Cross-device high-security non-password login method

A technology with high security and login method, applied in electrical components, transmission systems, etc., can solve the problem of poor security of users remembering passwords, and achieve the effect of no password memory burden, no need to enter passwords, and convenient binding.

Inactive Publication Date: 2015-12-30
张方华
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to use these enterprise application systems, users often first need to register. The above-mentioned traditional login registration method needs to enter a user name and password at least, and then the user uses the user name and password to log in. The disadvantage is that the user needs to remember the password and the security is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-device high-security non-password login method
  • Cross-device high-security non-password login method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0025] The technical principle of the cross-device high-security password-free login method of the present invention is to use the mobile phone number as the user's identity, to confirm the user's identity for the first time through the SMS verification code, and to use the random password generated by the server to realize the repeated login of the user That is, when the user uses the enterprise application system, the entire login process does not require the user to enter a password, nor does the user need to remember any password. Since the password is randomly generated by the server, the security of the enterprise application system is also guaranteed. The enterprise application system It consists of a client and a server, the client includes a desktop client and a mobile client; the server includes at least one database. The cross-device high se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cross-device high-security non-password login method. According to the method, a mobile phone number is adopted as the identity identifier of a user; initial confirmation of the identity of the user is carried out through short message verification codes; and repeat login of the user is realized through adopting random passwords generated by a server end. The method is applicable to many application scenes. As long as users are users in the mainland of China and the physical safety performance of user equipment such as desktop computers and mobile devices are fully guaranteed, namely, only the users can use the equipment, the login function of the users can be realized by the method of the invention. Compared with an existing login mode, the cross-device high-security non-password login method of the invention has the advantages of simplicity, safety, no need for password entry of the users, no password memory burden, high practical value and great practical significance. With the method of the invention adopted, when one enterprise application system is attacked, other enterprise application systems will not be affected at all.

Description

technical field [0001] The invention relates to a cross-device high security passwordless login method, which belongs to the technical field of network security. Background technique [0002] At present, traditional software systems require users to register and log in as long as they have certain requirements for access control and security. During the registration process, users are required to enter a password. In order to ensure the high security of enterprise application systems, some enterprise application systems also Enforce complex passwords for users. Nowadays, more and more enterprise application systems are used by users, and it is a great challenge for users to remember the passwords of many enterprise application systems. Therefore, many users simply use simple passwords, use the same password for multiple enterprise application systems, or store passwords in notebooks and files. These practices do not meet the high security requirements. Some companies have ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0846
Inventor 张方华
Owner 张方华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products