequentially judging whether the actual typing time interval of each adjacent digit is in a corresponding typing time range;
if yes, acquiring the target number of the actual typing time interval in the typing time range, and judging whether the target number is larger than a preset value;
if yes, the input habit of the target user is described.
Further, the step of obtaining the local terminal and determining the corresponding target verification code typing mode includes:
controlling to start the electronic contract database login software on the local terminal, acquiring the ip address of the local terminal, and judging whether the local terminal is a mobile terminal according to the ip address of the local terminal;
if yes, the interface of the mobile terminal is subjected to screenshot in real time, and a target picture when the first digit of the target verification code is typed is obtained;
and identifying the target picture and determining a corresponding target verification code typing mode.
A second aspect of the embodiment of the present invention provides an electronic contract database login system, which is applied to a scenario that a specific user has a login account and a password of a corresponding electronic contract database, where the system includes:
the input module is used for inputting a target account number and a corresponding target verification code in the electronic contract database login software, wherein the target verification code is a self-defined digital group, and the digital group is formed by combining a plurality of numbers;
the judging module is used for acquiring the input time of the target verification code and judging whether the input time is the input habit of the target user or not according to the input time;
and the opening module is used for opening the electronic contract database when the input habit of the target user is judged.
A third aspect of an embodiment of the present invention provides a readable storage medium including:
the readable storage medium stores one or more programs that when executed by the processor implement the electronic contract database login method described above.
A fourth aspect of an embodiment of the present invention provides an electronic device, including a memory and a processor, wherein:
the memory is used for storing a computer program;
the processor is used for realizing the electronic contract database login method when executing the computer program stored in the memory.
The method, the system, the storage medium and the equipment for logging in the electronic contract database provided by the embodiment of the invention have the following beneficial effects:
the method comprises the steps of inputting a target account number and a corresponding target verification code in electronic contract database login software, wherein the target verification code is a self-defined digital group, and the target verification code is the self-defined digital group which is formed by combining a plurality of numbers; acquiring the input time of a target verification code, and judging whether the input time is the input habit of a target user or not according to the input time; if yes, the electronic contract database is opened, and specifically, as habits of inputting the digital groups by each person are different, namely, the consistency degree is different, the electronic contract database can be used in user authentication, and the access security is improved.
Drawings
FIG. 1 is a flowchart of an electronic contract database login method according to an embodiment of the present invention;
fig. 2 is a block diagram of an electronic contract database login system according to a second embodiment of the present invention;
fig. 3 is a block diagram of an electronic device according to a third embodiment of the present invention.
The following detailed description will be further described with reference to the above-described drawings.
Detailed Description
In order that the invention may be readily understood, a more complete description of the invention will be rendered by reference to the appended drawings. Several embodiments of the invention are presented in the figures. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
It will be understood that when an element is referred to as being "mounted" on another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present. The terms "vertical," "horizontal," "left," "right," and the like are used herein for illustrative purposes only.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
Example 1
Referring to fig. 1, fig. 1 shows a flowchart of an implementation of an electronic contract database login method according to an embodiment of the present invention, where the electronic contract database login method is applied to a scenario where a specific user has a login account and a password of a corresponding electronic contract database, and the method specifically includes steps S01 to S03.
Step S01, a target account number and a corresponding target verification code are input into electronic contract database login software, wherein the target verification code is a self-defined digital group, and the digital group is formed by combining a plurality of numbers;
specifically, before this, a target verification code is first set, where the target verification code is a password, in this embodiment, the password is a digital group, the digital group is composed of a plurality of digits, and the target account is a unique identifier code representing a user, it can be understood that only when the target account and the target verification code are input correctly at the same time, preliminary authentication of the electronic contract database login can be completed, and in order to solve the input habit of the target user, a standard needs to be established to judge the subsequent operation process of inputting the target verification code, so that the target verification code is manually input into the electronic contract database login software of the local terminal for multiple times, the typing time intervals of adjacent digits in the target verification code and the total typing time of the target verification code are respectively obtained, and then the typing time ranges between the adjacent digits and the total typing time range of the target verification code are respectively determined according to the typing time intervals and the total typing time.
The local terminal may be a mobile phone, a tablet computer or a computer, etc., in which the electronic contract database login software is installed, and it may be understood that when the local terminal is a mobile phone, after the electronic contract database login software installed on the mobile phone is opened, the target verification code is manually input multiple times, and the typing time intervals of adjacent digits in the target verification code are obtained, for example, when the target verification code is 6 digits, the number of the obtained typing time intervals of the adjacent digits should be 5, that is, the time is counted from the time when the first digit is typed, and the total typing time is the time after the input of the 6 digits is completed, that is, the time is counted from the time when the first digit is typed until the last digit is typed.
It should be noted that, setting a target verification code, manually inputting the target verification code into the electronic contract database login software of the local terminal for multiple times, and respectively obtaining the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code, where the steps include setting the target verification code, determining each local terminal for keying the target verification code, and respectively obtaining corresponding digit row arrangement and digit nine-grid arrangement according to each local terminal; when the target verification code is manually input for multiple times to each local terminal of the digital row arrangement and the digital nine-grid arrangement respectively, the keying time interval of adjacent numbers in the target verification code and the total keying time of the target verification code can be understood, because of different digital input modes and different personal use habits, the target verification code needs to be manually input for multiple times to each local terminal of the digital row arrangement and the digital nine-grid arrangement respectively, so that the keying time interval of adjacent numbers in the target verification code and the total keying time of the target verification code obtained in different input modes can be obtained, and the target user can be judged more accurately.
In addition, when the target verification code is manually input for multiple times to each local terminal in which the digits are arranged in the digit row and the digits are arranged in the nine-grid row respectively, in the step of obtaining the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code, when the target verification code is manually input for multiple times to each local terminal in which the digits are arranged in the digit row and the digits are arranged in the nine-grid row respectively, the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are obtained respectively, and when the target verification code is input for multiple times to each local terminal in which the digits are arranged in the digit row and the digits are arranged in the nine-grid row respectively, the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are obtained respectively. In general, since the target verification code is a digital group, if the keyboard input of the computer is used, the target verification code is mostly entered by one hand, if the keyboard input of the mobile terminal such as the mobile phone is used, the one-hand typing or the two-hand typing is more common, and further, the typing modes of the digit course arrangement and the digit nine-grid arrangement also affect the typing time, so that the typing modes of the one-hand, the two-hand, the digit course arrangement and the digit nine-grid arrangement all belong to personal habits of users, data needs to be collected, and a corresponding typing time range between adjacent digits and a total typing time range of the target verification code are formed.
Step S02, obtaining the input time of a target verification code, judging whether the input time is the input habit of a target user or not according to the input time, and if yes, executing step S03;
in this embodiment, a local terminal is obtained, and a corresponding target verification code typing mode is determined, where the target verification code typing mode includes a digit course arrangement typing mode and a digit nine-grid arrangement typing mode; when the target verification code typing mode is a digit course arrangement typing mode, acquiring a corresponding total typing time range; acquiring actual total typing time for typing a target verification code in a numeric course arrangement typing mode, and judging whether the actual total typing time is in a corresponding total typing time range; if yes, acquiring the actual typing time interval of each adjacent digit of the target verification code in a digit row arrangement typing mode, and sequentially judging whether the actual typing time interval of each adjacent digit is in a corresponding typing time range; if yes, acquiring the target number of the actual typing time interval in the typing time range, and judging whether the target number is larger than a preset value; if yes, the input habit of the target user is described.
Similarly, when the target verification code typing mode is a digit nine-grid arrangement typing mode, a corresponding total typing time range is obtained; acquiring actual total typing time for typing a target verification code in a digital nine-grid arrangement typing mode, and judging whether the actual total typing time is in a corresponding total typing time range; if yes, acquiring the actual typing time interval of each adjacent digit of the target verification code in a digit row arrangement typing mode, and sequentially judging whether the actual typing time interval of each adjacent digit is in a corresponding typing time range; if yes, acquiring the target number of the actual typing time interval in the typing time range, and judging whether the target number is larger than a preset value; if yes, the input habit of the target user is described.
The step of obtaining the local terminal and determining the corresponding target verification code typing mode includes the steps of controlling the local terminal to start the electronic contract database login software, obtaining the ip address of the local terminal, and judging whether the local terminal is a mobile terminal according to the ip address of the local terminal; if yes, the interface of the mobile terminal is subjected to screenshot in real time, and a target picture when the first digit of the target verification code is typed is obtained; and identifying the target picture and determining a corresponding target verification code typing mode. It can be understood that after the electronic contract database login software on the local terminal is started, the ip address acquisition function and the automatic screen capturing function of the corresponding local terminal are activated, when the local terminal is judged to be the mobile terminal, the mobile terminal can be understood as a mobile phone, the interface of the mobile phone is subjected to screenshot in real time to obtain a plurality of pictures, and the target areas of the pictures are identified, wherein the target areas are the target verification code input boxes of the electronic contract database login software interface, specifically, the positions of the target areas relative to the electronic contract database login software interface are fixed, the target areas comprise a plurality of target subareas, each target subarea corresponds to an area for typing in a single number, the target subareas are sequentially arranged from left to right, when the leftmost target subarea is identified to have the number, the target picture at the moment is acquired, the input mode in the target picture is identified, and the corresponding target verification code typing mode is determined, namely, the number row arrangement typing mode or the number nine-grid arrangement typing mode. In addition, in order to ensure the privacy of the input target verification code, the input target verification code may be displayed as an 'x', or as other shielding symbols, and similarly, when the shielding symbol appears in the leftmost target subarea is identified, the target picture at the moment is acquired, and the input mode in the target picture is identified.
Specifically, the electronic contract database login software is controlled to be started on the local terminal, the ip address of the local terminal is obtained, when the local terminal is judged not to be a mobile terminal according to the ip address of the local terminal, in the embodiment, when the local terminal is a computer, the interface of the computer is subjected to screenshot in real time, pictures and corresponding moments when each digit (or each other obscuration symbol) of the target verification code is typed are obtained, and the actual typing time interval and the actual total typing time of adjacent digits in the target verification code are determined according to the obtained moments. It can be understood that, in this embodiment, the obtained time is calculated from the time corresponding to the time when the picture containing the verification code is captured, wherein in the process of typing the verification code, it is not known whether the verification code actually typed is the target verification code, only when the target account number and the actual verification code are input, and after the login is confirmed, it is required to be explained that if the input actual verification code is consistent with the target verification code, the input time of the target verification code is obtained, and the user is further authenticated.
In other embodiments of the present invention, by capturing a screenshot of the interface, it is also possible to determine whether the local terminal is a mobile terminal or not, and it can be understood that the digital row arrangement and the digital nine-grid arrangement will not occur on the screenshot of the interface of the computer, but are only embodied on the keyboard connected to the computer, and generally, the digital row arrangement is above the keyboard, and the digital nine-grid arrangement is on the right side.
Step S03, opening the electronic contract database.
In summary, the embodiment of the invention provides an electronic contract database login method, which is implemented by inputting a target account number and a corresponding target verification code in electronic contract database login software, wherein the target verification code is a self-defined digital group, and the target verification code is the self-defined digital group, and the digital group is formed by combining a plurality of numbers; acquiring the input time of a target verification code, and judging whether the input time is the input habit of a target user or not according to the input time; if yes, the electronic contract database is opened, and specifically, as habits of inputting the digital groups by each person are different, namely, the consistency degree is different, the electronic contract database can be used in user authentication, and the access security is improved.
Example two
The second embodiment of the present invention provides an electronic contract database login system 200, which is applied to a scenario where a specific user has a login account and a password of a corresponding electronic contract database, please refer to fig. 2, and is a block diagram of the electronic contract database login system provided in the second embodiment of the present invention, wherein the system 200 includes:
the input module 21 is configured to input a target account number and a corresponding target verification code in the electronic contract database login software, where the target verification code is a custom number group, and the number group is formed by combining a plurality of numbers;
the judging module 22 is configured to obtain an input time of the target verification code, and judge whether the input time is an input habit of the target user according to the input time;
and an opening module 23, configured to open the electronic contract database when the input habit of the target user is determined.
Further, in other embodiments of the present invention, the system 200 further comprises:
the first acquisition module is used for setting a target verification code, manually inputting the target verification code into the electronic contract database login software of the local terminal for multiple times, and respectively acquiring the keying-in time interval of adjacent numbers in the target verification code and the total keying-in time of the target verification code;
and the first determining module is used for respectively determining the keying time range between each two adjacent digits and the total keying time range of the target verification code according to the keying time interval and the total keying time.
Further, in some other embodiments of the present invention, the first obtaining module includes:
the first acquisition unit is used for setting a target verification code, determining each local terminal for entering the target verification code, and respectively acquiring corresponding digit row arrangement and digit nine-grid arrangement according to each local terminal;
the second obtaining unit is used for obtaining the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code when the target verification code is manually input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively, wherein the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are respectively obtained when the target verification code is input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively, and the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are obtained when the target verification code is input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively.
Further, in other embodiments of the present invention, the determining module 22 includes:
the system comprises a typing mode determining unit, a target verification code typing unit and a target verification code judging unit, wherein the typing mode determining unit is used for acquiring a local terminal and determining a corresponding target verification code typing mode, and the target verification code typing mode comprises a digit course arrangement typing mode and a digit nine-grid arrangement typing mode;
the first total typing time range obtaining unit is used for obtaining a corresponding total typing time range when the target verification code typing mode is a digit row arrangement typing mode;
the first judging unit is used for acquiring the actual total typing time for typing the target verification code in a numeric course arrangement typing mode and judging whether the actual total typing time is in a corresponding total typing time range or not;
the second judging unit is used for acquiring the actual typing time interval of each adjacent digit of the target verification code in the mode of typing in the digit row arrangement when judging that the actual total typing time is in the corresponding total typing time range, and sequentially judging whether the actual typing time interval of each adjacent digit is in the corresponding typing time range;
and the third judging unit is used for acquiring the target number of the actual typing time intervals in the typing time range when the actual typing time intervals of the adjacent digits are judged to be in the corresponding typing time range in sequence, and judging whether the target number is larger than a preset value.
Further, in other embodiments of the present invention, the determining module 22 further includes:
the second total typing time range obtaining unit is used for obtaining a corresponding total typing time range when the target verification code typing mode is a digit nine-grid arrangement typing mode;
a fourth judging unit, configured to obtain an actual total typing time for typing a target verification code in a digital nine-grid arrangement typing manner, and judge whether the actual total typing time is within a corresponding total typing time range;
a fifth judging unit, configured to obtain an actual typing time interval of each adjacent digit of the target verification code in a digit-string arrangement typing mode when it is judged that the actual total typing time is within a corresponding total typing time range, and sequentially judge whether the actual typing time interval of each adjacent digit is within the corresponding typing time range;
and a sixth judging unit, configured to, when sequentially judging that the actual typing time interval of each adjacent digit is within the corresponding typing time range, acquire a target number of the actual typing time intervals within the typing time range, and judge whether the target number is greater than a preset value.
Further, in other embodiments of the present invention, the typing mode determination unit includes:
the first judging subunit is used for controlling the starting of the electronic contract database login software on the local terminal, acquiring the ip address of the local terminal, and judging whether the local terminal is a mobile terminal according to the ip address of the local terminal;
the target picture acquisition subunit is used for capturing a screenshot of an interface of the mobile terminal in real time when the local terminal is judged to be the mobile terminal, and acquiring a target picture when a first digit of a target verification code is typed in;
and the identification subunit is used for identifying the target picture and determining a corresponding target verification code typing mode.
In summary, in the electronic contract database login system according to the above embodiment of the present invention, a target account number and a corresponding target verification code are input into electronic contract database login software, where the target verification code is a customized digital group, and the target verification code is a customized digital group, where the digital group is composed of a plurality of digits; acquiring the input time of a target verification code, and judging whether the input time is the input habit of a target user or not according to the input time; if yes, the electronic contract database is opened, and specifically, as habits of inputting the digital groups by each person are different, namely, the consistency degree is different, the electronic contract database can be used in user authentication, and the access security is improved.
Example III
In another aspect, referring to fig. 3, a block diagram of an electronic device according to a third embodiment of the present invention is provided, including a memory 20, a processor 10, and a computer program 30 stored in the memory and capable of running on the processor, where the processor 10 implements the electronic contract database login method as described above when executing the computer program 30.
The processor 10 may be, among other things, a central processing unit (Central Processing Unit, CPU), a controller, a microcontroller, a microprocessor or other data processing chip for running program code or processing data stored in the memory 20, e.g. executing an access restriction program or the like, in some embodiments.
The memory 20 includes at least one type of readable storage medium including flash memory, a hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 20 may in some embodiments be an internal storage unit of the electronic device, such as a hard disk of the electronic device. The memory 20 may also be an external storage device of the electronic device in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like. Further, the memory 20 may also include both internal storage units and external storage devices of the electronic device. The memory 20 may be used not only for storing application software of an electronic device and various types of data, but also for temporarily storing data that has been output or is to be output.
It should be noted that the structure shown in fig. 3 does not constitute a limitation of the electronic device, and in other embodiments the electronic device may comprise fewer or more components than shown, or may combine certain components, or may have a different arrangement of components.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the electronic contract database login method as described above.
Those of skill in the art will appreciate that the logic and/or steps represented in the flow diagrams or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). In addition, the computer readable medium may even be paper or other suitable medium on which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
It is to be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data states, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing examples illustrate only a few embodiments of the invention and are described in detail herein without thereby limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (7)

1. The electronic contract database login method is characterized by being applied to a scene that a specific user has a login account number and a password of a corresponding electronic contract database, and comprises the following steps:
setting a target verification code, manually inputting the target verification code into electronic contract database login software of a local terminal for multiple times, and respectively acquiring the keying-in time interval of adjacent numbers in the target verification code and the total keying-in time of the target verification code;
determining the keying time range between adjacent digits and the total keying time range of the target verification code according to the keying time interval and the total keying time;
inputting a target account number and a corresponding target verification code in electronic contract database login software, wherein the target verification code is a self-defined digital group, and the digital group is formed by combining a plurality of numbers;
acquiring the input time of a target verification code, and judging whether the input time is the input habit of a target user or not according to the input time;
if yes, opening an electronic contract database;
the steps of setting a target verification code, manually inputting the target verification code into the electronic contract database login software of the local terminal for multiple times, and respectively obtaining the keying-in time interval of adjacent numbers in the target verification code and the total keying-in time of the target verification code comprise the following steps:
setting a target verification code, determining each local terminal for typing the target verification code, and respectively acquiring corresponding digit row arrangement and digit nine-grid arrangement according to each local terminal;
and when the target verification code is manually input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively, the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are obtained, wherein when the target verification code is manually input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively, the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are obtained, and when the target verification code is input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively, the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are obtained.
2. The method for logging in an electronic contract database according to claim 1, wherein the step of obtaining the input time of the target verification code and judging whether the input time is the input habit of the target user according to the input time includes:
the method comprises the steps of obtaining a local terminal and determining a corresponding target verification code typing mode, wherein the target verification code typing mode comprises a digit course arrangement typing mode and a digit nine-grid arrangement typing mode;
when the target verification code typing mode is a digit course arrangement typing mode, acquiring a corresponding total typing time range;
acquiring actual total typing time for typing a target verification code in a numeric course arrangement typing mode, and judging whether the actual total typing time is in a corresponding total typing time range or not;
if yes, acquiring the actual typing time interval of each adjacent digit of the target verification code in a digit row arrangement typing mode, and sequentially judging whether the actual typing time interval of each adjacent digit is in a corresponding typing time range;
if yes, acquiring the target number of the actual typing time interval in the typing time range, and judging whether the target number is larger than a preset value;
if yes, the input habit of the target user is described.
3. The method for logging in an electronic contract database according to claim 2, wherein the steps of obtaining a local terminal and determining a corresponding target verification code entry mode, wherein the target verification code entry mode includes a digit course arrangement entry mode and a digit nine-grid arrangement entry mode, include:
when the target verification code typing mode is a digital nine-grid arrangement typing mode, acquiring a corresponding total typing time range;
acquiring actual total typing time for typing a target verification code in a digital nine-grid arrangement typing mode, and judging whether the actual total typing time is in a corresponding total typing time range or not;
if yes, acquiring the actual typing time interval of each adjacent digit of the target verification code in a digit row arrangement typing mode, and sequentially judging whether the actual typing time interval of each adjacent digit is in a corresponding typing time range;
if yes, acquiring the target number of the actual typing time interval in the typing time range, and judging whether the target number is larger than a preset value;
if yes, the input habit of the target user is described.
4. The method for logging in an electronic contract database according to claim 3, wherein the step of acquiring a local terminal and determining a corresponding target verification code typing mode includes:
controlling to start the electronic contract database login software on the local terminal, acquiring the ip address of the local terminal, and judging whether the local terminal is a mobile terminal according to the ip address of the local terminal;
if yes, the interface of the mobile terminal is subjected to screenshot in real time, and a target picture when the first digit of the target verification code is typed is obtained;
and identifying the target picture and determining a corresponding target verification code typing mode.
5. An electronic contract database login system, which is applied to a scene that a specific user has a login account and a password of a corresponding electronic contract database, and comprises:
the first acquisition module is used for setting a target verification code, manually inputting the target verification code into the electronic contract database login software of the local terminal for multiple times, and respectively acquiring the keying-in time interval of adjacent numbers in the target verification code and the total keying-in time of the target verification code;
the first determining module is used for respectively determining the keying time range between each two adjacent digits and the total keying time range of the target verification code according to the keying time interval and the total keying time;
the input module is used for inputting a target account number and a corresponding target verification code in the electronic contract database login software, wherein the target verification code is a self-defined digital group, and the digital group is formed by combining a plurality of numbers;
the judging module is used for acquiring the input time of the target verification code and judging whether the input time is the input habit of the target user or not according to the input time;
the opening module is used for opening the electronic contract database when the input habit of the target user is judged;
the first acquisition module includes:
the first acquisition unit is used for setting a target verification code, determining each local terminal for entering the target verification code, and respectively acquiring corresponding digit row arrangement and digit nine-grid arrangement according to each local terminal;
the second obtaining unit is used for obtaining the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code when the target verification code is manually input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively, wherein the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are respectively obtained when the target verification code is input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively, and the keying time interval of adjacent digits in the target verification code and the total keying time of the target verification code are obtained when the target verification code is input for multiple times to each local terminal in the digital horizontal arrangement and the digital nine-grid arrangement respectively.
6. A readable storage medium, comprising:
the readable storage medium stores one or more programs which when executed by a processor implement the electronic contract database login method according to any one of claims 1-4.
7. An electronic device comprising a memory and a processor, wherein:
the memory is used for storing a computer program;
the processor is configured to implement the electronic contract database login method of any one of claims 1-4 when executing a computer program stored on the memory.
CN202311287334.7A 2023-10-08 2023-10-08 Electronic contract database login method, system, storage medium and equipment Active CN117009941B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311287334.7A CN117009941B (en) 2023-10-08 2023-10-08 Electronic contract database login method, system, storage medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311287334.7A CN117009941B (en) 2023-10-08 2023-10-08 Electronic contract database login method, system, storage medium and equipment

Publications (2)

Publication Number Publication Date
CN117009941A true CN117009941A (en) 2023-11-07
CN117009941B CN117009941B (en) 2024-04-02

Family

ID=88565779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311287334.7A Active CN117009941B (en) 2023-10-08 2023-10-08 Electronic contract database login method, system, storage medium and equipment

Country Status (1)

Country Link
CN (1) CN117009941B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104200140A (en) * 2014-09-28 2014-12-10 北京奇虎科技有限公司 Method and device providing verification code
WO2016010643A1 (en) * 2014-07-18 2016-01-21 Alibaba Group Holding Limited Method and system for password setting and authentication
CN107465701A (en) * 2017-10-04 2017-12-12 刘兴丹 A kind of method, apparatus of dynamic position interface for password input
CN108965324A (en) * 2018-08-17 2018-12-07 新疆玖富万卡信息技术有限公司 A kind of anti-brush method of short message verification code, terminal, server, equipment and medium
CN109460966A (en) * 2018-10-12 2019-03-12 深圳壹账通智能科技有限公司 Contract signing method, apparatus and terminal device based on requesting party's classification
CN113343189A (en) * 2021-07-01 2021-09-03 百融云创科技股份有限公司 Method and device for preventing malicious swiping of short message verification code

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016010643A1 (en) * 2014-07-18 2016-01-21 Alibaba Group Holding Limited Method and system for password setting and authentication
CN104200140A (en) * 2014-09-28 2014-12-10 北京奇虎科技有限公司 Method and device providing verification code
CN107465701A (en) * 2017-10-04 2017-12-12 刘兴丹 A kind of method, apparatus of dynamic position interface for password input
CN108965324A (en) * 2018-08-17 2018-12-07 新疆玖富万卡信息技术有限公司 A kind of anti-brush method of short message verification code, terminal, server, equipment and medium
CN109460966A (en) * 2018-10-12 2019-03-12 深圳壹账通智能科技有限公司 Contract signing method, apparatus and terminal device based on requesting party's classification
CN113343189A (en) * 2021-07-01 2021-09-03 百融云创科技股份有限公司 Method and device for preventing malicious swiping of short message verification code

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GAURAV V. 等: "A new secure authentication scheme for web login using BLE smart devices", 2017 11TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID) *
任俊玲 等: "基于客户端信息和风险判别的动态验证码系统", 中北大学学报(自然科学版), vol. 40, no. 6 *

Also Published As

Publication number Publication date
CN117009941B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
US9235715B1 (en) Techniques for increasing mobile device security
CN102301378A (en) Thin client-server system, thin client terminal, data management method, and computer readable recording medium
JP2011512580A (en) System and method for accessing tamper-resistant storage in a wireless communication device using biometric data
CN108256303A (en) Electronic device, auth method and storage medium
CN105303100A (en) Verification method and device of application program startup
CN109063504B (en) Private file access method, mobile terminal and storage medium
CN108596764B (en) Transaction method, system and terminal device based on block chain
CN109460653B (en) Rule engine based verification method, verification device, storage medium and apparatus
CN110750765B (en) Service system, front-end page control method thereof, computer device, and storage medium
CN107480513B (en) Authentication implementation method and device, computer device and readable storage medium
CN107656959B (en) Message leaving method and device and message leaving equipment
US10621380B2 (en) System and method for controlling reviews in an application store
CN106874718B (en) Privacy processing method and device and terminal
CN107623696B (en) User identity verification method and device based on user behavior characteristics
CN107516218B (en) User identity authentication method and device based on multiple features
CN117009941B (en) Electronic contract database login method, system, storage medium and equipment
CN110968355A (en) Application program starting method and device and terminal
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
CN106991307A (en) Using time slot scrambling and device
CN103685259A (en) Method and device for account logging in
CN110727576A (en) Web page testing method, device, equipment and storage medium
CN109165490A (en) A kind of data inputting method and device
CN108418829B (en) Account login verification method and device, computer equipment and storage medium
CN106470106B (en) Terminal information display method and device
CN112788017A (en) Safety verification method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant