Method for user security management of important system

A system user and security management technology, applied in the direction of user identity/authority verification, message/mail/notification, etc., can solve problems such as malicious use of the system and theft of system passwords, and achieve the effect of improving system security

Inactive Publication Date: 2013-04-17
ZHENJIANG JINGYING SOFTWARE TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two situations show that general system users seldom change their passwords actively. For important systems or important users of the system, this situation is very dangerous. In real life, system passwords are stolen and the system is used maliciously. happens sometimes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0006] The pile test system of the vehicle management institute adopts the C / S development mode. After the system user enters the user name and password to successfully log in to the system, the background management program of the system will randomly generate a 6-digit verification code and send it to the user. Enter the verification code for verification.

[0007] The process of this embodiment is:

[0008] During operator maintenance, each operator is bound with the user’s mobile phone number, and the machine running the background management program is equipped with a text message sending device. However, when the user successfully logs in to the system, the system writes the login information into the login information table. The background management program can know that the user has successfully logged in within a few seconds, and the system immediately randomly generates a 6-digit verification code. verify.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for user security management of an important software system, which aims at solving the current situation that users of a traditional system are lack of security awareness and hardly voluntarily change user passwords. The method is characterized in that for the important software system, after a user logs in the system every time, the system generates a verification code in real time and transmits the verification code onto a mobile phone of the user through a background management program, and then the user inputs the verification code to verify, so that a purpose for security management of the user password can be realized.

Description

technical field [0001] The present invention relates to a security method for user security management of an important software system. The present invention aims at the important system software that uses the user / password mode to log in. A mobile phone short message sending device is added to the server-end machine, and the system bundles one for each user. The user's own mobile phone number. When the user enters the password to log in to the system, the background management program of the system randomly generates a new 6-digit verification code and sends it to the user himself. The user enters the verification code for verification and can log in to the system only if it succeeds. This method of user password login system prevents illegal users from maliciously using the system after peeping at the user's input password to obtain the password through secondary real-time generation of verification code confirmation, which greatly improves system security. Background techn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W4/14
Inventor 曾凡玉
Owner ZHENJIANG JINGYING SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products