Method for unicity, accurate and quick locating logon web page on internet
A technology for specifying webpages and networks, applied in the field of computer networks, can solve the problems of lack of uniqueness of users, etc., and achieve the effect of ensuring uniqueness, avoiding deciphering, and quickly logging in to webpages
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0045] Embodiment 1, a method of the present invention for uniquely, accurately and quickly locating a login webpage on the network is used for network login of enterprise unit information.
[0046] It is assumed that a national enterprise information database is established in the server D1 in D, and the enterprise A1 in A will store its enterprise information in the server D1. The URL is: http: / / D1 / d11 / d12 / d13 / d14 / d15 / d16 In the web page of / d17, when implementing this method, it includes two processes of one-time setting and multiple logins:
[0047] In the setting process, it includes the following steps:
[0048] Step a. Establish an encryption algorithm program characterized by a symmetric key encryption authentication protocol and a driver program that can be exported in an external storage medium with a CPU, wherein the external storage medium adopts a USBKEY smart password key;
[0049] Step b. Pre-distribute the same key in the storage medium (i.e. the USB KEY smart...
Embodiment 2
[0062] Embodiment 2, a method of the present invention for uniquely, accurately and quickly locating a login webpage on the network, which is used for network login of personal information.
[0063] It is assumed that a national personal medical information database is established in the server D2 in D, and an individual E1 in E will store his personal medical information in the server D2 at http: / / D2 / d21 / d22 / d23 / d24 / In the web pages of d25 / d26 / d27, when implementing this method, it includes two processes of one-time setting and multiple logins:
[0064] In the setting process, it includes the following steps:
[0065] Step a. Establish an encryption algorithm program characterized by an asymmetric key encryption authentication protocol and a driver program that can be exported in an external storage medium with a CPU. Since existing personal medical cards usually use IC cards, therefore The external storage medium with CPU can choose IC smart card;
[0066] Step b. A publi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More