Supercharge Your Innovation With Domain-Expert AI Agents!

Safety login method and system

A technology for secure login and automatic login, applied in transmission systems, electrical components, etc., can solve problems such as forgetting, insecure user names and passwords, and achieve the effect of improving the level of security

Pending Publication Date: 2014-07-30
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF5 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the unsafe problems existing in the use of existing user names and passwords, a new secure login method and system is needed to prevent users from forgetting user names and passwords while improving the security of login information such as user names and passwords. Reduce the difficulty of user login operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety login method and system
  • Safety login method and system
  • Safety login method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] Figure 5 A flow chart of writing information for a user in a specific embodiment of the present invention. Figure 6 It is a flow chart of user security login in a specific embodiment of the present invention.

[0054] Such as Figure 5 As shown, in step S501, the user first needs to enter information and send a request for writing information.

[0055] Step S502, collect the user's fingerprint, compare it with the pre-stored fingerprint information, and verify the user's identity; if the verification is successful, execute step S503; if the verification fails, end the operation.

[0056] Step S503, the user inputs target login address information, user name and password;

[0057] Among them, in this step, there is a corresponding relationship between the user fingerprint, target login address information, user name, and password: the user identity can be confirmed according to the user fingerprint, and the user identity can correspondingly input one or more target ...

Embodiment 2

[0066] According to the secure login method and system of the present invention, it can be implemented in combination with a set of hardware devices in practical applications, specifically as Figure 7 and Figure 8 shown.

[0067] Figure 7 Shown is a schematic structural diagram of a security login device according to a specific embodiment of the present invention. The security device can realize the functions of the aforementioned security login method and system, such as Figure 7 As shown, the security login device 3 includes: a fingerprint extractor 31, a digital signal processor (Digital Signal Processing, DSP) 32, a first memory 33, a second memory 34, a read-write switch 35, a login controller 36, a crystal oscillator 37, Data interface 38, first data address bus 39; Wherein,

[0068] in achieving the aforementioned Figure 5 In the step S501 of recording information, the login controller 36 in the security login device 3 can be used when a request for writing inf...

Embodiment 3

[0099] combined with the aforementioned Figure 7 and Figure 8 Said embodiment, the present invention also proposes a more specific security login device; Figure 7 As shown, the security login device 3 includes: a fingerprint extractor 31, a digital signal processor (Digital Signal Processing, DSP) 32, a first memory 33, a second memory 34, a read-write switch 35, a login controller 36, a crystal oscillator 37, Data interface 38, first data address bus 39; Wherein,

[0100] The fingerprint extractor 31 can be a solid capacitive sensor, such as Fujitsu MBF200, with a resolution of 508DPI, a single image size (bytes) of 76K, and an antistatic index of ±10kV. The fingerprint sensor can also be a semiconductor sensor, using a sliding SWIPE chip, and the resolution needs to be above 500DPI. The fingerprint sensor is connected with data pins D0-D7, address pins A0-A2, read signal RD, and write signal WD of the data signal processor DSP-TMS320VC35 for collecting fingerprint data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety login method and system. The safety login method comprises the steps of prestoring user's fingerprint information and establishing a corresponding relation between the user's fingerprint information and target login address information, a login name and passwords; receiving a login request input by a user and including fingerprint information and target login address information, and comparing the fingerprint information and the target login address information with the user's fingerprint information and the target login address information in the corresponding relation; if comparison is successful, acquiring the login name and the passwords corresponding to the fingerprint information and the target login address information from the corresponding relation, and submitting the login name and the passwords to a target login address to perform automatic login.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a secure login method and system. Background technique [0002] With the popularization and development of network information technology, a large number of websites, distributed network applications and systems have emerged. When users use these resources, they often first need to register as users, and then need to enter user names and passwords to log in before using them. Users register with different usernames and passwords, and it is easy to forget usernames and passwords due to too many websites and applications. Some users use the same user and password to register on different websites, which will bring great security risks again, causing the passwords of some important websites and applications (such as online banking) to be cracked by criminals. Some users copy different user names and passwords on paper or in files stored on computers, which are easy to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 王印国徐忠民陈兆兵宋延军多杰才让徐尚杰
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More