Method, device and system for realizing security login and security equipment

A security device and secure login technology, applied in the Internet field, can solve problems such as high-strength passwords that are inconvenient for users to remember, hash collision attacks, account theft, etc., to achieve physical isolation, ensure security, and increase difficulty.

Active Publication Date: 2016-07-06
郭蕴哲
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of the Internet, users will register accounts on multiple websites (such as Baidu, Jingdong, NetEase, etc.), and users usually use the same password as the login password when registering multiple accounts (usually also called login password). password), if the account password of a certain website is leaked, it is likely to cause the accounts of other websites to be stolen at the same time, which is not safe
At the same time, if a simple password is set, it is vulnerable to hash collision attacks, and a high-strength password is not easy for users to remember

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for realizing security login and security equipment
  • Method, device and system for realizing security login and security equipment
  • Method, device and system for realizing security login and security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the above objects, features and advantages of the present invention more comprehensible, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0056] In the prior art, at least the following problems exist in the login process using username and password:

[0057](1) Setting simple passwords is more vulnerable to hash collision attacks. Nowadays, the database of many websites does not store the plaintext of the user login password, but stores the hash value of the password. Hash transformation is a one-way function. Commonly used hash transformations include MD5, SHA-1, and SHA-256. Although it is a one-way function, the hash value of the fixed string remains unchanged. If the user's password is too simple, hackers can use exhaustive methods to brute force the password after dragging it out of the website's database. For example, if the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing security login. The method is applied in a piece of security equipment. The security equipment receives standard fingerprint information and account information sent by a client, randomly generates a random sequence corresponding to the account information and stores corresponding relationships among the standard fingerprint information, the account information and the random sequence. The account information comprises website information and a user name. The method comprises following steps of receiving the fingerprint information and the to-be-logged-in account information sent by the client; verifying whether the fingerprint information is the standard fingerprint information corresponding to the to-be-logged-in account information; if the fingerprint information is the standard fingerprint information, sending the random sequence corresponding to the to-be-logged-in account information to the client, thus enabling the client to fill in the random sequence as a password corresponding to the account information. The invention also discloses a device and system for realizing security login and the security equipment. According to the method, the device, the system and the equipment, a user can realize security login without memorizing the password; and the security of the user account is sufficiently ensured.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method, device, device and system for realizing secure login. Background technique [0002] With the development of the Internet, users will register accounts on multiple websites (such as Baidu, Jingdong, NetEase, etc.), and users usually use the same password as the login password when registering multiple accounts (usually also called login password). Password), if the account password of a certain website is leaked, it is likely to cause the accounts of other websites to be stolen at the same time, which is not safe. At the same time, if a simple password is set, it is vulnerable to hash collision attacks, and a high-strength password is not easy for users to remember. Contents of the invention [0003] In view of this, the present invention provides a method, device, device and system for implementing secure login, so as to ensure the security of the login process ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0853H04L63/0876
Inventor 郭蕴哲
Owner 郭蕴哲
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products