Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Login authentication method and login signature procedure

A login authentication and program technology, applied in the field of network communication, information security, and computer software, can solve problems such as failure to take into account the protection of communication transmission links, theft of user account information communication transmission, etc.

Inactive Publication Date: 2008-10-15
杨筑平
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This invention focuses on the terminal login protection link, which is an effective method, but the shortcoming is that it does not take into account the protection of the communication transmission link
As can be seen from the fourth means of the aforementioned spy program, user account information is also at risk of being stolen during communication transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authentication method and login signature procedure
  • Login authentication method and login signature procedure
  • Login authentication method and login signature procedure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] 1. Implementation of the login authentication method.

[0020] refer to Figure 4to illustrate. During the login acceptance stage, the system presents an interface window as shown in this figure, the title is "User Login Interface", and there is a close and exit button on the right side of the title bar. The user enters login information in this interface: [User Name] edit box enters the name or code of the user account; [Password / Response] edit box displays password characters, enter the user’s password or signature information as a response, depending on the user’s Whether the [Signature Challenge] check box is checked or not; if the [Signature Challenge] check box is checked, the [Password / Response] edit box will be renamed as [Signature Response], the signature information will be entered, and [ Signature Challenge] edit box (read-only) and [Password Algorithm] drop-down list box; if the [Signature Challenge] check box is not checked, the [Password / Response] edit ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a login authentication method and a login signing procedure which relate to the technical field of computer software, internetwork communication and information security. The system presents a login screen which comprises a user name, password child window, besides, a challenging child window which gives random message generated dynamically and an agreed response child window which collects the signing information of users. Users can choose freely from a compatible password authentication and a signing authentication. The registration password is also the authentication password and the symmetrical key authentication signing; the remembrance of the registered single password can apply to the two authentications methods; the login signing procedure operates independently, instructs and judges users on the target login screen to point at or fall on the challenging child window, picks up automatically random message which is signed by a cipher device to form the signing information, fixes the position according to the predetermined strategic orientation of the signing and issuance and sends the signing information to the response child window. The method of the invention does not relate to the hardware but is the thoroughfare for a stable and seamless transition from weak password authentication to the strong signing authentication; the procedure of the invention does not relate to the application, is generally applicable and commonly used and can effectively protect the accounts of users.

Description

technical field [0001] The invention relates to the technical fields of computer software, network communication and information security. Background technique [0002] Login is the only way for users to enter and use the application system, especially the networked service system. On the login interface, the user enters login information (mainly account information, including user name / account number, password / password, and possibly auxiliary information such as a verification code), and then accepts system verification after confirmation. In the network environment, especially on the Internet, all kinds of spy programs (programs that steal user information, such as Trojan horse programs, etc.) are rampant, but they are very secretive and hard to find. They often steal account information and infringe users without knowing it. User Privacy and Property. This has become a major public hazard in the network society, greatly endangering the normal order of various networked ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/00G06F21/41
Inventor 杨筑平周跃平杨霄
Owner 杨筑平
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products