Two-dimensional code privacy login protection system and method

A protection system and two-dimensional code technology, applied in transmission systems, platform integrity maintenance, instruments, etc., can solve the problems of users memorizing a large number of account names and passwords, user manual entry, complex operations, etc., to avoid memory difficulties and solve passwords Leakage, easy operation effect

Inactive Publication Date: 2016-11-23
CHINA UNIV OF GEOSCIENCES (WUHAN)
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the problem of user account input, there are usually two problems in the traditional login method: 1. The user needs to memorize a large number of account names and passwords; 2. The user needs to manually enter during the login process; for the user application login mechanism, the traditional login method usually requires the following Two links: 1. The user logs in directly by entering the account name and password; 2. The user logs in directly through gestures
These methods are complex to operate and cumbersome to manage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code privacy login protection system and method
  • Two-dimensional code privacy login protection system and method
  • Two-dimensional code privacy login protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0049] Such as figure 1 As shown, a two-dimensional code privacy login protection method includes the following steps:

[0050] 1) Bind the received account name and password information of the application requiring private login with the identification code of the mobile phone, and then generate a QR code icon corresponding to the application; the identification code of the mobile phone is the IMEI or MAC address of the mobile phone;

[0051] The steps to generate a QR code icon are as follows:

[0052] 1.1) Use the ZUC algorithm to generate a random number;

[0053] 1.2) Use the SM3 hash algorithm to calculate the hash...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-dimensional code privacy login protection system and method. The system includes a two-dimensional code generation module and a keyboard login module; the two-dimensional code generation module is used to encode account names and password information to generate two-dimensional code icon; the two-dimensional code icon storehouse is used to store the two-dimensional code icon generated by the two-dimensional code generation module; the keyboard login module is used to analyze the two-dimensional code stored with account information, and use the input method to resolve the two-dimensional code icon Enter your account information into the corresponding application to achieve one-click quick login. The invention solves the problem of leakage of passwords that may exist in inputting passwords in public places.

Description

technical field [0001] The invention relates to information security technology, in particular to a two-dimensional code privacy login protection system and method. Background technique [0002] Password management has long been the top priority of system security, and safe and proper storage of account password information is also very important for personal privacy protection. The "SplashData's Annual "Worst Passwords" List" released by SplashData, a well-known American password management application provider, pointed out in 2014 that most users like to use simple passwords or reuse the same passwords on different websites, which poses a threat to the security of users' personal information. There are potential risks; most people are accustomed to using short passwords due to problems such as difficulty in remembering and entering complex passwords; in daily life, we need to enter passwords in various scenarios, and entering passwords in public may cause the risk of passw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F21/31G06F21/32G06F21/45H04L29/06G06F21/55
CPCG06F21/36G06F21/31G06F21/32G06F21/45G06F21/556H04L63/083H04L63/0861H04L63/0876
Inventor 宋军王力哲杨帆王开心赵健顿明
Owner CHINA UNIV OF GEOSCIENCES (WUHAN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products