Implementation scheme of two-factor login manner capable of opening and closing freely

A login method and two-factor technology, applied in the field of information security, can solve problems such as inconvenient, easy to crack, and insecure

Inactive Publication Date: 2016-12-07
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Today's website login, most websites are just a simple username / password login method, which is extremely insecure and easy to crack
And a small number of two-factor login methods also need to carry the authentication Ukey, no matter where (at home, in the company or on a business trip), you need to carry it, which is very inconvenient
Because at home or in the company, we can default that the environment is safe, and there is no need for two-factor login at all. If you log in to the system multiple times, the inconvenience will be obvious.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation scheme of two-factor login manner capable of opening and closing freely
  • Implementation scheme of two-factor login manner capable of opening and closing freely

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] An implementation scheme of a two-factor login method that can be freely opened and closed. The two-factor login is a user name / password and a personal certificate login, and the two-factor login method can be freely opened and closed. The personal certificate uses JavaJDK. The belt tool keytool is implemented, and the process is as follows:

[0026] First, generate a trusted certificate store through the command;

[0027] After that, generate a P12 personal certificate, and export the trusted certificate cert from the P12 personal certificate;

[0028] Finally, import the trusted certificates into the certificate store.

Embodiment 2

[0030] Such as figure 2 As shown, on the basis of Example 1, when generating a certificate, the solution described in this embodiment adds a unique identifier UUID to a certain field in the certificate structure, and adds a user name to another field. This field is the key to authenticating this certificate, and then, store the UUID of the certificate in the database, and store the open / closed state of a certificate.

Embodiment 3

[0032] On the basis of Embodiment 2, when managing website users in this embodiment, the administrator can modify the user's certificate status and download a new certificate through the user's information:

[0033] When the user status is turned on, then this user can only log in through two factors (username / password and personal certificate);

[0034] If the user status is closed, the user can log in with only the username and password;

[0035] If the administrator downloads a new certificate for this user, the new certificate needs to be delivered to the user by email or other means. The user can log in normally only by importing the new user certificate in the browser.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an implementation scheme of a two-factor login manner capable of opening and closing freely. The two-factor login refers to login based on a user name/password and a personal certificate. The two-factor login manner is able to open and close freely. The personal certificate is realized by using a keytool of Java JDK. The process is as follows: firstly, a trusted certificate bank is generated according to a command; then a personal certificate is generated, and the trusted certificate is exported from the personal certificate; and finally, the trusted certificate is imported into the certificate bank. Authentication of the certificate can be performed by a user, and the authentication of the certificate can be started and closed freely.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an implementation scheme of a two-factor login mode that can be freely opened and closed. Background technique [0002] Today's website login, most websites are just a simple login method of username / password, which is extremely insecure and easy to crack. And a small number of two-factor login methods also need to carry the authentication Ukey, no matter where (at home, in the company or on a business trip), you need to carry it, which is very inconvenient. Because at home or in the company, we can assume that the environment is safe and there is no need for two-factor login at all. If you log in to the system multiple times, the inconvenience caused to it is also obvious. Then, if the two-factor login method at this time can be freely turned on and off, this disadvantage will be easily solved. Contents of the invention [0003] The technical problem to be solve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/083
Inventor 唐超
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products