Computer permission control method based on mobile dynamic password

A dynamic password and authority control technology, applied in the field of information processing, can solve the problems of low system security, invalid password, and inability to guarantee the time synchronization between the mobile phone and the PC, so as to improve security, reduce requirements, and improve anti-attack capabilities. Effect

Inactive Publication Date: 2013-04-10
TONGJI UNIV
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The traditional remote dynamic password system uses a dynamic password generated from a time seed. This approach has two major drawbacks: First, if the dynamic password generation algorithm is public, anyone can derive the dyn...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer permission control method based on mobile dynamic password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] A computer use authority control method based on a mobile phone dynamic password, the method is realized through a system composed of a PC terminal connected to a network, a mobile terminal and a server terminal, and the server terminal is used to transmit information between the PC terminal and the mobile terminal. In order to ensure the reliability of data transmission, the TCP protocol is used for data transmission between PC, mobile and server. The specific steps of the method are as follows figure 1 Shown:

[0033] Step 1: The PC uses the RSA encryption algorithm, and a large prime number generator dynamically generates a private key and a public key. The private key is kept on the PC for subsequent decryption, and the public key is encoded into a string and sent to the mobile phone.

[0034] Step 2: After the mobile terminal receives the string, it first decodes it, and obtains the public key used for encryption to encrypt the PC management password, usage time a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a computer permission control method based on a mobile dynamic password. The computer permission control method based on the mobile dynamic password comprises the following steps: generating a private key and a public key by adopting encryption algorithm at an personal computer (PC) end and sending the public key to a mobile end; encrypting a PC management password, using time and permission level information which are stored at the mobile end in advance by adopting the public key after the mobile end receives the public key, generating a ciphertext string, and then sending the ciphertext string to the PC end; deciphering the ciphertext string by adopting the private key after the PC end receives the ciphertext string, getting the PC management password, the using time and the permission level information; and conducting a password authentication with the PC end by using the PC management password information. When the PC end passes the password authentication, computer permission is opened according to the using time and the permission level information. When the PC end does not pass the password authentication, the computer permission ends. Compared with the prior art, the computer permission control method based on the mobile dynamic password has the advantages of being capable of achieving a remote control of the using time and the permission of a computer by a mobile, convenient to use, good in safety and the like.

Description

technical field [0001] The invention relates to an information processing method, in particular to a computer use authority control method based on a mobile phone dynamic password. Background technique [0002] With the application of computers more and more widely, modern society has gradually entered the information age. Huge amounts of data are input and output from computers every day. Therefore, the security of the data has been transferred to the security protection of the computer accordingly. Therefore, the access protection of personal PC or Notebook is very important. We generally set a login password at startup to ensure that only those who know the password have access to the computer. [0003] However, many times, we often encounter such a dilemma: when we are away from home, friends or colleagues suddenly need to use our computer for urgent matters, and they call us to ask us for the unlocking password of the computer. However, this password is our common p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
Inventor 杨阳赵子豪胡长武程久军
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products